19.11.2014 Views

Understanding the Red Flag Rules - Log in - American Health ...

Understanding the Red Flag Rules - Log in - American Health ...

Understanding the Red Flag Rules - Log in - American Health ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

work<strong>in</strong>g smart<br />

Support<strong>in</strong>g Adm<strong>in</strong>istrative Policies and Position Statements<br />

M<strong>in</strong>istry <strong>Health</strong>’s red flag plan builds upon its privacy<br />

and security policies already <strong>in</strong> place. The plan cites <strong>the</strong><br />

organization’s follow<strong>in</strong>g resources:<br />

Bus<strong>in</strong>ess associate agreements as required by<br />

HIPAA. Policy address<strong>in</strong>g <strong>the</strong> HIPAA requirement to obta<strong>in</strong><br />

bus<strong>in</strong>ess associate agreements with those vendors and bus<strong>in</strong>ess<br />

associates who provide services on behalf of M<strong>in</strong>istry <strong>Health</strong> Care<br />

that <strong>in</strong>volve <strong>the</strong> use of patient protected health <strong>in</strong>formation.<br />

“Disclosure of Protected <strong>Health</strong> Information.”<br />

Comprehensive policy address<strong>in</strong>g release of patient <strong>in</strong>formation<br />

and requirements prior to disclosure of patient <strong>in</strong>formation <strong>in</strong><br />

response to external requests.<br />

“Patient Identity Theft —Management of an<br />

Occurrence.” Position statement <strong>in</strong>itially created as a proactive<br />

response to identity <strong>the</strong>ft <strong>in</strong> 2004; revised <strong>in</strong> 2008. Includes<br />

current guidance, FTC recommendations, and most importantly a<br />

checklist of steps to carry out when <strong>in</strong>vestigat<strong>in</strong>g identity <strong>the</strong>ft.<br />

“Respond<strong>in</strong>g to Privacy Compla<strong>in</strong>ts.” Policy provid<strong>in</strong>g<br />

guidance to privacy officers and o<strong>the</strong>rs <strong>in</strong> respond<strong>in</strong>g to patient<br />

privacy compla<strong>in</strong>ts. The policy also <strong>in</strong>cludes <strong>the</strong> follow<strong>in</strong>g tools<br />

for enterprise and local use: privacy-related compla<strong>in</strong>ts log<br />

(sample); privacy-related compla<strong>in</strong>t <strong>in</strong>vestigation record (sample);<br />

recommended <strong>in</strong>volvement <strong>in</strong> privacy compla<strong>in</strong>t <strong>in</strong>vestigation<br />

matrix; and quick tips for privacy <strong>in</strong>vestigations.<br />

“Security Incidence Response and Report<strong>in</strong>g.”<br />

Policy establish<strong>in</strong>g guidel<strong>in</strong>es for <strong>the</strong> identification, response,<br />

report<strong>in</strong>g, assessment, analysis, and follow-up to <strong>in</strong>formation<br />

5. Regulatory Enforcement: The FTC’s role <strong>in</strong> compliance.<br />

6. Approval of <strong>the</strong> Program: Approval required at <strong>the</strong> board of<br />

directors level.<br />

7. O<strong>the</strong>r: Attachments, related policies and position statements,<br />

applicable regulations, applicable Jo<strong>in</strong>t Commission standards,<br />

sources, etc.<br />

The FTC and o<strong>the</strong>r organizations offer onl<strong>in</strong>e resources to<br />

assist healthcare providers <strong>in</strong> comply<strong>in</strong>g with <strong>the</strong> rules (see <strong>the</strong><br />

resource list below).<br />

While <strong>the</strong>se and o<strong>the</strong>r valuable resources are available, an<br />

identity <strong>the</strong>ft prevention program should be designed to address<br />

<strong>the</strong> needs of <strong>the</strong> organization. Adopt<strong>in</strong>g a pre-exist<strong>in</strong>g<br />

template from ano<strong>the</strong>r source will work if <strong>the</strong> time is taken to<br />

customize <strong>the</strong> template to <strong>the</strong> organization’s needs and established<br />

practices. M<strong>in</strong>istry’s legal counsel assisted <strong>in</strong> develop<strong>in</strong>g<br />

<strong>the</strong> plan. Also key was representation on <strong>the</strong> work group from<br />

risk management, IT, compliance, HIM, patient account<strong>in</strong>g, and<br />

patient registration.<br />

Once <strong>the</strong> plan was completed, <strong>the</strong> organization’s focus turned<br />

to implementation and staff education and awareness. These<br />

activities will be carried out through presentations to privacy<br />

and security officials first and <strong>the</strong>n additional staff through<br />

presentations, newsletter articles, and o<strong>the</strong>r reference tools as<br />

needed. <br />

security <strong>in</strong>cidents. An <strong>in</strong>formation security <strong>in</strong>cident is a violation<br />

or imm<strong>in</strong>ent threat of violation of <strong>in</strong>formation security policies,<br />

acceptable use policies, or standard security practices that<br />

<strong>in</strong>cludes identity <strong>the</strong>ft.<br />

“S ocial S e curit y Numbers—Confidential<br />

Management, Use, and Disclosure.” Policy provid<strong>in</strong>g<br />

guidance on how M<strong>in</strong>istry <strong>Health</strong> Care collects, manages, and<br />

shares <strong>the</strong> confidential Social Security numbers of patients,<br />

providers, and work force members.<br />

“Verification of Identity for Individuals Request<strong>in</strong>g<br />

Access to Patient Protected <strong>Health</strong> Information.”<br />

Position statement establish<strong>in</strong>g practices for verify<strong>in</strong>g identity<br />

of <strong>in</strong>dividuals <strong>in</strong>quir<strong>in</strong>g about patient <strong>in</strong>formation after <strong>the</strong><br />

encounter phase (e.g., telephone <strong>in</strong>quiries regard<strong>in</strong>g account<br />

<strong>in</strong>formation).<br />

“Verification of Patient Identity.” Position statement<br />

address<strong>in</strong>g patient verification at <strong>the</strong> time of <strong>the</strong> encounter,<br />

specifically dur<strong>in</strong>g <strong>the</strong> registration process. Provides guidance<br />

to acceptable forms of identity verification when deemed<br />

appropriate. Patient identity verification may be established by<br />

review of <strong>the</strong> follow<strong>in</strong>g documents produced by <strong>the</strong> patient (a<br />

photocopy of <strong>the</strong> documents may be obta<strong>in</strong>ed for reference):<br />

driver’s license or o<strong>the</strong>r governmental identification that<br />

<strong>in</strong>cludes picture verification; Social Security card; student ID<br />

card; passport; <strong>in</strong>surance card; o<strong>the</strong>r photo ID or substantiat<strong>in</strong>g<br />

document (e.g., correspondence from governmental, utility, or<br />

o<strong>the</strong>r established entity). <br />

Note<br />

1. Davis Wright Trema<strong>in</strong>e, LLP. “<strong>Health</strong> Care Providers: Don’t<br />

Miss <strong>the</strong> <strong>Red</strong> <strong>Flag</strong>s.” <strong>Health</strong> Law Advisory Bullet<strong>in</strong>, August<br />

2008. Available onl<strong>in</strong>e at www.dwt.com/practc/healthcr/<br />

bullet<strong>in</strong>s/08-08_<strong>Red</strong><strong>Flag</strong><strong>Rules</strong>(pr<strong>in</strong>t).htm<br />

Resources<br />

<strong>American</strong> Hospital Association. “<strong>Red</strong> <strong>Flag</strong> <strong>Rules</strong> Resources.”<br />

October 2008. Available onl<strong>in</strong>e at www.aha.org/aha/advocacy/<br />

compliance/redflags.html.<br />

Federal Trade Commission. “New ‘<strong>Red</strong> <strong>Flag</strong>’ Requirements for<br />

F<strong>in</strong>ancial Institutions and Creditors Will Help Fight Identity<br />

Theft.” June 2008. Available onl<strong>in</strong>e at www.ftc.gov/bcp/edu/<br />

pubs/bus<strong>in</strong>ess/alerts/alt050.shtm.<br />

Gellman, Robert, and Pam Dixon. “<strong>Red</strong> <strong>Flag</strong> and Address<br />

Discrepancy Requirements: Suggestions for <strong>Health</strong> Care<br />

Providers.” World Privacy Forum. September 24, 2008.<br />

Available onl<strong>in</strong>e at www.worldprivacyforum.org/pdf/WPF_<br />

<strong>Red</strong><strong>Flag</strong>Report_09242008fs.pdf.<br />

Nancy Davis (nancy.davis@m<strong>in</strong>istryhealth.org) is director of privacy/security<br />

officer at M<strong>in</strong>istry <strong>Health</strong> <strong>in</strong> Sturgeon Bay, WI, and cochair of <strong>the</strong> AHIMA 2008<br />

Privacy and Security Practice Council.<br />

Journal of AHIMA/February 2009 - 80/2 49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!