What s New for Stage 1 in 2014

Size: px
Start display at page:

Download "What s New for Stage 1 in 2014"

Transcription

1 The problem Your Accounting for a New Economy What s New for Stage 1 in 2014 Medical identity is now the fastest-growing type of identity theft in the world and Texas has become the fourth highest identity theft complaint state (Brain, 2014). American Medical News found that an estimated 2 million people become victims of identity theft each year and more than 5,300 physicians have listed themselves in a federal database that tracks medical identity theft (Dolan, 2012). As if the loss of a physician s name isn t enough, they are then faced with the risk of losing credibility, their jobs, thousands of dollars and law suits. There are two kinds of medical ID theft; one is if the physician has his or her credentials stolen, the other is if the patient s identity or insurance information is being stolen. Both are serious threats to the physician and their practice. The biggest key to detection, is education, said Shantanu Agrawal, MD for the Center for Program Integrity at the Centers for Medicare & Medicaid Services. If physicians know how to realize they have had their identity stolen and how to begin reclaiming their identity, they will be able to avoid and solve this crisis. The Office of Inspector General, U.S. Department of Health and Human Services, identifies medical identity theft as when someone steals information such as your name, social security number or Medicare number in order to obtain medical care, prescriptions or to submit fake billing in your name (General). Why The Coalition Against Insurance Fraud explains that thieves steal your personal information to fill their pockets by making false claims against your health policy. With your identity, thieves can now obtain your health-insurance number, social security number, date of birth, home address and more. Signs you are the target of Medical ID Theft If someone offers you free health services or products, but requires you to provide your health plan ID number. Receiving phone calls from patients you never treated. Medicare remittance notices for services never performed. Credit reports, mailings or phone calls referencing corporation fillings or businesses under a different name from the practice but with your name associated. It is just as important to ensure your patients are not a victim of identity theft. Ensure all billings are capable of being processed accordingly and avoid law suits by keeping a look out and providing these warnings for your patients: If he or she receives a bill for medical services not received, a call from a debt collector about a medical debt he or she do not owe, unknown medical collection notices on his or her credit report, a notice from his or her health plan 2626 Howell St. Suite 700 Dallas, Texas Main Fax

2 saying the benefit limit was reached and denial of insurance because medical records show a condition he or she does not have. Bill Fox, senior director of the health care division at LexisNexis Risk Solutions, says, Physicians need to be aware that an employee is often the source of the information leak. They have access to the practices databases and the ability to hide any of the warning signs (Dolan, 2012). Damage The Coalition Against Insurance Fraud outlined these potential damages: Ruined credit. Thieves often ring up large hospital bills in your name, then disappear without paying. This can ruin your credit. Straightening out inaccurate credit records can take months or even years of time-consuming headaches. Meanwhile, you could be hounded by bill collectors, turned down for loans or mortgages, and forced to pay higher lending costs. You also could lose jobs; some employers check a candidate s credit history. Loss of health coverage. Fraudulent insurance claims can max out your health-policy limits and leave you with no coverage when you have a medical emergency, or need an expensive operation or other treatment. Inaccurate records. A thief s treatment history can end up on your medical records. This could include the wrong blood type, mental illnesses or medicine to which you re allergic, putting your life on the life. Legal troubles. A pregnant woman stole the medical identity of a mother, and delivered a baby who tested positive for illegal drugs. Social workers tried to take away the real mother s four children, falsely thinking she was the addict. She had to hire a lawyer to keep her family. Physicians could also find themselves in a difficult legal situation if they have inaccurately treated or diagnosed a patient. Higher health premiums. False claims against a health insurance policy can raise your health premiums costing you even more money. Preventatives Perform routine checks of Medicare s Provider Enrollment, Chain and Ownership System list to ensure both the practice and physician do not have any mysterious associations. The American Medical News, suggests medical receptionists to take these steps in order to prevent the use of stolen identities: Request two pieces of identification from patients. Thefts will most likely not have a matching photo ID or it could be an obviously fake second form of identification with inconsistent descriptions. Ask for a referral source. Finding how new patients heard of the practice can prove to be beneficial. Generally patients were referred by another doctor or friend. Those referrals, especially ones from other doctors, can be used to establish the person s identity, if needed. Look for inconsistencies in the record. Having access to patient records from another facility can help physicians identify discrepancies such as dramatic changes in weight or height. The Federal Trade Commission offers a few tips to keep you from becoming a victim of medical identity theft. If you decide to share your information online, look for a lock icon on the browser s status bar or a URL that begins https: the s is for secure. Don t share medical or insurance information by phone or unless you initiated the contact and know who you re dealing with Howell St. Suite 700 Dallas, Texas Main Fax

3 Keep paper and electronic copies of your medical and health insurance records in a safe place. Shred outdated health insurance forms, prescription and physician statements, and the labels from prescription bottles before you throw them out. Before you provide sensitive personal information to a website that asks for your Social Security number, insurance account numbers, or details about your health, find out why it s needed, how it will be kept safe, whether it will be shared, and with whom. Read the Privacy Policy on the website. Statistics The Ponemon Institute surveyed 757 patient victims of medical ID theft to find out how they handled the loss of their identity, time taken to resolve the issue and costs. Average time to resolve: 12.1 months Personal cost of resolving theft: $22,346 per victim Those who lost trust in their health care organization as a result: 51% Percentage who had medical records accessed: 20% Percentage with private insurance: 44% Percentage with Medicare: 21% Percentage not insured: 20% At Statistic Brain, a recent study was performed to measure the most current identity theft claims (Brain, 2014). Solutions Don t just assume it s a mistake, Jeremy Miller, a director at Kroll Advisory Solutions, said. The earlier you capture those kinds of things, the easier it is to get it untangled (Dolan, 2012). What you should do if you suspect identity theft: Contact the insurer File a police report Inform the government by filing a medical identify theft complaint with the Federal Trade Commission (FTC) or call the FTC s toll-free hotline at IDTHEFT ( ) Howell St. Suite 700 Dallas, Texas Main Fax

4 Correct improper medical information as soon as it is noticed. The Federal Trade Commission recommends victims to request for each of their health plan and medical providers to send a copy of accounting of disclosures. By law, you are allowed to order one copy from each provider every 12 months. With this you can see who all received a copy of your records from the provider, what information was sent, when it was sent, who received the information and why is was sent. You can now compare records and billings to begin contacting those who should not have access to your records. The Federal Trade Commission outlined the steps to follow when correcting errors in medical records. 1. Contact each health care provider and ask for copies of your medical records. a. Check your state s health privacy laws. Some state laws make it easier to get copies of your medical records. b. Complete the request form and pay any fees required to get copies of your records. If your provider refuses to give you copies of your records because it thinks that would violate the identity thief s privacy rights, you can appeal. Contact the person the provider lists in its Notice of Privacy Practices, the patient representative, or the ombudsman. Explain the situation and ask for your file. If the provider refuses to provide your records within 30 days of your written request, you may complain to the U.S. Department of Health and Human Services Office for Civil Rights. 2. Review your medical records and report any errors to your health care provider. a. Write to your health care provider to report mistakes in your medical records. b. Include a copy of the medical record showing the mistake. c. Explain why this is a mistake and how to correct it. d. Include a copy of your police report or Identity Theft Report. e. Send the letter by certified mail and ask for a return receipt. Your health care provider should respond to your letter within 30 days. It must fix the mistake and notify other health care providers who may have the same mistake in their records. 3. Notify your health insurer and all 3 credit reporting companies. a. Send copies of your police report or Identity Theft Report to your health insurer s fraud department and the 3 nationwide credit reporting companies. 4. Order copies of your credit reports if you haven t already. 5. Consider placing a fraud alert or security freeze on your credit files. 6. Update your files. a. Record the dates you made calls or sent letters. b. Keep copies of letters in your files. Sometimes, the first moment of detection is when tax returns are EFiled and then denied by IRS due to someone else having filed under your I.D. number for the year. The first step to getting your taxes filed is to submit a paper file with Form along with your 1040 and a copy of driver s license to the IRS Howell St. Suite 700 Dallas, Texas Main Fax

5 The IRS will usually assign a pin number to victims file to use as a confirmation of identity in the future. The next step is to check your credit records and ensure that no loans or credit cards have been initiated by someone other than yourself. If further fraud is found, it is usually best to report it to the Credit Bureau. We suggest you also use a credit monitoring service. To find a provider right for you visit org/credit-monitoring-services/. For further advice and support in regaining your identity, contact one of our professionals. References Brain, S. (2014, June 8). Identity Theft / Fraud Statistics. Retrieved from Statistic Brain: com/identity-theft-fraud-statistics/ Coalition Against Insurance Fraud. (n.d.). Medical Identity Theft. Retrieved from Coalition Against Insurance Fraud: Dolan, P. L. (2012, August 6). Medical ID theft: Double danger for doctors. Retrieved from American Medical News : Federal Trade Commission. (2012, August). Medical Identity Theft. Retrieved from Federal Trade Commission: General, I. (n.d.). Retrieved from U.S. Department of Health and Human Services: Ponomon, I. (2012, June). Third Annual Survey on Medical Identity Theft. Retrieved from Ponomon Institute : Howell St. Suite 700 Dallas, Texas Main Fax

MEDICAL IDENTITY THEFT Presented by:

MEDICAL IDENTITY THEFT Presented by: MEDICAL IDENTITY THEFT Presented by: Tami Flemmer, Risk Management Director Melissa Hauer, Corporate Counsel Ernie Thurman, Security Coordinator October 8, 2014 Medical Identity Theft OVERVIEW OF PRESENTATION

More information

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

Credit Matters Credit Concept Workshop Presentation Script (Part II of II)

Credit Matters Credit Concept Workshop Presentation Script (Part II of II) Credit Matters Credit Concept Workshop Presentation Script (Part II of II) (HAND OUT QUIZ PRIOR TO PRESENTATION) Opening Slide: WELCOME BACK TO THE SECOND PRESENTATION OF THE CREDIT CONCEPTS WORKSHOP SERIES.

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You. Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing

More information

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity

More information

More Than Just a DIGITAL SPRING Band-Aid CLEANING. Connie Alarcon

More Than Just a DIGITAL SPRING Band-Aid CLEANING. Connie Alarcon More Than Just a DIGITAL SPRING Band-Aid CLEANING Connie Alarcon Agenda BBB Services Complaints Check BBB Scams Health Care Fraud & Abuse Medical Identity Theft Phone Scams Better Business Bureau BBB Serving

More information

Instructions for Completing the ID Theft Affidavit

Instructions for Completing the ID Theft Affidavit Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for any debts incurred by an identity thief, you must prove to each of the companies where accounts

More information

Take Charge: Fighting Back Against Identity Theft 37

Take Charge: Fighting Back Against Identity Theft 37 Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for any debts incurred by an identity thief, you must prove to each of the companies where accounts

More information

c» BALANCE C:» Financially Empowering You The World of Credit Reports Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You The World of Credit Reports Podcast [Music plays] Nikki: The World of Credit Reports Podcast [Music plays] Nikki: You re listening to world of credit. Hi, I m Nikki, your host for today s podcast. Credit reports and credit scores influence our lives in many

More information

UNIT 3-4 Preventing Identity Theft

UNIT 3-4 Preventing Identity Theft UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information

More information

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director pierson Technological advances of the

More information

Instructions for completing the ID Theft Affidavit

Instructions for completing the ID Theft Affidavit Instructions for completing the ID Theft Affidavit To make certain that you do not become responsible for any debts incurred by an identity thief, you must prove to each of the companies where accounts

More information

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an

More information

Identity Protection 101: Protect your good name from identity theft.

Identity Protection 101: Protect your good name from identity theft. Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social

More information

IDENTITY THEFT PROTECT YOUR MONEY

IDENTITY THEFT PROTECT YOUR MONEY IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that

More information

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity

More information

The York Water Company

The York Water Company The York Water Company Your Rights and Responsibilities as a Water or Sewer Consumer Table of Contents The Pennsylvania Public Utility Commission (PUC) prepared this guide to summarize the regulations

More information

NAU Police Department s Identity Theft Victim s Packet

NAU Police Department s Identity Theft Victim s Packet NAU Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted the NAU Police Department and obtained a police report number

More information

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft: Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Reno Police Department, complete a crime report and obtained a police report case number

More information

IDENTITY THEFT REPORTING

IDENTITY THEFT REPORTING Davis Police Department 2600 Fifth Street - Davis, California 95618-7718 Business: (530) 747-5400 - Fax: (530) 757-7102 - TDD: (530) 757-5666 Administration: (530) 747-5405 - Investigations: (530) 747-5430

More information

Identity Theft What to do if your identity is stolen

Identity Theft What to do if your identity is stolen Identity Theft What to do if your identity is stolen Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 14 years1. It can impose damage that

More information

Protecting Yourself from Fraud including Identity Theft Advanced Level

Protecting Yourself from Fraud including Identity Theft Advanced Level Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial

More information

Medical Identity Theft Prevention Policy

Medical Identity Theft Prevention Policy SUBJECT: NUMBER: EFFECTIVE DATE: SUPERSEDES SPP: APPROVED BY: DISTRIBUTION: Medical Identity Theft Prevention Policy (signature) DATED: I. STATEMENT OF PURPOSE: To define medical identity theft and outline

More information

The Cost of Identity Theft to Business What Business Owners Must Know Now

The Cost of Identity Theft to Business What Business Owners Must Know Now The Cost of Identity Theft to Business What Business Owners Must Know Now An Introduction to the Fair and Accurate Credit Reporting Act (FACTA): What Business Owners Must Know Now It often seems that there

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Revised April 2010 Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso County Sheriff s Office and obtained a police report number

More information

Recognizing Credit Card Fraud

Recognizing Credit Card Fraud 1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended

More information

Instructions for Completing the ID Theft Affidavit

Instructions for Completing the ID Theft Affidavit Instructions for Completing the ID Theft Affidavit To make certain that you do not become responsible for the debts incurred by the identity thief, you must provide proof that you didn t create the debt

More information

Fay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704

Fay Servicing, LLC 901 S. 2 nd St., Suite 201 Springfield, IL 62704 RE: Identity Theft Claim You recently notified Fay Servicing, LLC that you are the victim of identity theft with respect to the above referenced loan (also referred to in this notice as the debt or account

More information

ROCHESTER INSTITUTE OF TECHNOLOGY

ROCHESTER INSTITUTE OF TECHNOLOGY ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3

More information

GREENPATH FINANCIAL WELLNESS SERIES

GREENPATH FINANCIAL WELLNESS SERIES GREENPATH FINANCIAL WELLNESS SERIES IDENTITY THEFT Empowering people to lead financially healthy lives. TABLE OF CONTENTS What is Identity Theft?...2 How Identity Theft Occurs...3 How Identity Thieves

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

Drexel and FMFCU. Presented By

Drexel and FMFCU.   Presented By Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission

More information

Identity Protection Services

Identity Protection Services Identity Protection Services Overview Why are identity protection services being provided? We believe your personal information should stay that way personal. That s why we re taking industry- leading

More information

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should

More information

Identity Theft Prevention Program. FY17 Core Training

Identity Theft Prevention Program. FY17 Core Training Identity Theft Prevention Program FY17 Core Training Course Information Course Title: Identity Theft Prevention Program Regulations/Standards: Approximate Time to Complete: Federal Trade Commission (FTC)

More information

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW The Denver District Attorney's Office has been working closely with the Colorado Bureau of Investigations to provide you the most up-to-date information on the

More information

THE CHILDREN'S MERCY HOSPITAL ADMINISTRATIVE POLICY

THE CHILDREN'S MERCY HOSPITAL ADMINISTRATIVE POLICY THE CHILDREN'S MERCY HOSPITAL ADMINISTRATIVE POLICY TITLE: Identity Theft Prevention Program EFFECTIVE: 11/08 REVISION DATE: REVIEWED WITH NO CHANGES: 12/13 RETIRED: PURPOSE: The Identity Theft Prevention

More information

Chapter 27. Your Credit and the Law pp

Chapter 27. Your Credit and the Law pp Your Credit and the Law pp. 434-447 Learning Objectives After completing this chapter, you ll be able to: 1. Explain how government protects credit rights. 2. Name federal laws that protect consumers.

More information

Three D s of safeguarding your personal data

Three D s of safeguarding your personal data Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D

More information

Chapter 8. Your rights and responsibilities

Chapter 8. Your rights and responsibilities Chapter 8: Your rights and responsibilities 1 Chapter 8. Your rights and responsibilities SECTION 1 Our plan must honor your rights as a member of the plan... 1 Section 1.1 We must provide information

More information

FOX VALLEY ORTHOPEDICS. Identity Compliance Program

FOX VALLEY ORTHOPEDICS. Identity Compliance Program I. ADOPTION OF WRITTEN PROGRAM ( Program ) Fox Valley Orthopedics (the Practice ) adopts this written program to assist in identifying sensitive information, as well as identifying, detecting and mitigating

More information

Identity Theft Solutions

Identity Theft Solutions Identity Theft Solutions Identity Theft Solutions August 12, 2015 2 A Complete IDENTITY THEFT SOLUTION Identity theft is the fastest growing financial crime in America, striking thousands of victims each

More information

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution

More information

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft. PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity

More information

Identity Theft: Help Your Students Avoid This Epidemic

Identity Theft: Help Your Students Avoid This Epidemic Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity

More information

GreenPath Financial Wellness Series

GreenPath Financial Wellness Series GreenPath Financial Wellness Series IDENTITY THEFT Through financial knowledge and expertise, we provide high-quality products and services that enable people to enjoy a better quality of life. Smart financial

More information

Identity theft can occur even if you have been careful about protecting your personal information.

Identity theft can occur even if you have been careful about protecting your personal information. Dear Customer, Identity theft can occur even if you have been careful about protecting your personal information. If you suspect you have been a victim of identity theft, a fraud, or a scam, we have prepared

More information

LEGALSHIELD PRESENTATION. Worry Less. Live More.

LEGALSHIELD PRESENTATION. Worry Less. Live More. LEGALSHIELD PRESENTATION Worry Less. Live More. The Company Established 1972 Revenue approx. $450 million 3.5 million covered lives across U.S.A. and Canada 2.1 million requests for legal assistance annually

More information

What is Identity Theft?

What is Identity Theft? IDENTITY THEFT What is Identity Theft? Identity theft is a growing problem in today s information age. Criminals are becoming more sophisticated in their ability to use your personal information for their

More information

Tax-Related Identity Theft

Tax-Related Identity Theft Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com www.freemanlaw-pllc.com Copyright Freeman

More information

Jason B. Freeman, J.D., CPA

Jason B. Freeman, J.D., CPA Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman

More information

Coverage Determinations, Appeals and Grievances

Coverage Determinations, Appeals and Grievances Coverage Determinations, Appeals and Grievances Filing a grievance (making a complaint) about your prescription coverage Asking for a coverage determination (coverage decision) 60-day formulary change

More information

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and

The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and The Attorney General s Office established the Identity Theft Unit in response to increased identity theft incidents reported by Indiana citizens and to enhance existing efforts to educate Hoosiers about

More information

Fraudulent Check, Credit Card Fraud and ID Theft Guide

Fraudulent Check, Credit Card Fraud and ID Theft Guide Fraudulent Check, Credit Card Fraud and ID Theft Guide COLLECTING BAD CHECKS The police involvement in bad check cases is for the sole purpose of investigating the incident to determine whether or not

More information

SISC PPO 65+ Retiree Medical Coverage Form for Medical and Prescription Drug Benefits (Continuous enrollment in Medicare A&B required)

SISC PPO 65+ Retiree Medical Coverage Form for Medical and Prescription Drug Benefits (Continuous enrollment in Medicare A&B required) District Use Only District Name: SISC PPO 65+ Retiree Medical Coverage Form for Medical and Prescription Drug Benefits (Continuous enrollment in Medicare A&B required) SISC will automatically enroll member(s)

More information

Credit Choosing a credit card: Read the fine print How to tell if you have a credit emergency Protecting yourself against identity theft

Credit Choosing a credit card: Read the fine print How to tell if you have a credit emergency Protecting yourself against identity theft MoTax Human Environmental Sciences Personal Financial Planning missourifamilies.org/money/ Missouri Taxpayer Education Credit Choosing a credit card: Read the fine print How to tell if you have a credit

More information

Second Annual Survey on Medical Identity Theft

Second Annual Survey on Medical Identity Theft Second Annual Survey on Medical Identity Theft Sponsored by Experian s ProtectMyID Independently conducted by Ponemon Institute LLC Publication Date: March 2011 Ponemon Institute Research Report Second

More information

Your Rights and Responsibilities. as a Utility Consumer

Your Rights and Responsibilities. as a Utility Consumer Your Rights and Responsibilities as a Utility Consumer The Pennsylvania Public Utility Commission (PUC) prepared this guide to summarize the regulations regarding Standards and Billing Practices for Residential

More information

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal

More information

Identity fraud explained. How to protect your identity

Identity fraud explained. How to protect your identity How to protect your identity Contents Raising the alarm 3 What is identity fraud? 4 When your identity is in danger 5 Keeping your identity safe 8 Spotting the warning signs 9 Your credit report 10 Expert

More information

SPECIAL REPORT. What to Do If Your Client Is a Victim of Tax-Related Identity Theft

SPECIAL REPORT. What to Do If Your Client Is a Victim of Tax-Related Identity Theft SPECIAL REPORT What to Do If Your Client Is a Victim of Tax-Related Identity Theft What to Do If Your Client Is a Victim of Tax-Related Identity Theft Tax-related identity theft revolves around the fraudulent

More information

Notice to Patients and Job Applicants Regarding Vendor Security Incident

Notice to Patients and Job Applicants Regarding Vendor Security Incident Notice to Patients and Job Applicants Regarding Vendor Security Incident Moore County Hospital District ( MCHD ) understands the importance of protecting personal information. Regrettably, this notice

More information

ID Theft Security. Michael G. Solomon. CISSP PMP CISM

ID Theft Security. Michael G. Solomon. CISSP PMP CISM ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible

More information

11/14/ FNBT FACT ACT

11/14/ FNBT FACT ACT 1 FNBT FACT ACT This class addresses the Fair Credit Reporting Act which governs the collection and use of information considered in connection with granting credit, providing insurance or offering employment.

More information

Notes. The American Center for Credit Education. Promotional Copy. CheckWise by the American Center for Credit Education

Notes. The American Center for Credit Education. Promotional Copy. CheckWise by the American Center for Credit Education The American Center for Credit Education CheckWise by the American Center for Credit Education 2007 by Rushmore Consumer Credit Resource Center (RCCRC) Published by the American Center for Credit Education

More information

Consumer Federation of America Best Practices for Identity Theft Services. March 10, 2011

Consumer Federation of America Best Practices for Identity Theft Services. March 10, 2011 Consumer Federation of America Best Practices for Identity Theft Services March 10, 2011 Consumer Federation of America Best Practices for Identity Theft Services Table of Contents Introduction 3 About

More information

Financial Literacy South Florida State College

Financial Literacy South Florida State College Financial Literacy South Florida State College Financial Literacy This Financial Literacy workshop provides tips on managing money, keeping track of your finances and planning ahead. You will also learn

More information

Personal Finance Unit 2 Chapter Glencoe/McGraw-Hill

Personal Finance Unit 2 Chapter Glencoe/McGraw-Hill 0 Chapter 6 Consumer Credit What You ll Learn Section 6.1 Explain the meaning of consumer credit. Differentiate between closed-end credit and openend credit. Section 6.2 Name the five C s of credit. Identify

More information

Get back your good name. Refuse to be a target of identity crime again.

Get back your good name. Refuse to be a target of identity crime again. Clear Your Good Name After Identity Crime You suspect that someone is using your name and personal identification information for unlawful purposes. This kit can help you resolve your identity crime case

More information

Russell P. Butler

Russell P. Butler Russell P. Butler rbutler@mdcrimevictims.org 301-952-0063 Russell P. Butler National Identity Theft Victim Assistance Network/ Maryland Crime Victims Resource Center, Inc. rbutler@mdcrimevictims.org; 301-952-0063

More information

Identity Theft. A Recovery Plan. FEDERAL TRADE COMMMISSION IdentityTheft.gov

Identity Theft. A Recovery Plan. FEDERAL TRADE COMMMISSION IdentityTheft.gov Identity Theft A Recovery Plan FEDERAL TRADE COMMMISSION IdentityTheft.gov 1 Visit IdentityTheft.gov for our most up-to-date information. The site provides detailed advice to help you fix problems caused

More information

Credit Cards. The Language of Credit. Student Loans. Installment Loans 12/14/2016

Credit Cards. The Language of Credit. Student Loans. Installment Loans 12/14/2016 Quick Response Explain how you think credit cards work. How much do you have to pay every month? What happens if you pay late? What kinds of fees are involved? Unit 4 - Good Debt, Bad Debt: Using Credit

More information

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program

University of Cincinnati FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Identity Theft Prevention Program FACTA Red Flag Policy Program, page 1 of 6 Contents Overview 3 Definition of Terms 3 Covered Accounts..3 List of Red Flags 3 Suspicious Documents...4 Suspicious

More information

Compliance and Fraud, Waste, and Abuse Awareness Training. First Tier, Downstream, and Related Entities

Compliance and Fraud, Waste, and Abuse Awareness Training. First Tier, Downstream, and Related Entities Compliance and Fraud, Waste, and Abuse Awareness Training First Tier, Downstream, and Related Entities 1 Course Outline Overview Purpose of training Effective Compliance program Definition of Fraud, Waste,

More information

IDENTITY THEFT ADDITIONAL INFORMATION FORM Submittal Instructions

IDENTITY THEFT ADDITIONAL INFORMATION FORM Submittal Instructions IDENTITY THEFT ADDITIONAL INFORMATION FORM Submittal Instructions You may disregard the following instructions if no further police investigation is needed because the filing of the online Identity Theft

More information

Marketplace Model Eligibility Notice for 2016 Coverage Special Enrollment Verification Process

Marketplace Model Eligibility Notice for 2016 Coverage Special Enrollment Verification Process Marketplace Model Eligibility Notice for 2016 Coverage Special Enrollment Verification Process Special Enrollment Periods provide an important pathway to coverage for consumers who experience qualifying

More information

Identity Theft.

Identity Theft. Identity Theft www.kofetime.com 1 Some Facts about Identity Theft: 30.8 million Americans have been victims of identity theft in the last three years, including 11.6 million people in the last year alone.

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Slide 1 Identity Theft Prevention Program Welcome to the Identity Theft Prevention Program annual training course. Your personal identification information can be used by individuals seeking to use your

More information

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet:

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet: Before you start Telephone calls and other forms of direct communication: Use the worksheet included in this packet to keep a record of all conversations. When reporting fraud or communicating with law

More information

The Fair Debt Collection Practices Act

The Fair Debt Collection Practices Act The Fair Debt Collection Practices Act The Fair Debt Collection Practices Act... i The Fair Debt Collection Practices Act... 1 Definitions used throughout this document... 1 For purposes of the Fair Debt

More information

What to Know, What to Do Colleen Tressler FTC Division of Consumer & Business Education consumer.ftc.gov IdentityTheft.

What to Know, What to Do Colleen Tressler FTC Division of Consumer & Business Education consumer.ftc.gov IdentityTheft. Child Identity Theft: What to Know, What to Do Colleen Tressler FTC Division of Consumer & Business Education ctressler@ftc.gov consumer.ftc.gov IdentityTheft.gov Definition of Identity Theft Identity

More information

Insurance 101: Understanding your Rights and Responsibilities

Insurance 101: Understanding your Rights and Responsibilities Insurance 101: Understanding your Rights and Responsibilities Village Pediatrics recognizes that health care costs are significant, and insurance premiums (though not reimbursements) have risen rapidly

More information

9/26/2012. Medical Identity Theft. Definition. Types of Medical Identity Theft

9/26/2012. Medical Identity Theft. Definition. Types of Medical Identity Theft Medical Identity Theft Health Care Compliance Association Clinical Practice Compliance Conference October 16, 2012 Julie K. Taitsman, M.D., J.D. Chief Medical Officer Christi Grimm, MPA Special Assistant

More information

Appeals and Grievances: What to Do if You Have Complaints About Your Part D Prescription Drug Benefits

Appeals and Grievances: What to Do if You Have Complaints About Your Part D Prescription Drug Benefits Appeals and Grievances: What to Do if You Have Complaints About Your Part D Prescription Drug Benefits WHAT TO DO IF YOU HAVE COMPLAINTS We encourage you to let us know right away if you have questions,

More information

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN TAKING CHARGE WHAT TO O IF YOUR IENTITY IS STOLEN FEERAL TRAE COMMISSION FTC.GOV/ITHEFT TAKING CHARGE WHAT TO O IF YOUR IENTITY IS STOLEN INTROUCTION IMMEIATE Place an Initial STEPS Fraud Alert Order Your

More information

Selected Terms & Conditions for Wells Fargo Consumer Debit and ATM Cards

Selected Terms & Conditions for Wells Fargo Consumer Debit and ATM Cards Selected Terms & Conditions for Wells Fargo Consumer Debit and ATM s Terms and Conditions effective 04/24/2017. Introduction page 1 Using Your page 2 Using Your Through a Mobile Device page 4 One-Time

More information

Just the facts about proving your identity.

Just the facts about proving your identity. July 2007 Our guides here to help you This guide is part of our Everyday money series. About the Financial Services Authority. Buying a home. Saving Pensions and andpensions andif things investing. retirement.

More information

NOTICE OF PRIVACY PRACTICES ORTHOPEDIC ASSOCIATES OF LANCASTER, LTD.

NOTICE OF PRIVACY PRACTICES ORTHOPEDIC ASSOCIATES OF LANCASTER, LTD. NOTICE OF PRIVACY PRACTICES ORTHOPEDIC ASSOCIATES OF LANCASTER, LTD. Willow Valley Medical Center North Pointe Business Park Spooky Nook Sports Complex 212 Willow Valley Lakes Drive 170 North Pointe Boulevard

More information

Compliance Fraud, Waste and Abuse HIPAA Privacy and Security

Compliance Fraud, Waste and Abuse HIPAA Privacy and Security 2017 Compliance Fraud, Waste and Abuse HIPAA Privacy and Security Table of Contents/Agenda Welcome to General Compliance Training for Providers! Training Objectives: Understand why you need Compliance

More information

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions Barry Altland Director, Partner Engagement Who/What is FPP? A Thank You to

More information

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card

More information

Understanding Credit

Understanding Credit Understanding Credit LAURA STEINBECK DIRECTOR OF BUSINESS DEVELOPMENT, SALLIE MAE 2018 MASFAP CONFERENCE Agenda 2 Credit Management Protect Yourself Understanding Credit Reports Summary: Financial Health

More information

List of Insurance Terms and Definitions for Uniform Translation

List of Insurance Terms and Definitions for Uniform Translation Term actuarial value Affordable Care Act allowed charge Definition The percentage of total average costs for covered benefits that a plan will cover. For example, if a plan has an actuarial value of 70%,

More information

Visa Health Savings Debit Card Agreement and Disclosure

Visa Health Savings Debit Card Agreement and Disclosure Visa Health Savings Debit Card Agreement and Disclosure P.O. Box 45085 Jacksonville, FL 32232-5085 www.vystarcu.org (904) 908-2329 1-866-897-8272 VYSTAR CREDIT UNION VISA HEALTH SAVINGS DEBIT CARD AGREEMENT

More information

Being a Guarantor. This booklet will help you understand all that is involved in being a Guarantor.

Being a Guarantor. This booklet will help you understand all that is involved in being a Guarantor. is a big responsibility and can have serious consequences. It is important to understand exactly what you are getting yourself into and what the impact of signing the agreement may be. can be a helpful

More information