SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Medical
Identity
theft
FAQs for Health Care
Providers and Health Plans

Federal Trade Commission | business.ftc.gov
Although identity theft is usually associated with financial
transactions, it also happens in the context of medical care.
According to the Federal Trade Commission (FTC), medical
identity theft occurs when someone uses another person’s name
or insurance information to get medical treatment, prescription
drugs or surgery. It also happens when dishonest people working in a medical setting use another person’s information to
submit false bills to insurance companies.
Medical identity theft is a concern for patients, health care
providers, and health plans. Health care providers and insurers are asking how they can minimize the risk and help their
patients if they’re victimized. Here are the FTC’s answers to
those questions.

?

How would people know if they're
victims of medical identity theft?

Victims may:
●●

get a bill for medical services they didn’t receive;

●●

be contacted by a debt collector about medical debt they
don’t owe;

●●

see medical collection notices on their credit report that
they don’t recognize;

●●

find erroneous listings of office visits or treatments on
their explanation of benefits (EOB);

●●

be told by their health plan that they’ve reached their
limit on benefits; or

●●

be denied insurance because their medical records show a
condition they don’t have.

1
?

What should I do if I learn that a
patient may be a victim of medical
identity theft?

Conduct an investigation. For example, if your billing

department gets a call from a patient who claims she was billed
for services she didn’t receive, review your records relating to
the services performed and any supporting documentation that
verifies the identity of the person receiving the services. You also
should review the patient’s medical record for inconsistencies.
If you determine there was medical identity theft, notify everyone who accessed the patient’s medical or billing records. Tell
them what information is inaccurate in the patient’s files, and
ask them to correct the records.

Understand your obligations under the Fair Credit
Reporting Act (FCRA). If you report debts to credit report-

ing companies, determine how the identity theft affects your
responsibilities under the FCRA. For example, if the patient
gives you an identity theft report detailing the theft, the FCRA
says you can’t report any debt associated with the theft to the
credit reporting companies. An identity theft report is a police
report that contains enough detail for the credit reporting companies and the businesses involved to verify that the consumer
is a victim. The report also states which accounts and inaccurate
information resulted from the theft.
For more information about your obligations under the FCRA,
visit www.ftc.gov/idtheft. You also may wish to read the Notice
to Furnishers of Information: Obligations of Furnishers Under
the FCRA (www.ftc.gov/os/2004/11/041119factaappg.pdf)
2
and Credit Reports: What Information Providers Need to Know
(http://business.ftc.gov/documents/bus33-credit-reportswhat-information-providers-need-know).

Review your data security practices. Even if the informa-

tion used to commit the fraud didn’t come from your organization, it’s a good reminder that you need to periodically review
your data security practices and your compliance with the information safeguard provisions of the Health Insurance Portability
and Accountability Act (HIPAA) Privacy and Security Rules.
For more information, see Protecting Personal Information:
A Guide for Business (www.ftc.gov/infosecurity) and guidance from the Department of Health and Human Services on
HIPAA compliance, at www.hhs.gov/ocr/privacy/hipaa/
understanding/coveredentities/index.html.

Provide any necessary breach notifications. If your

investigation reveals that your organization improperly used
or shared protected health information (for example, if an
employee improperly used health information to commit
medical identity theft or if health information was improperly
shared with an identity thief ), you should determine whether
a breach occurred under the HIPAA Breach Notification Rule
(45 CFR part 164 subpart D) or any applicable state breach
notification law.

3
?

What should I tell a patient who's a
victim of medical identity theft?

Here are some practical tips to help your patient correct
medical, billing, and financial records.

If you are covered by HIPAA, make sure the patient has
a copy of your Notice of Privacy Practices. The Notice

should include contact information for someone in your
organization who can respond to questions or concerns from
patients about the privacy of their health information. You also
may put the person in touch with a patient representative or
ombudsman.

Advise the victim to take advantage of his rights under
the HIPAA Privacy Rule.

✓

The HIPAA Privacy Rule gives people the right to
copies of their records maintained by covered health
plans and medical providers. Patients may ask for copies

of their medical and billing records to help identify the
impact of the theft, and to review their records for inaccuracies before seeking additional medical care. There is
no central source for medical records, so patients need to
contact each provider they do business with – including
doctors, clinics, hospitals, pharmacies, laboratories and
health plans. For example, if a thief got a prescription filled
in your patient’s name, the victim may want the record
from the pharmacy that filled the prescription and the
health care provider who wrote the prescription. Explain
that there may be fees and mailing costs to get copies of
medical or billing files.

4
Some medical providers and health plans believe they
would be violating the identity thief ’s HIPAA privacy
rights if they gave victims copies of their own records.
That’s not true. Even in this situation, patients have the
right to get a copy of their records.

✓

Patients have the right to have their medical and billing records amended or corrected. Encourage patients

to write to their health plan or provider to dispute the
inaccurate information. Tell them to include copies (they
should keep the originals) of any documents that support
their position. Their letter should identify each disputed
item, the reasons for disputing it, and a request that each
error be corrected or deleted. Patients may want to include
a copy of their medical or billing record with the items in
question circled.
The originator of the information must correct the inaccurate or incomplete information, and notify other parties, like labs or other health care providers, that it knows
received the incorrect information. If an investigation
doesn’t resolve the dispute, patients can ask that an explanation of the dispute be included in their records.

✓

Patients have the right to an accounting of disclosures from their medical providers and health plans.
An accounting of disclosures may help indicate to patients
whether there has been an inappropriate release of their
medical information. An accounting is a report of certain
disclosures made of the patient’s medical information
by the medical provider or health plan. Although some
disclosures that occur often or as a matter of routine – for
example, a doctor’s disclosure of treatment information to
another health care provider or payment information to an
5
insurer for reimbursement – do not need to be included in
the accounting, it would include information that may be
helpful, like misdirected faxes or e-mails or any information released based on an invalid patient authorization.
The law allows your patients to order one free copy of the
accounting from each of their providers and health plans
every 12 months. The accounting is a record of:
●●
●●

the name of the person or entity who received the
information;

●●

a brief description of the information disclosed; and

●●

✓

the date of the disclosure;

a brief statement of the purpose of the disclosure or a
copy of the request for it.

Patients have the right to file a complaint if they
believe their privacy rights have been violated. For

example, it would be a violation if a medical provider
refused to provide someone with a copy of his or her own
medical record. Patients can file a complaint with the U.S.
Department of Health and Human Services’ Office for
Civil Rights, at www.hhs.gov/ocr.

Encourage your patients to notify their health plan
if they suspect medical identity theft. Getting a list of

benefits paid in their name can help your patients determine
whether there are any fraudulent charges. Patients also should
read their Explanation of Benefits (EOB) statements that health
plans send after treatment, and check that the claims paid match
the care they received. They also should verify that the name
of the provider, the dates of service, and the services provided
are correct. Patients should report discrepancies to their
health plan.
6
Tell your patients to file a complaint with the

FTC at www.ftccomplaintassistant.gov or by phone at
1-877-ID-THEFT (1-877-438-4338); TTY: 1-866-653-4261,
and to check out the information at www.ftc.gov/idtheft. They
also should file a report with local police, and send copies
of the report to their health plan’s fraud department,
their health care provider(s), and the three nationwide
credit reporting companies. Information on how to file a
police report and reach the credit reporting companies is
at www.ftc.gov/idtheft/consumers/defend.html.

Encourage your patients to look for signs of other
misuses of their personal information. Someone who

engages in medical identity theft also may use their victim’s
personal information to commit more traditional forms of
identity theft, like opening a credit card account in the victim’s
name. Tell your patients to order copies of their credit reports,
and to review them carefully. Credit reports are full of information, including what accounts people have and whether
their bill paying is timely. The law requires each of three major
nationwide credit reporting companies – Equifax, Experian and
TransUnion – to give people a free copy of their credit report
each year if they ask for it at www.AnnualCreditReport.com
or from1-877-322-8228.
Once victims have their reports, they should look for inquiries
from companies they didn’t contact, accounts they didn’t open,
and debts on their accounts that they can’t explain. They also
should check that their Social Security number, address(es),
name or initials, and employers’ names are listed correctly.
If they find inaccurate or fraudulent information, they can
visit www.ftc.gov/idtheft to learn how to get it corrected
or removed.

7
?

How can I help my patients
deter, detect, and defend
against medical identity theft?
You can order the FTC’s consumer brochure, Medical Identity
Theft (www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt10.
shtm). It explains how medical identity theft occurs and how
it differs from traditional identity theft, and it offers tips on
how to minimize risk and how to recover if a theft occurs. The
brochure is available in English and Spanish. The FTC encourages you to order free copies at http://bulkorder.ftc.gov, and
to make them available to your patients. You also may link to
the brochure, copy it, or adapt it for your website or newsletter.
Additionally, the HIPAA Privacy and Security Rules include
a number of requirements that, when followed, will substantially reduce the risk of medical identity theft. For example,
the Privacy Rule requires HIPAA covered entities to verify the
identity of persons requesting protected health information
and to have reasonable and appropriate administrative, technical, and physical safeguards to protect the privacy of protected
health information, like training employees on how to handle
and dispose of health information, and how to keep health
information physically secured.

8
About the FTC
The FTC works to prevent fraudulent, deceptive and unfair
business practices in the marketplace and to provide information to help consumers spot, stop and avoid them. To file a complaint or get free information on consumer issues, visit ftc.gov
or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY:
1-866-653-4261. Watch a new video, How to File a Complaint,
at ftc.gov/video to learn more. The FTC enters consumer complaints into the Consumer Sentinel Network, a secure online
database and investigative tool used by hundreds of civil and
criminal law enforcement agencies in the U.S. and abroad.

Opportunity to Comment
The National Small Business Ombudsman and 10 Regional
Fairness Boards collect comments from small businesses
about federal compliance and enforcement activities. Each
year, the Ombudsman evaluates the conduct of these activities and rates each agency’s responsiveness to small businesses.
Small businesses can comment to the Ombudsman without
fear of reprisal. To comment, call toll-free 1-888-REGFAIR
(1-888-734-3247) or go to www.sba.gov/ombudsman.

9
Federal Trade Commission
BCP Business Center
business.ftc.gov
January 2011

Weitere ähnliche Inhalte

Was ist angesagt?

Insurance eligibility verification – steps to reduce claim denials
Insurance eligibility verification – steps to reduce claim denialsInsurance eligibility verification – steps to reduce claim denials
Insurance eligibility verification – steps to reduce claim denialsOutsource Strategies International
 
Chapter 3 health fraud
Chapter 3 health fraudChapter 3 health fraud
Chapter 3 health frauddlhammond
 
12 medicaid fraud & abuse
12 medicaid fraud & abuse12 medicaid fraud & abuse
12 medicaid fraud & abuseJasonPickerill1
 
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...RightPatient®
 
Preventing Fraud, Waste, and Abuse in Health Care
Preventing Fraud, Waste, and Abuse in Health CarePreventing Fraud, Waste, and Abuse in Health Care
Preventing Fraud, Waste, and Abuse in Health CareDr. Zabian Crosby, D.H.Ed.
 
Preventing Provider Medical Identity Theft
Preventing Provider Medical Identity TheftPreventing Provider Medical Identity Theft
Preventing Provider Medical Identity Theft- Mark - Fullbright
 
MHS NOPP - 1 OCT 13
MHS NOPP - 1 OCT 13MHS NOPP - 1 OCT 13
MHS NOPP - 1 OCT 131 SOMDG
 
Client Form - HIPPA form
Client Form - HIPPA formClient Form - HIPPA form
Client Form - HIPPA formMarket JD, Inc.
 
Medical Billing Work Flow by Sidhant Raj
Medical Billing Work Flow by Sidhant RajMedical Billing Work Flow by Sidhant Raj
Medical Billing Work Flow by Sidhant RajSidhantloveraj
 
CSFA medical billing[684]
CSFA  medical billing[684]CSFA  medical billing[684]
CSFA medical billing[684]Gary Hargreaves
 
Phx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePhx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePHXONLINE
 
Fraud, Waste & Abuse in Health Care
Fraud, Waste & Abuse in Health CareFraud, Waste & Abuse in Health Care
Fraud, Waste & Abuse in Health CareGreenway Health
 
Medical Billing for Pharmacists
Medical Billing for PharmacistsMedical Billing for Pharmacists
Medical Billing for PharmacistsJessica Parker
 
Jody Jackson resume 2015 revised
Jody Jackson resume 2015 revisedJody Jackson resume 2015 revised
Jody Jackson resume 2015 revisedJody Jackson
 

Was ist angesagt? (20)

DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 
Redflags
RedflagsRedflags
Redflags
 
Insurance eligibility verification – steps to reduce claim denials
Insurance eligibility verification – steps to reduce claim denialsInsurance eligibility verification – steps to reduce claim denials
Insurance eligibility verification – steps to reduce claim denials
 
Chapter 3 health fraud
Chapter 3 health fraudChapter 3 health fraud
Chapter 3 health fraud
 
Pap form
Pap formPap form
Pap form
 
12 medicaid fraud & abuse
12 medicaid fraud & abuse12 medicaid fraud & abuse
12 medicaid fraud & abuse
 
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
 
Preventing Fraud, Waste, and Abuse in Health Care
Preventing Fraud, Waste, and Abuse in Health CarePreventing Fraud, Waste, and Abuse in Health Care
Preventing Fraud, Waste, and Abuse in Health Care
 
Preventing Provider Medical Identity Theft
Preventing Provider Medical Identity TheftPreventing Provider Medical Identity Theft
Preventing Provider Medical Identity Theft
 
MHS NOPP - 1 OCT 13
MHS NOPP - 1 OCT 13MHS NOPP - 1 OCT 13
MHS NOPP - 1 OCT 13
 
Client Form - HIPPA form
Client Form - HIPPA formClient Form - HIPPA form
Client Form - HIPPA form
 
Medical Billing Work Flow by Sidhant Raj
Medical Billing Work Flow by Sidhant RajMedical Billing Work Flow by Sidhant Raj
Medical Billing Work Flow by Sidhant Raj
 
Hipaa fillable
Hipaa fillableHipaa fillable
Hipaa fillable
 
CSFA medical billing[684]
CSFA  medical billing[684]CSFA  medical billing[684]
CSFA medical billing[684]
 
Phx Fraud And Abuse Training Module
Phx Fraud And Abuse Training ModulePhx Fraud And Abuse Training Module
Phx Fraud And Abuse Training Module
 
Fraud, Waste & Abuse in Health Care
Fraud, Waste & Abuse in Health CareFraud, Waste & Abuse in Health Care
Fraud, Waste & Abuse in Health Care
 
Medical Billing for Pharmacists
Medical Billing for PharmacistsMedical Billing for Pharmacists
Medical Billing for Pharmacists
 
What is Medical Negligence By Dr. Ghazala Shaikh
What is Medical Negligence By Dr. Ghazala ShaikhWhat is Medical Negligence By Dr. Ghazala Shaikh
What is Medical Negligence By Dr. Ghazala Shaikh
 
Jody Jackson resume 2015 revised
Jody Jackson resume 2015 revisedJody Jackson resume 2015 revised
Jody Jackson resume 2015 revised
 
Dilemma #6
Dilemma #6Dilemma #6
Dilemma #6
 

Ähnlich wie Business Medical Identity Theft faq Health Care Health Plan

Developing healthcare finance fraud (2)
Developing healthcare finance fraud (2)Developing healthcare finance fraud (2)
Developing healthcare finance fraud (2)Modupe Sarratt
 
Most common reasons for medical billing claims denial
Most common reasons for medical billing claims denialMost common reasons for medical billing claims denial
Most common reasons for medical billing claims denialMGSI - Medical Group Services
 
2hourhealthcarefraud
2hourhealthcarefraud2hourhealthcarefraud
2hourhealthcarefraudcccpfc
 
This training program is designed to introduce staff
This training program is designed to introduce staffThis training program is designed to introduce staff
This training program is designed to introduce staffsawanda
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft- Mark - Fullbright
 
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt... The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...Health 2Conf
 
http1500cms.comBECAUSE THIS FORM IS USED BY VARIOUS .docx
http1500cms.comBECAUSE THIS FORM IS USED BY VARIOUS .docxhttp1500cms.comBECAUSE THIS FORM IS USED BY VARIOUS .docx
http1500cms.comBECAUSE THIS FORM IS USED BY VARIOUS .docxpooleavelina
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy PracticesSpringfield Clinic
 
Dorland Webinar Slide Managed Care
Dorland Webinar Slide Managed CareDorland Webinar Slide Managed Care
Dorland Webinar Slide Managed Caresusie4050
 
Updated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy RuleUpdated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy RuleJames Pekarek
 
Most common reasons for medical billing claim denial
Most common reasons for medical billing claim denialMost common reasons for medical billing claim denial
Most common reasons for medical billing claim denialMGSI - Medical Group Services
 
2022 Fraud, Waste, & Abuse Training
2022 Fraud, Waste, & Abuse Training2022 Fraud, Waste, & Abuse Training
2022 Fraud, Waste, & Abuse TrainingWindstoneHealth
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacykendale
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA BasicsKarna *
 
Pricing Transparency In Healthcare Reform
Pricing Transparency In Healthcare ReformPricing Transparency In Healthcare Reform
Pricing Transparency In Healthcare ReformDr. Sharon Zang
 

Ähnlich wie Business Medical Identity Theft faq Health Care Health Plan (20)

Developing healthcare finance fraud (2)
Developing healthcare finance fraud (2)Developing healthcare finance fraud (2)
Developing healthcare finance fraud (2)
 
Most common reasons for medical billing claims denial
Most common reasons for medical billing claims denialMost common reasons for medical billing claims denial
Most common reasons for medical billing claims denial
 
2hourhealthcarefraud
2hourhealthcarefraud2hourhealthcarefraud
2hourhealthcarefraud
 
Hippa
HippaHippa
Hippa
 
This training program is designed to introduce staff
This training program is designed to introduce staffThis training program is designed to introduce staff
This training program is designed to introduce staff
 
Fifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity TheftFifth Annual Study on Medical Identity Theft
Fifth Annual Study on Medical Identity Theft
 
Mhpr fraud waste and abuse training for providers
Mhpr fraud waste and abuse training for providersMhpr fraud waste and abuse training for providers
Mhpr fraud waste and abuse training for providers
 
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt... The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
The Financial Impact Of Medical Identity Fraud On Patients: A Guide By Healt...
 
HIPAA Complaince
HIPAA ComplainceHIPAA Complaince
HIPAA Complaince
 
http1500cms.comBECAUSE THIS FORM IS USED BY VARIOUS .docx
http1500cms.comBECAUSE THIS FORM IS USED BY VARIOUS .docxhttp1500cms.comBECAUSE THIS FORM IS USED BY VARIOUS .docx
http1500cms.comBECAUSE THIS FORM IS USED BY VARIOUS .docx
 
Data Security and Privacy Practices
Data Security and Privacy PracticesData Security and Privacy Practices
Data Security and Privacy Practices
 
Dorland Webinar Slide Managed Care
Dorland Webinar Slide Managed CareDorland Webinar Slide Managed Care
Dorland Webinar Slide Managed Care
 
Updated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy RuleUpdated modifications to the HIPAA Privacy Rule
Updated modifications to the HIPAA Privacy Rule
 
Most common reasons for medical billing claim denial
Most common reasons for medical billing claim denialMost common reasons for medical billing claim denial
Most common reasons for medical billing claim denial
 
2022 Fraud, Waste, & Abuse Training
2022 Fraud, Waste, & Abuse Training2022 Fraud, Waste, & Abuse Training
2022 Fraud, Waste, & Abuse Training
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
Confidentiality & privacy
Confidentiality & privacyConfidentiality & privacy
Confidentiality & privacy
 
HIPAA Basics
HIPAA BasicsHIPAA Basics
HIPAA Basics
 
Pricing Transparency In Healthcare Reform
Pricing Transparency In Healthcare ReformPricing Transparency In Healthcare Reform
Pricing Transparency In Healthcare Reform
 
Chapter 3: Ethics
Chapter 3: EthicsChapter 3: Ethics
Chapter 3: Ethics
 

Mehr von - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Kürzlich hochgeladen

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 

Kürzlich hochgeladen (20)

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 

Business Medical Identity Theft faq Health Care Health Plan

  • 1. Medical Identity theft FAQs for Health Care Providers and Health Plans Federal Trade Commission | business.ftc.gov
  • 2.
  • 3. Although identity theft is usually associated with financial transactions, it also happens in the context of medical care. According to the Federal Trade Commission (FTC), medical identity theft occurs when someone uses another person’s name or insurance information to get medical treatment, prescription drugs or surgery. It also happens when dishonest people working in a medical setting use another person’s information to submit false bills to insurance companies. Medical identity theft is a concern for patients, health care providers, and health plans. Health care providers and insurers are asking how they can minimize the risk and help their patients if they’re victimized. Here are the FTC’s answers to those questions. ? How would people know if they're victims of medical identity theft? Victims may: ●● get a bill for medical services they didn’t receive; ●● be contacted by a debt collector about medical debt they don’t owe; ●● see medical collection notices on their credit report that they don’t recognize; ●● find erroneous listings of office visits or treatments on their explanation of benefits (EOB); ●● be told by their health plan that they’ve reached their limit on benefits; or ●● be denied insurance because their medical records show a condition they don’t have. 1
  • 4. ? What should I do if I learn that a patient may be a victim of medical identity theft? Conduct an investigation. For example, if your billing department gets a call from a patient who claims she was billed for services she didn’t receive, review your records relating to the services performed and any supporting documentation that verifies the identity of the person receiving the services. You also should review the patient’s medical record for inconsistencies. If you determine there was medical identity theft, notify everyone who accessed the patient’s medical or billing records. Tell them what information is inaccurate in the patient’s files, and ask them to correct the records. Understand your obligations under the Fair Credit Reporting Act (FCRA). If you report debts to credit report- ing companies, determine how the identity theft affects your responsibilities under the FCRA. For example, if the patient gives you an identity theft report detailing the theft, the FCRA says you can’t report any debt associated with the theft to the credit reporting companies. An identity theft report is a police report that contains enough detail for the credit reporting companies and the businesses involved to verify that the consumer is a victim. The report also states which accounts and inaccurate information resulted from the theft. For more information about your obligations under the FCRA, visit www.ftc.gov/idtheft. You also may wish to read the Notice to Furnishers of Information: Obligations of Furnishers Under the FCRA (www.ftc.gov/os/2004/11/041119factaappg.pdf) 2
  • 5. and Credit Reports: What Information Providers Need to Know (http://business.ftc.gov/documents/bus33-credit-reportswhat-information-providers-need-know). Review your data security practices. Even if the informa- tion used to commit the fraud didn’t come from your organization, it’s a good reminder that you need to periodically review your data security practices and your compliance with the information safeguard provisions of the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security Rules. For more information, see Protecting Personal Information: A Guide for Business (www.ftc.gov/infosecurity) and guidance from the Department of Health and Human Services on HIPAA compliance, at www.hhs.gov/ocr/privacy/hipaa/ understanding/coveredentities/index.html. Provide any necessary breach notifications. If your investigation reveals that your organization improperly used or shared protected health information (for example, if an employee improperly used health information to commit medical identity theft or if health information was improperly shared with an identity thief ), you should determine whether a breach occurred under the HIPAA Breach Notification Rule (45 CFR part 164 subpart D) or any applicable state breach notification law. 3
  • 6. ? What should I tell a patient who's a victim of medical identity theft? Here are some practical tips to help your patient correct medical, billing, and financial records. If you are covered by HIPAA, make sure the patient has a copy of your Notice of Privacy Practices. The Notice should include contact information for someone in your organization who can respond to questions or concerns from patients about the privacy of their health information. You also may put the person in touch with a patient representative or ombudsman. Advise the victim to take advantage of his rights under the HIPAA Privacy Rule. ✓ The HIPAA Privacy Rule gives people the right to copies of their records maintained by covered health plans and medical providers. Patients may ask for copies of their medical and billing records to help identify the impact of the theft, and to review their records for inaccuracies before seeking additional medical care. There is no central source for medical records, so patients need to contact each provider they do business with – including doctors, clinics, hospitals, pharmacies, laboratories and health plans. For example, if a thief got a prescription filled in your patient’s name, the victim may want the record from the pharmacy that filled the prescription and the health care provider who wrote the prescription. Explain that there may be fees and mailing costs to get copies of medical or billing files. 4
  • 7. Some medical providers and health plans believe they would be violating the identity thief ’s HIPAA privacy rights if they gave victims copies of their own records. That’s not true. Even in this situation, patients have the right to get a copy of their records. ✓ Patients have the right to have their medical and billing records amended or corrected. Encourage patients to write to their health plan or provider to dispute the inaccurate information. Tell them to include copies (they should keep the originals) of any documents that support their position. Their letter should identify each disputed item, the reasons for disputing it, and a request that each error be corrected or deleted. Patients may want to include a copy of their medical or billing record with the items in question circled. The originator of the information must correct the inaccurate or incomplete information, and notify other parties, like labs or other health care providers, that it knows received the incorrect information. If an investigation doesn’t resolve the dispute, patients can ask that an explanation of the dispute be included in their records. ✓ Patients have the right to an accounting of disclosures from their medical providers and health plans. An accounting of disclosures may help indicate to patients whether there has been an inappropriate release of their medical information. An accounting is a report of certain disclosures made of the patient’s medical information by the medical provider or health plan. Although some disclosures that occur often or as a matter of routine – for example, a doctor’s disclosure of treatment information to another health care provider or payment information to an 5
  • 8. insurer for reimbursement – do not need to be included in the accounting, it would include information that may be helpful, like misdirected faxes or e-mails or any information released based on an invalid patient authorization. The law allows your patients to order one free copy of the accounting from each of their providers and health plans every 12 months. The accounting is a record of: ●● ●● the name of the person or entity who received the information; ●● a brief description of the information disclosed; and ●● ✓ the date of the disclosure; a brief statement of the purpose of the disclosure or a copy of the request for it. Patients have the right to file a complaint if they believe their privacy rights have been violated. For example, it would be a violation if a medical provider refused to provide someone with a copy of his or her own medical record. Patients can file a complaint with the U.S. Department of Health and Human Services’ Office for Civil Rights, at www.hhs.gov/ocr. Encourage your patients to notify their health plan if they suspect medical identity theft. Getting a list of benefits paid in their name can help your patients determine whether there are any fraudulent charges. Patients also should read their Explanation of Benefits (EOB) statements that health plans send after treatment, and check that the claims paid match the care they received. They also should verify that the name of the provider, the dates of service, and the services provided are correct. Patients should report discrepancies to their health plan. 6
  • 9. Tell your patients to file a complaint with the FTC at www.ftccomplaintassistant.gov or by phone at 1-877-ID-THEFT (1-877-438-4338); TTY: 1-866-653-4261, and to check out the information at www.ftc.gov/idtheft. They also should file a report with local police, and send copies of the report to their health plan’s fraud department, their health care provider(s), and the three nationwide credit reporting companies. Information on how to file a police report and reach the credit reporting companies is at www.ftc.gov/idtheft/consumers/defend.html. Encourage your patients to look for signs of other misuses of their personal information. Someone who engages in medical identity theft also may use their victim’s personal information to commit more traditional forms of identity theft, like opening a credit card account in the victim’s name. Tell your patients to order copies of their credit reports, and to review them carefully. Credit reports are full of information, including what accounts people have and whether their bill paying is timely. The law requires each of three major nationwide credit reporting companies – Equifax, Experian and TransUnion – to give people a free copy of their credit report each year if they ask for it at www.AnnualCreditReport.com or from1-877-322-8228. Once victims have their reports, they should look for inquiries from companies they didn’t contact, accounts they didn’t open, and debts on their accounts that they can’t explain. They also should check that their Social Security number, address(es), name or initials, and employers’ names are listed correctly. If they find inaccurate or fraudulent information, they can visit www.ftc.gov/idtheft to learn how to get it corrected or removed. 7
  • 10. ? How can I help my patients deter, detect, and defend against medical identity theft? You can order the FTC’s consumer brochure, Medical Identity Theft (www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt10. shtm). It explains how medical identity theft occurs and how it differs from traditional identity theft, and it offers tips on how to minimize risk and how to recover if a theft occurs. The brochure is available in English and Spanish. The FTC encourages you to order free copies at http://bulkorder.ftc.gov, and to make them available to your patients. You also may link to the brochure, copy it, or adapt it for your website or newsletter. Additionally, the HIPAA Privacy and Security Rules include a number of requirements that, when followed, will substantially reduce the risk of medical identity theft. For example, the Privacy Rule requires HIPAA covered entities to verify the identity of persons requesting protected health information and to have reasonable and appropriate administrative, technical, and physical safeguards to protect the privacy of protected health information, like training employees on how to handle and dispose of health information, and how to keep health information physically secured. 8
  • 11. About the FTC The FTC works to prevent fraudulent, deceptive and unfair business practices in the marketplace and to provide information to help consumers spot, stop and avoid them. To file a complaint or get free information on consumer issues, visit ftc.gov or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261. Watch a new video, How to File a Complaint, at ftc.gov/video to learn more. The FTC enters consumer complaints into the Consumer Sentinel Network, a secure online database and investigative tool used by hundreds of civil and criminal law enforcement agencies in the U.S. and abroad. Opportunity to Comment The National Small Business Ombudsman and 10 Regional Fairness Boards collect comments from small businesses about federal compliance and enforcement activities. Each year, the Ombudsman evaluates the conduct of these activities and rates each agency’s responsiveness to small businesses. Small businesses can comment to the Ombudsman without fear of reprisal. To comment, call toll-free 1-888-REGFAIR (1-888-734-3247) or go to www.sba.gov/ombudsman. 9
  • 12. Federal Trade Commission BCP Business Center business.ftc.gov January 2011