SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
DEPARTMENT OF HEALTH AND HUMAN SERVICES
Centers for Medicare & Medicaid Services

R

Official CMS Information for
Medicare Fee-For-Service Providers

Medicaid Program Integrity:

Preventing Provider Medical Identity Theft
Physicians, other providers, and beneficiaries of Medicare and Medicaid are at risk for
medical identity theft. The Centers for Medicare & Medicaid Services (CMS) is working to
raise awareness among providers and help them protect their medical identities. Medical
identity theft is “the appropriation or misuse of a patient’s or [provider’s] unique medical
identifying information to obtain or bill public or private payers for fraudulent medical goods
or services,” according to S. Agrawal and P. Budetti in their article, “Physician Medical
Identity Theft,” in the “Journal of the American Medical Association.”

Common Provider Medical Identity Theft Schemes
A common provider medical identity theft scheme involves a fraudster
billing services directly in a physician’s or other provider’s name even
though the clinician never provided the service. Using physician and
other provider medical identifiers to refer patients for additional services
and supplies, such as home health services, diagnostic testing, and
medical equipment and supplies, is another common scheme.

Main Provider Risk Factors
The primary risk factor for medical identity theft is provider complicity in fraud schemes.
Providers who voluntarily permit misuse of their identifiers place this information at
significant risk for subsequent theft and can create unintended consequences. Common
examples of ways providers allow the misuse of medical identifiers include:
• Signing referrals for patients they do not know,
• Signing Certificates of Medical Necessity (CMNs) for patients who do not need the
service or supply,
• Signing CMNs even when documentation disputes medical need,
• Signing CMNs for more than what patients actually need, and
• Signing blank referral forms.
Purposeful misuse of medical identifiers can lead to significant consequences,
such as civil monetary penalties, criminal fines and restitution, prison time, and
exclusion from Medicare and Medicaid. Physicians (and other providers) can
be held liable for these actions even without evidence of other fraud.
ICN 908265 May 2012
Medicaid Program Integrity: Preventing Provider Medical Identity Theft
In addition to provider complicity and the voluntary misuse of medical identifiers, inherent
structural risks are associated with provider medical identifiers, such as public access
to National Provider Identifiers (NPIs) and provider license numbers. Other risks include
an organization’s expectation for providers to disclose identifiers when they apply for a
position. The more parties with access to a provider’s medical identifiers, the greater the
risk of exposure for medical identity theft. Examples of high risk exposure include:
• Reassigning medical identifiers for billing purposes,
• Providing medical identifiers to staff, and
• Allowing mid-level practitioners the use of medical identifiers.

Mitigating Risk
Providers are responsible for their medical identifiers
to the extent they can protect them and mitigate their
vulnerability to theft. Four strategies providers can use to
protect themselves and their practices include:
• Actively managing enrollment information with
payers by updating them about material enrollment
changes especially when:
◦ Opening, closing, or moving practice locations;
◦ Separating from an organization; or
◦ Changing banking information;
• Monitoring billing and compliance processes by strengthening policies and
procedures to minimize risks and improve overall program integrity. Policies and
procedures might include:
◦ Adopting sound billing practices (e.g., reviewing remittance notices);
◦ Carefully reading documents before signing them; and
◦ Limiting and monitoring third party use of medical identifiers;
• Controlling unique medical identifiers by taking steps, such as:
◦ Thoroughly training staff on all policies and procedures;
◦ Screening employees;
◦ Securing all information technology; and
◦ Keeping track of all prescription pads; and
• Engaging patients in conversation about the risks of medical identity theft by:
◦ Explaining the impact it can have on them and their medical records;
◦ Looking for signs of potential identity theft; and
◦ Warning patients of the dangers of card sharing.

2
Medicaid Program Integrity: Preventing Provider Medical Identity Theft

Remediation for Victims
The Center for Program Integrity’s (CPI) goal is to proactively identify and help identity
theft victims. CPI can:
• Help absolve the financial problems related to the theft, such as Medicare
overpayments and/or tax obligations; and
• Respond to the needs of legitimate providers.
For additional information about CPI, visit http://www.cms.gov/MedicaidIntegrityProgram/
Downloads/cpiinitiatives.pdf on the CMS website.

Report It
Report suspected medical identity theft to:
• Your Local Law Enforcement
• Your State Medicaid Agency
http://www.cms.gov/Medicare-Medicaid-Coordination/Fraud-Prevention/
FraudAbuseforConsumers/Downloads/smafraudcontacts.pdf
Click on the State where you practice for the appropriate contact information, and
then notify the agency.
• Federal Trade Commission (FTC) Identity Theft Hotline
Phone: 1-877-438-4338 (1-877-ID-THEFT)
TTY: 1-866-653-4261
Website: http://www.ftc.gov/bcp/edu/microsites/idtheft
• U.S. Department of Health & Human Services (HHS),
Office of Inspector General (OIG) Hotline
Phone: 1-800-447-8477 (1-800-HHS-TIPS)
TTY: 1-800-377-4950
Fax: 1-800-223-8164
E-mail: HHSTips@oig.hhs.gov
Website: http://oig.hhs.gov/fraud/report-fraud
• Your Regional HHS Office
http://www.hhs.gov/about/regions
Click on your region for the appropriate contact information, and then notify the
regional office.

Resources
• For additional information and educational materials related to
provider compliance, visit http://www.cms.gov/Outreach-andEducation/Medicare-Learning-Network-MLN/MLNProducts/
ProviderCompliance.html on the CMS website, or scan the Quick
Response (QR) code on the right with your mobile device.
3
Medicaid Program Integrity: Preventing Provider Medical Identity Theft
• To download additional Medicare Learning Network® (MLN) products designed to
educate Medicare and Medicaid providers about medical identity, visit http://www.
cms.gov/Outreach-and-Education/Medicare-Learning-Network-MLN/MLNProducts/
Downloads/SafeMed-ID-Products.pdf on the CMS website. These products include
a web-based training course titled “Safeguarding Your Medical Identity,” which is
approved for Continuing Education (CE) credit. Please note, you must register and
complete a post-assessment test and evaluation to receive Continuing Education
Units (CEUs) or Continuing Medical Education (CME) credit for this course. To
register for this course, go to the MLN Web-Based Training (WBT) web page at
http://www.cms.gov/Outreach-and-Education/Medicare-Learning-Network-MLN/
MLNProducts/WebBasedTraining.html on the CMS website.
• For information on how to report fraud, please visit http://oig.hhs.gov/fraud
on the Internet.
The following resources were used to compile the information in this fact sheet:
• “Physician Medical Identity Theft” by S. Agrawal and P. Budetti in the “Journal of
the American Medical Association,” Volume 307, Number 5, Pages 459 – 460
(February 1, 2012)
http://jama.jamanetwork.com/article.aspx?articleid=1104942
• “Preventing and Detecting Physician Medical Identity Theft” by S. Agrawal, Centers
for Medicare & Medicaid Services, Center for Program Integrity (February 13, 2012;
Retrieved March 20, 2012)

R

Official CMS Information for
Medicare Fee-For-Service Providers

This fact sheet was current at the time it was published or uploaded onto the web. Medicare/Medicaid
policy changes frequently so links to the source documents have been provided within the document for
your reference.
This fact sheet was prepared as a service to the public and is not intended to grant rights or impose
obligations. This fact sheet may contain references or links to statutes, regulations, or other policy materials.
The information provided is only intended to be a general summary. It is not intended to take the place of
either the written law or regulations. We encourage readers to review the specific statutes, regulations, and
other interpretive materials for a full and accurate statement of their contents.
The Medicare Learning Network® (MLN), a registered trademark of CMS, is the brand name for official CMS
educational products and information for Medicare Fee-For-Service Providers. For additional information,
visit the MLN’s web page at http://www.cms.gov/Outreach-and-Education/Medicare-Learning-NetworkMLN/MLNGenInfo on the CMS website.
Your feedback is important to us and we use your suggestions to help us improve our educational
products, services and activities and to develop products, services and activities that better meet your
educational needs. To evaluate Medicare Learning Network® (MLN) products, services and activities you
have participated in, received, or downloaded, please go to http://www.cms.gov/Outreach-and-Education/
Medicare-Learning-Network-MLN/MLNProducts and click on the link called ‘MLN Opinion Page’ in the
left-hand menu and follow the instructions.
Please send your suggestions related to MLN product topics or formats to MLN@cms.hhs.gov.

4

Weitere ähnliche Inhalte

Was ist angesagt?

Direct Boot Camp 2.0 - Tennesse Directories
Direct Boot Camp 2.0 - Tennesse DirectoriesDirect Boot Camp 2.0 - Tennesse Directories
Direct Boot Camp 2.0 - Tennesse Directories
Brian Ahier
 
Mncaa eval report_final_083112
Mncaa eval report_final_083112Mncaa eval report_final_083112
Mncaa eval report_final_083112
soder145
 
red flag Medical_Identity_Theft_Web
red flag Medical_Identity_Theft_Webred flag Medical_Identity_Theft_Web
red flag Medical_Identity_Theft_Web
Dulcey Whyte
 
Revised 2015 CCS-GHPP for Xerox Training v5
Revised 2015 CCS-GHPP for Xerox Training v5Revised 2015 CCS-GHPP for Xerox Training v5
Revised 2015 CCS-GHPP for Xerox Training v5
Harry Chang
 

Was ist angesagt? (20)

Extra help
Extra helpExtra help
Extra help
 
Business Medical Identity Theft faq Health Care Health Plan
Business Medical Identity Theft faq Health Care Health PlanBusiness Medical Identity Theft faq Health Care Health Plan
Business Medical Identity Theft faq Health Care Health Plan
 
Big Data: Implications of Data Mining for Employed Physician Compliance Manag...
Big Data: Implications of Data Mining for Employed Physician Compliance Manag...Big Data: Implications of Data Mining for Employed Physician Compliance Manag...
Big Data: Implications of Data Mining for Employed Physician Compliance Manag...
 
12 medicaid fraud & abuse
12 medicaid fraud & abuse12 medicaid fraud & abuse
12 medicaid fraud & abuse
 
Health Care Technology And Privacy
Health Care Technology And PrivacyHealth Care Technology And Privacy
Health Care Technology And Privacy
 
Direct Boot Camp 2.0 - Tennesse Directories
Direct Boot Camp 2.0 - Tennesse DirectoriesDirect Boot Camp 2.0 - Tennesse Directories
Direct Boot Camp 2.0 - Tennesse Directories
 
Compliance and Legal Risks in Laborist, Surgicalist, and Hospitalist Arrangem...
Compliance and Legal Risks in Laborist, Surgicalist, and Hospitalist Arrangem...Compliance and Legal Risks in Laborist, Surgicalist, and Hospitalist Arrangem...
Compliance and Legal Risks in Laborist, Surgicalist, and Hospitalist Arrangem...
 
Mncaa eval report_final_083112
Mncaa eval report_final_083112Mncaa eval report_final_083112
Mncaa eval report_final_083112
 
The New Era of Individual Responsibility in Health Care Fraud and Abuse
The New Era of Individual Responsibility in Health Care Fraud and AbuseThe New Era of Individual Responsibility in Health Care Fraud and Abuse
The New Era of Individual Responsibility in Health Care Fraud and Abuse
 
red flag Medical_Identity_Theft_Web
red flag Medical_Identity_Theft_Webred flag Medical_Identity_Theft_Web
red flag Medical_Identity_Theft_Web
 
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
Medical Identity Theft – Causes, Consequences, and Cures with Jim Quiggle, Di...
 
MEETING INTERNATIONAL COMPLIANCE: MedTech Europe & APACMed
MEETING INTERNATIONAL COMPLIANCE: MedTech Europe & APACMedMEETING INTERNATIONAL COMPLIANCE: MedTech Europe & APACMed
MEETING INTERNATIONAL COMPLIANCE: MedTech Europe & APACMed
 
Rhcc pharmacy price transparency tool
Rhcc pharmacy price transparency toolRhcc pharmacy price transparency tool
Rhcc pharmacy price transparency tool
 
Revised 2015 CCS-GHPP for Xerox Training v5
Revised 2015 CCS-GHPP for Xerox Training v5Revised 2015 CCS-GHPP for Xerox Training v5
Revised 2015 CCS-GHPP for Xerox Training v5
 
HOW TO DO BILLING FOR MEDICARE AND MEDICAID?
HOW TO DO BILLING FOR MEDICARE AND MEDICAID?HOW TO DO BILLING FOR MEDICARE AND MEDICAID?
HOW TO DO BILLING FOR MEDICARE AND MEDICAID?
 
Universal Patient Identity: eliminating duplicate records, medical identity t...
Universal Patient Identity: eliminating duplicate records, medical identity t...Universal Patient Identity: eliminating duplicate records, medical identity t...
Universal Patient Identity: eliminating duplicate records, medical identity t...
 
Medical Identity Theft
Medical Identity TheftMedical Identity Theft
Medical Identity Theft
 
Guarding Your Client's Valuation from Attack--Dos and Don'ts for Requesting, ...
Guarding Your Client's Valuation from Attack--Dos and Don'ts for Requesting, ...Guarding Your Client's Valuation from Attack--Dos and Don'ts for Requesting, ...
Guarding Your Client's Valuation from Attack--Dos and Don'ts for Requesting, ...
 
Big Data: Implications of Data Mining for Employed Physician Compliance Manag...
Big Data: Implications of Data Mining for Employed Physician Compliance Manag...Big Data: Implications of Data Mining for Employed Physician Compliance Manag...
Big Data: Implications of Data Mining for Employed Physician Compliance Manag...
 
SMMC Long-term Care Provider Webinar: Assisted Living Facilities and Adult F...
SMMC Long-term Care Provider Webinar:  Assisted Living Facilities and Adult F...SMMC Long-term Care Provider Webinar:  Assisted Living Facilities and Adult F...
SMMC Long-term Care Provider Webinar: Assisted Living Facilities and Adult F...
 

Andere mochten auch

Andere mochten auch (14)

Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
Play It Smart with U.S. Chip Payment Transactions
Play It Smart with U.S. Chip Payment TransactionsPlay It Smart with U.S. Chip Payment Transactions
Play It Smart with U.S. Chip Payment Transactions
 
Anatomy of a Cyber-Attack
Anatomy of a Cyber-AttackAnatomy of a Cyber-Attack
Anatomy of a Cyber-Attack
 
DNC Databook 2013
DNC  Databook 2013DNC  Databook 2013
DNC Databook 2013
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
State of Security
State of SecurityState of Security
State of Security
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
Business Identity Theft White Paper
Business Identity Theft White PaperBusiness Identity Theft White Paper
Business Identity Theft White Paper
 
Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013Privacy Safe Guarding Sensitive PII Handbook 2013
Privacy Safe Guarding Sensitive PII Handbook 2013
 
Protecting Consumer Information: Can a Breach be Prevented?
Protecting Consumer Information: Can a Breach be Prevented?Protecting Consumer Information: Can a Breach be Prevented?
Protecting Consumer Information: Can a Breach be Prevented?
 
Cybercrime and Warfare: All that matters
Cybercrime and Warfare: All that mattersCybercrime and Warfare: All that matters
Cybercrime and Warfare: All that matters
 
THE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFTTHE CHANGING FACE OF IDENTITY THEFT
THE CHANGING FACE OF IDENTITY THEFT
 
Sensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident ChecklistSensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident Checklist
 
Business Identity Theft Kit
Business Identity Theft KitBusiness Identity Theft Kit
Business Identity Theft Kit
 

Ähnlich wie Preventing Provider Medical Identity Theft

white-paper-hc-saving-lives-data-quality-en-na-f04
white-paper-hc-saving-lives-data-quality-en-na-f04white-paper-hc-saving-lives-data-quality-en-na-f04
white-paper-hc-saving-lives-data-quality-en-na-f04
Elizabeth (Liz) Whalen
 
Us Health Net Llc
Us Health Net LlcUs Health Net Llc
Us Health Net Llc
rlynes
 

Ähnlich wie Preventing Provider Medical Identity Theft (20)

Health 2.0 Conference Reviews Healthcare Customer Fraud
  Health 2.0 Conference Reviews Healthcare Customer Fraud  Health 2.0 Conference Reviews Healthcare Customer Fraud
Health 2.0 Conference Reviews Healthcare Customer Fraud
 
Medical Billing Alert – Take Measure to Avoid Charges of Fraud
Medical Billing Alert – Take Measure to Avoid Charges of FraudMedical Billing Alert – Take Measure to Avoid Charges of Fraud
Medical Billing Alert – Take Measure to Avoid Charges of Fraud
 
white-paper-hc-saving-lives-data-quality-en-na-f04
white-paper-hc-saving-lives-data-quality-en-na-f04white-paper-hc-saving-lives-data-quality-en-na-f04
white-paper-hc-saving-lives-data-quality-en-na-f04
 
Urgent Care Billing Services, Revenue Cycle & EHR Services
Urgent Care Billing Services, Revenue Cycle & EHR ServicesUrgent Care Billing Services, Revenue Cycle & EHR Services
Urgent Care Billing Services, Revenue Cycle & EHR Services
 
Physician Credentialing- Worth Getting Right to Get Paid.pptx
Physician Credentialing- Worth Getting Right to Get Paid.pptxPhysician Credentialing- Worth Getting Right to Get Paid.pptx
Physician Credentialing- Worth Getting Right to Get Paid.pptx
 
Provider Enrollment for Medicaid – Top Trends for 2023.pptx
Provider Enrollment for Medicaid – Top Trends for 2023.pptxProvider Enrollment for Medicaid – Top Trends for 2023.pptx
Provider Enrollment for Medicaid – Top Trends for 2023.pptx
 
Provider Enrollment for Medicaid – Top Trends for 2023.pdf
Provider Enrollment for Medicaid – Top Trends for 2023.pdfProvider Enrollment for Medicaid – Top Trends for 2023.pdf
Provider Enrollment for Medicaid – Top Trends for 2023.pdf
 
Us Health Net Llc
Us Health Net LlcUs Health Net Llc
Us Health Net Llc
 
Medical billercoder.pdf
Medical billercoder.pdfMedical billercoder.pdf
Medical billercoder.pdf
 
Revenue-Cycle-101.ppt
Revenue-Cycle-101.pptRevenue-Cycle-101.ppt
Revenue-Cycle-101.ppt
 
Home Health Agencies: Understanding Fraud, Waste and Abuse
Home Health Agencies: Understanding Fraud, Waste and AbuseHome Health Agencies: Understanding Fraud, Waste and Abuse
Home Health Agencies: Understanding Fraud, Waste and Abuse
 
Virtual Care
Virtual CareVirtual Care
Virtual Care
 
How To Detect And Prevent Healthcare Fraud? | Health 2.0 Conference
How To Detect And Prevent Healthcare Fraud? | Health 2.0 ConferenceHow To Detect And Prevent Healthcare Fraud? | Health 2.0 Conference
How To Detect And Prevent Healthcare Fraud? | Health 2.0 Conference
 
Health 2.0 Conference Reviews Financial Impacts Of A Healthcare Fraud
Health 2.0 Conference Reviews Financial Impacts Of A Healthcare FraudHealth 2.0 Conference Reviews Financial Impacts Of A Healthcare Fraud
Health 2.0 Conference Reviews Financial Impacts Of A Healthcare Fraud
 
Mastering Pharmacy Medical Billing + Claims Submission
Mastering Pharmacy Medical Billing + Claims SubmissionMastering Pharmacy Medical Billing + Claims Submission
Mastering Pharmacy Medical Billing + Claims Submission
 
Kathryn Flynn
Kathryn Flynn Kathryn Flynn
Kathryn Flynn
 
Unlocking the Essentials Healthcare Provider and Medical Billing Credentialin...
Unlocking the Essentials Healthcare Provider and Medical Billing Credentialin...Unlocking the Essentials Healthcare Provider and Medical Billing Credentialin...
Unlocking the Essentials Healthcare Provider and Medical Billing Credentialin...
 
Denied Claims Resolution In Behavioral Billing.pdf
Denied Claims Resolution In Behavioral Billing.pdfDenied Claims Resolution In Behavioral Billing.pdf
Denied Claims Resolution In Behavioral Billing.pdf
 
7 Proactive Tips To Improve Patient Billing.pptx
7 Proactive Tips To Improve Patient Billing.pptx7 Proactive Tips To Improve Patient Billing.pptx
7 Proactive Tips To Improve Patient Billing.pptx
 
7 Proactive Tips To Improve Patient Billing.pdf
7 Proactive Tips To Improve Patient Billing.pdf7 Proactive Tips To Improve Patient Billing.pdf
7 Proactive Tips To Improve Patient Billing.pdf
 

Mehr von - Mark - Fullbright

Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Preventing Provider Medical Identity Theft

  • 1. DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Medicare & Medicaid Services R Official CMS Information for Medicare Fee-For-Service Providers Medicaid Program Integrity: Preventing Provider Medical Identity Theft Physicians, other providers, and beneficiaries of Medicare and Medicaid are at risk for medical identity theft. The Centers for Medicare & Medicaid Services (CMS) is working to raise awareness among providers and help them protect their medical identities. Medical identity theft is “the appropriation or misuse of a patient’s or [provider’s] unique medical identifying information to obtain or bill public or private payers for fraudulent medical goods or services,” according to S. Agrawal and P. Budetti in their article, “Physician Medical Identity Theft,” in the “Journal of the American Medical Association.” Common Provider Medical Identity Theft Schemes A common provider medical identity theft scheme involves a fraudster billing services directly in a physician’s or other provider’s name even though the clinician never provided the service. Using physician and other provider medical identifiers to refer patients for additional services and supplies, such as home health services, diagnostic testing, and medical equipment and supplies, is another common scheme. Main Provider Risk Factors The primary risk factor for medical identity theft is provider complicity in fraud schemes. Providers who voluntarily permit misuse of their identifiers place this information at significant risk for subsequent theft and can create unintended consequences. Common examples of ways providers allow the misuse of medical identifiers include: • Signing referrals for patients they do not know, • Signing Certificates of Medical Necessity (CMNs) for patients who do not need the service or supply, • Signing CMNs even when documentation disputes medical need, • Signing CMNs for more than what patients actually need, and • Signing blank referral forms. Purposeful misuse of medical identifiers can lead to significant consequences, such as civil monetary penalties, criminal fines and restitution, prison time, and exclusion from Medicare and Medicaid. Physicians (and other providers) can be held liable for these actions even without evidence of other fraud. ICN 908265 May 2012
  • 2. Medicaid Program Integrity: Preventing Provider Medical Identity Theft In addition to provider complicity and the voluntary misuse of medical identifiers, inherent structural risks are associated with provider medical identifiers, such as public access to National Provider Identifiers (NPIs) and provider license numbers. Other risks include an organization’s expectation for providers to disclose identifiers when they apply for a position. The more parties with access to a provider’s medical identifiers, the greater the risk of exposure for medical identity theft. Examples of high risk exposure include: • Reassigning medical identifiers for billing purposes, • Providing medical identifiers to staff, and • Allowing mid-level practitioners the use of medical identifiers. Mitigating Risk Providers are responsible for their medical identifiers to the extent they can protect them and mitigate their vulnerability to theft. Four strategies providers can use to protect themselves and their practices include: • Actively managing enrollment information with payers by updating them about material enrollment changes especially when: ◦ Opening, closing, or moving practice locations; ◦ Separating from an organization; or ◦ Changing banking information; • Monitoring billing and compliance processes by strengthening policies and procedures to minimize risks and improve overall program integrity. Policies and procedures might include: ◦ Adopting sound billing practices (e.g., reviewing remittance notices); ◦ Carefully reading documents before signing them; and ◦ Limiting and monitoring third party use of medical identifiers; • Controlling unique medical identifiers by taking steps, such as: ◦ Thoroughly training staff on all policies and procedures; ◦ Screening employees; ◦ Securing all information technology; and ◦ Keeping track of all prescription pads; and • Engaging patients in conversation about the risks of medical identity theft by: ◦ Explaining the impact it can have on them and their medical records; ◦ Looking for signs of potential identity theft; and ◦ Warning patients of the dangers of card sharing. 2
  • 3. Medicaid Program Integrity: Preventing Provider Medical Identity Theft Remediation for Victims The Center for Program Integrity’s (CPI) goal is to proactively identify and help identity theft victims. CPI can: • Help absolve the financial problems related to the theft, such as Medicare overpayments and/or tax obligations; and • Respond to the needs of legitimate providers. For additional information about CPI, visit http://www.cms.gov/MedicaidIntegrityProgram/ Downloads/cpiinitiatives.pdf on the CMS website. Report It Report suspected medical identity theft to: • Your Local Law Enforcement • Your State Medicaid Agency http://www.cms.gov/Medicare-Medicaid-Coordination/Fraud-Prevention/ FraudAbuseforConsumers/Downloads/smafraudcontacts.pdf Click on the State where you practice for the appropriate contact information, and then notify the agency. • Federal Trade Commission (FTC) Identity Theft Hotline Phone: 1-877-438-4338 (1-877-ID-THEFT) TTY: 1-866-653-4261 Website: http://www.ftc.gov/bcp/edu/microsites/idtheft • U.S. Department of Health & Human Services (HHS), Office of Inspector General (OIG) Hotline Phone: 1-800-447-8477 (1-800-HHS-TIPS) TTY: 1-800-377-4950 Fax: 1-800-223-8164 E-mail: HHSTips@oig.hhs.gov Website: http://oig.hhs.gov/fraud/report-fraud • Your Regional HHS Office http://www.hhs.gov/about/regions Click on your region for the appropriate contact information, and then notify the regional office. Resources • For additional information and educational materials related to provider compliance, visit http://www.cms.gov/Outreach-andEducation/Medicare-Learning-Network-MLN/MLNProducts/ ProviderCompliance.html on the CMS website, or scan the Quick Response (QR) code on the right with your mobile device. 3
  • 4. Medicaid Program Integrity: Preventing Provider Medical Identity Theft • To download additional Medicare Learning Network® (MLN) products designed to educate Medicare and Medicaid providers about medical identity, visit http://www. cms.gov/Outreach-and-Education/Medicare-Learning-Network-MLN/MLNProducts/ Downloads/SafeMed-ID-Products.pdf on the CMS website. These products include a web-based training course titled “Safeguarding Your Medical Identity,” which is approved for Continuing Education (CE) credit. Please note, you must register and complete a post-assessment test and evaluation to receive Continuing Education Units (CEUs) or Continuing Medical Education (CME) credit for this course. To register for this course, go to the MLN Web-Based Training (WBT) web page at http://www.cms.gov/Outreach-and-Education/Medicare-Learning-Network-MLN/ MLNProducts/WebBasedTraining.html on the CMS website. • For information on how to report fraud, please visit http://oig.hhs.gov/fraud on the Internet. The following resources were used to compile the information in this fact sheet: • “Physician Medical Identity Theft” by S. Agrawal and P. Budetti in the “Journal of the American Medical Association,” Volume 307, Number 5, Pages 459 – 460 (February 1, 2012) http://jama.jamanetwork.com/article.aspx?articleid=1104942 • “Preventing and Detecting Physician Medical Identity Theft” by S. Agrawal, Centers for Medicare & Medicaid Services, Center for Program Integrity (February 13, 2012; Retrieved March 20, 2012) R Official CMS Information for Medicare Fee-For-Service Providers This fact sheet was current at the time it was published or uploaded onto the web. Medicare/Medicaid policy changes frequently so links to the source documents have been provided within the document for your reference. This fact sheet was prepared as a service to the public and is not intended to grant rights or impose obligations. This fact sheet may contain references or links to statutes, regulations, or other policy materials. The information provided is only intended to be a general summary. It is not intended to take the place of either the written law or regulations. We encourage readers to review the specific statutes, regulations, and other interpretive materials for a full and accurate statement of their contents. The Medicare Learning Network® (MLN), a registered trademark of CMS, is the brand name for official CMS educational products and information for Medicare Fee-For-Service Providers. For additional information, visit the MLN’s web page at http://www.cms.gov/Outreach-and-Education/Medicare-Learning-NetworkMLN/MLNGenInfo on the CMS website. Your feedback is important to us and we use your suggestions to help us improve our educational products, services and activities and to develop products, services and activities that better meet your educational needs. To evaluate Medicare Learning Network® (MLN) products, services and activities you have participated in, received, or downloaded, please go to http://www.cms.gov/Outreach-and-Education/ Medicare-Learning-Network-MLN/MLNProducts and click on the link called ‘MLN Opinion Page’ in the left-hand menu and follow the instructions. Please send your suggestions related to MLN product topics or formats to MLN@cms.hhs.gov. 4