SlideShare a Scribd company logo
1 of 13
Covered Entity Requirement to Ensure Business Associates  & Their Vendors Comply with HITECH Accurate Data Partners, LLC
[object Object],[object Object],[object Object],[object Object],[object Object],What we โ€™ ll cover the next few minutes Copyright Accurate Data Partners, LLC.  All rights reserved.  This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use.
People make decisions about you, your clients and your employees that are based on more than the information in a Credit Report. It is imperative that Personally Identifiable Information and Non-Public Information be as protected and as accurate as possible. Drivers  License Medical Financial Social  Security Character/  Criminal Five Common Identity Risks
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Why the Demand Potential Points of Misuse with Resulting Corruption of Records Copyright Accurate Data Partners, LLC.  All rights reserved.  This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use.
โ„ข Medical Identity & The DBY Copyright Accurate Data Partners, LLC.  All rights reserved.  This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use. Your Name 1000โ€™s of aggregators Acxiom, Choice Point, LexisNexis, etc. Insurance Companies, Agencies and Agentโ€™s C.L.U.E. DBS, etc... Physician's Data Bases Medical Information Bureau Data Base (MIB)  Blood Bank & Various Lab Data Bases   Drug Store & Pharmacy Data Bases Employerโ€™s Data Bases   Your Address 1000โ€™s of DBS Hospitalโ€™s Various  Data Bases Center for Disease  and Control  (CDC) USB Keys, CD/DVDs  Thumb & Jump Drives DHEC/State Health Dept Local, State Federal Health DBS Billing and Collection DBS and Credit Repository Computers
โ„ข The Web of The DataBased You Copyright Accurate Data Partners, LLC.  All rights reserved.  This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use. Your Name 1000โ€™s of aggregators Your Fingerprints and DNA FBI, State, and Local DBS Your Insurance Claims C.L.U.E. DBS, etc... Your Military Record DOD DBS Your Criminal History NCIC DBS Your Real Estate Deeds Clerks of Court DBS Your Legal History State and Federal Court DBS Your Credit History Credit Repositoriesโ€™ DBS Your Birth Certificate Choice Point DBS, State, etc โ€ฆ Your Phone Number and Tracking Info 1000โ€™s of aggregators Your Social Security Number SSA DBS and any you gave to Your Address 1000โ€™s of DBS Your Driverโ€™s License #  and Record   โ€“ DMV DBS Your Medical Records MIB DBS, etc โ€ฆ Your Car Registration & Info DMV, Local Treasurer, On Star, etc โ€ฆ DBS
โ„ข Where the Laws Becomes Logical Copyright Accurate Data Partners, LLC.  All rights reserved.  This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use. Once the credit systems accept bad data  it can be next to impossible to clear . USA Today June 5, 2007 Medical identity theft  can impair your health and financesโ€ฆ and detecting this isnโ€™t easyโ€ฆ and remedying the damages can be difficult.  WSJ Oct 11, 2007 Because itโ€™s so overwhelming to CORRECT the victimsโ€™ records, itโ€™s imperative for anyone who touches Medical Info to PROTECT the data. Your Insurance Claims C.L.U.E. DBS, etc... Your Social Security Number SSA DBS and any you gave to Your Name 1000โ€™s of aggregators Your Address 1000โ€™s of DBS Your Fingerprints and DNA FBI, State, and Local DBS Your Driverโ€™s License #  and Record   โ€“ DMV DBS Your Military Record DOD DBS Your Criminal History NCIC DBS Your Real Estate Deeds Clerks of Court DBS Your Medical Records MIB DBS, etc โ€ฆ Your Phone Number and Tracking Info 1000โ€™s of aggregators Your Car Registration & Info Your Legal History State and Federal Court DBS Your Credit History Credit Repositoriesโ€™ DBS Your Birth Certificate Choice Point DBS, State, etc โ€ฆ
1 The Secure Data Based You  โ€“  The Complete Approach Patient/Employee Copyright Accurate Data Partners, LLC.  All rights reserved.  This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use. Protecting potential victims,  your patients, and yourself
Client Data Security Laws, HIPAA, GLB & SC ID Theft Law Privacy Laws, HIPAA, HITECH; GLB & State Laws  HITECH, RFR,  HIPAA, other State  & Federal Laws Red Flags Rule (RFR)  State Immigration Acts FACTA โ€“ Document Destruction Rule โ€“ State Laws  1 Requires Businesses to Protect  Personally Identifiable information  Reduces threat of thief gaining access to information which can be used to corrupt an individuals records  Securing The Data Based You Requires Businesses to Authenticate the Identity of Their Patients/Employees โ€“  Helps reduce the risk of perpetuation of a crime against an innocent victim Requires Businesses to Limit Access to and Keep Private Personally Identifiable Information -  Reduces access to information & protects  individualโ€™s privacy; Only allows permissible access with permissible uses  Businesses must  Destroy/Shred  All Documents or Digital Media Containing  PII or NPI upon Disposal -  Reduces threat from loss & resulting misuse of  PII or NPI which can be used to steal someoneโ€™s identity Businesses  must Insure that they Share ,Sell, Give, Information with /to ONLY Those Vendors and Business Associates with these same measures in place.  Reduces risk of individual  becoming a victim through a 3 rd  Party Vendor with which the victim has no direct relationship  A Legal Safety Net for Identities Copyright Accurate Data Partners, LLC.  All rights reserved.  This document may not be shared, transferred, copied, sold or used in any form except for the business that has purchased the document for its own use. These issues, although separated by the legislative process, are not so cleanly separated in our day to day practices.
Imagine someone  stealing your patients or employees information from one of your Business Associates, their Subcontractors, Vendors or Agents   and  you  must  notify Victims and Government Agencies.  What can you  show  to prove you acted reasonably in overseeing and requiring compliance by those you entrusted with Patient information  The Potential Cost to Covered Entity  Copyright Accurate Data Partners, LLC.  All rights reserved.  This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use. Have your Business Associates employees  even  executed Confidentiality Docs and acknowledged training? Do Business Associates even have required written policies? Do you think a change in your Business Associate Contract accomplished what is required?
Covered Entities & Business Assoc. Developments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Copyright Accurate Data Partners, LLC.  All rights reserved.  This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use. โ€œ you only need to worry about privacy and security laws and rules if you have customers or employees.โ€  - Privacy & Security Law Report
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Accurate Data Partners  Copyright Accurate Data Partners, LLC.  All rights reserved.  This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use.
THANK YOU For additional information please contact: www.accuratedatapartners.com

More Related Content

What's hot

Pro Filez Slide Show
Pro Filez Slide ShowPro Filez Slide Show
Pro Filez Slide Show
profilez
ย 
Processing HIPAA Privacy Forms 2014-Sample
Processing HIPAA Privacy Forms 2014-SampleProcessing HIPAA Privacy Forms 2014-Sample
Processing HIPAA Privacy Forms 2014-Sample
Katrina Wiley Belton
ย 
Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104
Hai Nguyen
ย 
White Paper 2011 BOC
White Paper 2011 BOCWhite Paper 2011 BOC
White Paper 2011 BOC
Brian O'Connor
ย 
Guarding Vanderbilt information
Guarding Vanderbilt informationGuarding Vanderbilt information
Guarding Vanderbilt information
Vanderbilt University
ย 

What's hot (20)

Building a Better Credit Report
Building a Better Credit ReportBuilding a Better Credit Report
Building a Better Credit Report
ย 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
ย 
Tyyania jones resume 2016
Tyyania jones resume 2016Tyyania jones resume 2016
Tyyania jones resume 2016
ย 
Pro Filez Slide Show
Pro Filez Slide ShowPro Filez Slide Show
Pro Filez Slide Show
ย 
How to Obtain Your Credit File and Repair Your Credit Problems
How to Obtain Your Credit File and Repair Your Credit ProblemsHow to Obtain Your Credit File and Repair Your Credit Problems
How to Obtain Your Credit File and Repair Your Credit Problems
ย 
What You Should Know About Your Credit Report
What You Should Know About Your Credit ReportWhat You Should Know About Your Credit Report
What You Should Know About Your Credit Report
ย 
Idt
IdtIdt
Idt
ย 
Privacy update 04.29.2010
Privacy update 04.29.2010Privacy update 04.29.2010
Privacy update 04.29.2010
ย 
Your rights-under-the-fcra
Your rights-under-the-fcraYour rights-under-the-fcra
Your rights-under-the-fcra
ย 
Your Credit Report
Your Credit ReportYour Credit Report
Your Credit Report
ย 
Identity Theft Scams
Identity Theft ScamsIdentity Theft Scams
Identity Theft Scams
ย 
Processing HIPAA Privacy Forms 2014-Sample
Processing HIPAA Privacy Forms 2014-SampleProcessing HIPAA Privacy Forms 2014-Sample
Processing HIPAA Privacy Forms 2014-Sample
ย 
Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104Nascio who areyoue-authbrief122104
Nascio who areyoue-authbrief122104
ย 
Protecting Vanderbilt Information
Protecting Vanderbilt InformationProtecting Vanderbilt Information
Protecting Vanderbilt Information
ย 
White Paper 2011 BOC
White Paper 2011 BOCWhite Paper 2011 BOC
White Paper 2011 BOC
ย 
Guarding Vanderbilt information
Guarding Vanderbilt informationGuarding Vanderbilt information
Guarding Vanderbilt information
ย 
Randall Shane Bouley - FINRA BrokerCheck Report
Randall Shane Bouley - FINRA BrokerCheck ReportRandall Shane Bouley - FINRA BrokerCheck Report
Randall Shane Bouley - FINRA BrokerCheck Report
ย 
OttoGraham
OttoGrahamOttoGraham
OttoGraham
ย 
Assignment 5 consumer fraud protection
Assignment 5 consumer fraud protectionAssignment 5 consumer fraud protection
Assignment 5 consumer fraud protection
ย 
IDSHield Services and Features
IDSHield Services and FeaturesIDSHield Services and Features
IDSHield Services and Features
ย 

Similar to Covered Entity Presentation Regarding Business Associates[1]

Iโ€™m attaching some info on the agency I work for. I work remot.docx
Iโ€™m attaching some info on the agency I work for. I work remot.docxIโ€™m attaching some info on the agency I work for. I work remot.docx
Iโ€™m attaching some info on the agency I work for. I work remot.docx
donnajames55
ย 
IDShield White Paper
IDShield White PaperIDShield White Paper
IDShield White Paper
Michael Wilson
ย 
Medical records management
Medical records managementMedical records management
Medical records management
Choice Legal
ย 
Glb privacy notice rev10 2012- student loan alliance
Glb privacy notice rev10 2012- student loan allianceGlb privacy notice rev10 2012- student loan alliance
Glb privacy notice rev10 2012- student loan alliance
Springboard
ย 

Similar to Covered Entity Presentation Regarding Business Associates[1] (20)

Adrs2
Adrs2Adrs2
Adrs2
ย 
Identity Theft and Your company
Identity Theft and Your companyIdentity Theft and Your company
Identity Theft and Your company
ย 
I D Theft Employee Presentation2
I D Theft Employee Presentation2I D Theft Employee Presentation2
I D Theft Employee Presentation2
ย 
Iโ€™m attaching some info on the agency I work for. I work remot.docx
Iโ€™m attaching some info on the agency I work for. I work remot.docxIโ€™m attaching some info on the agency I work for. I work remot.docx
Iโ€™m attaching some info on the agency I work for. I work remot.docx
ย 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
ย 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse System
ย 
IDShield White Paper
IDShield White PaperIDShield White Paper
IDShield White Paper
ย 
Medical records management
Medical records managementMedical records management
Medical records management
ย 
GDPR webinar for business leaders
GDPR webinar for business leadersGDPR webinar for business leaders
GDPR webinar for business leaders
ย 
Glb privacy notice rev10 2012- student loan alliance
Glb privacy notice rev10 2012- student loan allianceGlb privacy notice rev10 2012- student loan alliance
Glb privacy notice rev10 2012- student loan alliance
ย 
Medical Records Management
Medical Records ManagementMedical Records Management
Medical Records Management
ย 
Adrs Presentation Folder 051909
Adrs Presentation Folder 051909Adrs Presentation Folder 051909
Adrs Presentation Folder 051909
ย 
Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber security
ย 
$10.95 New Jersey Plan
$10.95 New Jersey Plan$10.95 New Jersey Plan
$10.95 New Jersey Plan
ย 
Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)Affirmative Defense Response System (ADRS)
Affirmative Defense Response System (ADRS)
ย 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
ย 
Adrs Flip Chart From Ppl
Adrs Flip Chart From PplAdrs Flip Chart From Ppl
Adrs Flip Chart From Ppl
ย 
Privacy notice english
Privacy notice englishPrivacy notice english
Privacy notice english
ย 
Bullet Proofing Your Affiliate Agreement Pete Wellborn
Bullet Proofing Your Affiliate Agreement Pete WellbornBullet Proofing Your Affiliate Agreement Pete Wellborn
Bullet Proofing Your Affiliate Agreement Pete Wellborn
ย 
Information Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your BusinessInformation Compromise and the Risk of Identity Theft Guidance for your Business
Information Compromise and the Risk of Identity Theft Guidance for your Business
ย 

Recently uploaded

VIP Independent Call Girls in Mira Bhayandar ๐ŸŒน 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar ๐ŸŒน 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar ๐ŸŒน 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar ๐ŸŒน 9920725232 ( Call Me ) Mumbai ...
dipikadinghjn ( Why You Choose Us? ) Escorts
ย 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
Adnet Communications
ย 

Recently uploaded (20)

The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
ย 
The Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdfThe Economic History of the U.S. Lecture 20.pdf
The Economic History of the U.S. Lecture 20.pdf
ย 
VIP Independent Call Girls in Mira Bhayandar ๐ŸŒน 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar ๐ŸŒน 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar ๐ŸŒน 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar ๐ŸŒน 9920725232 ( Call Me ) Mumbai ...
ย 
Top Rated Pune Call Girls Dighi โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Dighi โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Dighi โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Dighi โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex Servi...
ย 
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
ย 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
ย 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
ย 
The Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdfThe Economic History of the U.S. Lecture 23.pdf
The Economic History of the U.S. Lecture 23.pdf
ย 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
ย 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
ย 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
ย 
Top Rated Pune Call Girls Sinhagad Road โŸŸ 6297143586 โŸŸ Call Me For Genuine S...
Top Rated  Pune Call Girls Sinhagad Road โŸŸ 6297143586 โŸŸ Call Me For Genuine S...Top Rated  Pune Call Girls Sinhagad Road โŸŸ 6297143586 โŸŸ Call Me For Genuine S...
Top Rated Pune Call Girls Sinhagad Road โŸŸ 6297143586 โŸŸ Call Me For Genuine S...
ย 
WhatsApp ๐Ÿ“ž Call : 9892124323 โœ…Call Girls In Chembur ( Mumbai ) secure service
WhatsApp ๐Ÿ“ž Call : 9892124323  โœ…Call Girls In Chembur ( Mumbai ) secure serviceWhatsApp ๐Ÿ“ž Call : 9892124323  โœ…Call Girls In Chembur ( Mumbai ) secure service
WhatsApp ๐Ÿ“ž Call : 9892124323 โœ…Call Girls In Chembur ( Mumbai ) secure service
ย 
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
ย 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
ย 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
ย 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
ย 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
ย 
Vip Call US ๐Ÿ“ž 7738631006 โœ…Call Girls In Sakinaka ( Mumbai )
Vip Call US ๐Ÿ“ž 7738631006 โœ…Call Girls In Sakinaka ( Mumbai )Vip Call US ๐Ÿ“ž 7738631006 โœ…Call Girls In Sakinaka ( Mumbai )
Vip Call US ๐Ÿ“ž 7738631006 โœ…Call Girls In Sakinaka ( Mumbai )
ย 
Top Rated Pune Call Girls Viman Nagar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar โŸŸ 6297143586 โŸŸ Call Me For Genuine Sex...
ย 

Covered Entity Presentation Regarding Business Associates[1]

  • 1. Covered Entity Requirement to Ensure Business Associates & Their Vendors Comply with HITECH Accurate Data Partners, LLC
  • 2.
  • 3. People make decisions about you, your clients and your employees that are based on more than the information in a Credit Report. It is imperative that Personally Identifiable Information and Non-Public Information be as protected and as accurate as possible. Drivers License Medical Financial Social Security Character/ Criminal Five Common Identity Risks
  • 4.
  • 5. โ„ข Medical Identity & The DBY Copyright Accurate Data Partners, LLC. All rights reserved. This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use. Your Name 1000โ€™s of aggregators Acxiom, Choice Point, LexisNexis, etc. Insurance Companies, Agencies and Agentโ€™s C.L.U.E. DBS, etc... Physician's Data Bases Medical Information Bureau Data Base (MIB) Blood Bank & Various Lab Data Bases Drug Store & Pharmacy Data Bases Employerโ€™s Data Bases Your Address 1000โ€™s of DBS Hospitalโ€™s Various Data Bases Center for Disease and Control (CDC) USB Keys, CD/DVDs Thumb & Jump Drives DHEC/State Health Dept Local, State Federal Health DBS Billing and Collection DBS and Credit Repository Computers
  • 6. โ„ข The Web of The DataBased You Copyright Accurate Data Partners, LLC. All rights reserved. This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use. Your Name 1000โ€™s of aggregators Your Fingerprints and DNA FBI, State, and Local DBS Your Insurance Claims C.L.U.E. DBS, etc... Your Military Record DOD DBS Your Criminal History NCIC DBS Your Real Estate Deeds Clerks of Court DBS Your Legal History State and Federal Court DBS Your Credit History Credit Repositoriesโ€™ DBS Your Birth Certificate Choice Point DBS, State, etc โ€ฆ Your Phone Number and Tracking Info 1000โ€™s of aggregators Your Social Security Number SSA DBS and any you gave to Your Address 1000โ€™s of DBS Your Driverโ€™s License # and Record โ€“ DMV DBS Your Medical Records MIB DBS, etc โ€ฆ Your Car Registration & Info DMV, Local Treasurer, On Star, etc โ€ฆ DBS
  • 7. โ„ข Where the Laws Becomes Logical Copyright Accurate Data Partners, LLC. All rights reserved. This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use. Once the credit systems accept bad data it can be next to impossible to clear . USA Today June 5, 2007 Medical identity theft can impair your health and financesโ€ฆ and detecting this isnโ€™t easyโ€ฆ and remedying the damages can be difficult. WSJ Oct 11, 2007 Because itโ€™s so overwhelming to CORRECT the victimsโ€™ records, itโ€™s imperative for anyone who touches Medical Info to PROTECT the data. Your Insurance Claims C.L.U.E. DBS, etc... Your Social Security Number SSA DBS and any you gave to Your Name 1000โ€™s of aggregators Your Address 1000โ€™s of DBS Your Fingerprints and DNA FBI, State, and Local DBS Your Driverโ€™s License # and Record โ€“ DMV DBS Your Military Record DOD DBS Your Criminal History NCIC DBS Your Real Estate Deeds Clerks of Court DBS Your Medical Records MIB DBS, etc โ€ฆ Your Phone Number and Tracking Info 1000โ€™s of aggregators Your Car Registration & Info Your Legal History State and Federal Court DBS Your Credit History Credit Repositoriesโ€™ DBS Your Birth Certificate Choice Point DBS, State, etc โ€ฆ
  • 8. 1 The Secure Data Based You โ€“ The Complete Approach Patient/Employee Copyright Accurate Data Partners, LLC. All rights reserved. This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use. Protecting potential victims, your patients, and yourself
  • 9. Client Data Security Laws, HIPAA, GLB & SC ID Theft Law Privacy Laws, HIPAA, HITECH; GLB & State Laws HITECH, RFR, HIPAA, other State & Federal Laws Red Flags Rule (RFR) State Immigration Acts FACTA โ€“ Document Destruction Rule โ€“ State Laws 1 Requires Businesses to Protect Personally Identifiable information Reduces threat of thief gaining access to information which can be used to corrupt an individuals records Securing The Data Based You Requires Businesses to Authenticate the Identity of Their Patients/Employees โ€“ Helps reduce the risk of perpetuation of a crime against an innocent victim Requires Businesses to Limit Access to and Keep Private Personally Identifiable Information - Reduces access to information & protects individualโ€™s privacy; Only allows permissible access with permissible uses Businesses must Destroy/Shred All Documents or Digital Media Containing PII or NPI upon Disposal - Reduces threat from loss & resulting misuse of PII or NPI which can be used to steal someoneโ€™s identity Businesses must Insure that they Share ,Sell, Give, Information with /to ONLY Those Vendors and Business Associates with these same measures in place. Reduces risk of individual becoming a victim through a 3 rd Party Vendor with which the victim has no direct relationship A Legal Safety Net for Identities Copyright Accurate Data Partners, LLC. All rights reserved. This document may not be shared, transferred, copied, sold or used in any form except for the business that has purchased the document for its own use. These issues, although separated by the legislative process, are not so cleanly separated in our day to day practices.
  • 10. Imagine someone stealing your patients or employees information from one of your Business Associates, their Subcontractors, Vendors or Agents and you must notify Victims and Government Agencies. What can you show to prove you acted reasonably in overseeing and requiring compliance by those you entrusted with Patient information The Potential Cost to Covered Entity Copyright Accurate Data Partners, LLC. All rights reserved. This document may not be shared, transferred, copied or sold in any form except for the business that has purchased the document for its own use. Have your Business Associates employees even executed Confidentiality Docs and acknowledged training? Do Business Associates even have required written policies? Do you think a change in your Business Associate Contract accomplished what is required?
  • 11.
  • 12.
  • 13. THANK YOU For additional information please contact: www.accuratedatapartners.com

Editor's Notes

  1. THE RED FLAGS RULE. Red Flags are patterns, practices, or specific activities that indicate the possible existence of identity theft. Your Red Flags Program must be approved by your Board of Directors or senior management, a senior officer must be put in charge of the program and the FTC Rule requires 4 steps: 1. Identify your dealershipโ€™s red flags from a risk-based analysis; No โ€œone size fits allโ€ set of red flags. Have procedures to detect and evaluate red flags in individual covered transactions. 3 key ways are to examine customer ID, examine credit report and examine the report of an electronic identity verification service. Ask out-of-wallet or challenge questions available from electronic identity verification service. 3. Have procedures to respond to red flags. Seek additional information from the customer and escalate unresolved red flags to a senior Program Officer 4. Update program at least annually and make reports to Board or senior management. Training employees is also very important in the Red Flags Rule. Create a โ€œculture of securityโ€ in your dealership.
  2. THE RED FLAGS RULE. Red Flags are patterns, practices, or specific activities that indicate the possible existence of identity theft. Your Red Flags Program must be approved by your Board of Directors or senior management, a senior officer must be put in charge of the program and the FTC Rule requires 4 steps: 1. Identify your dealershipโ€™s red flags from a risk-based analysis; No โ€œone size fits allโ€ set of red flags. Have procedures to detect and evaluate red flags in individual covered transactions. 3 key ways are to examine customer ID, examine credit report and examine the report of an electronic identity verification service. Ask out-of-wallet or challenge questions available from electronic identity verification service. 3. Have procedures to respond to red flags. Seek additional information from the customer and escalate unresolved red flags to a senior Program Officer 4. Update program at least annually and make reports to Board or senior management. Training employees is also very important in the Red Flags Rule. Create a โ€œculture of securityโ€ in your dealership.
  3. Basic Steps You Can Take In Your Office To Protect Your Clients