SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Downloaden Sie, um offline zu lesen
Red Flag Compliance for Dental Practices
            May 17, 2009

                                           1
Our goals today




                  2
Our goals today
 ‣ To give you the WHAT





                           2
Our goals today
 ‣ To give you the WHAT

   ‣ The FTC’s Red Flag Rules




                                2
Our goals today
 ‣ To give you the WHAT

   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW





                                2
Our goals today
 ‣ To give you the WHAT

   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW

   ‣ demo the idBUSINESS Red Flag Compliance
     Module




                                               2
Our goals today
 ‣ To give you the WHAT

   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW

   ‣ demo the idBUSINESS Red Flag Compliance
      Module
 ‣ but also give you the WHY




                                               2
Our goals today
 ‣ To give you the WHAT

   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW

   ‣ demo the idBUSINESS Red Flag Compliance
      Module
 ‣ but also give you the WHY
   ‣ Why information security should be a part of
      your business



                                                    2
An issue of
PATIENT CARE

    “The possibility for medical identity theft
     gives rises to a duty to monitor for the
   potential that patients may be victims. The
  prudent provider will also monitor employee
      and vendor access to patient data.”

        - World Privacy Forum, 9/24/08


                                                  3
What this means




                  4
What this means
‣ Medical identity theft is on the rise
  ‣ Costs $192 per record to restore
  ‣ Often an inside job
  ‣ Organized crime is involved




                                          4
What this means
‣ Medical identity theft is on the rise
  ‣ Costs $192 per record to restore
  ‣ Often an inside job
  ‣ Organized crime is involved
‣ Dental offices are unique
  ‣ Reliance on office manager to run operations
  ‣ No line between your brand and your name


                                                   4
The Opportunity
‣ There is a unique opportunity to grow a
  practice by leveraging strong information
  security policy and sharing it with patients
  ‣ Build trust with patients
  ‣ Strengthen employee relationships
  ‣ Tighten operations with vendors




                                                 5
The facts

                                                30%
     40%

                      60%
                                                             70%



     Business has suffered breach         Thief is employee or knows employee
     Business has yet to incur a breach   Thief is unknown


 ‱   Since 2/15/05, over 251,000,000 Americans have had
     identities or other personal information compromised




                                                                                6
The facts
The average breach and its impact on customer confidence is growing.


                                            58% of customers will
                                            lose conïŹdence in your
                                            business after a breach.




                                            31% of your customers
                                            will immediately cease
                                            doing business with
                                            you following a breach.




Source: Ponemon Institute, 2008.



                                                                       7
The Red Flag Rules




                     8
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act




                                                8
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:




                                                8
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:
  ‣ you hold “covered accounts”




                                                8
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:
  ‣ you hold “covered accounts”
  ‣ your customer records present a “reasonably
     foreseeable risk of identity theft”




                                                  8
Why are dentists
COVERED ENTITIES?
‣ Accepting insurance
       ‣ Deferral of 100% of payment, you collect
             enough patient data to collect the remainder
             that insurance does not pay.
‣ Reasonably foreseeable risk
       ‣ Your patient files are a treasure trove
       ‣ Each record worth between $80-300 each*


  * Source: Black Market Identity Auction attended by Net Reaction mole, 2008.

                                                                                 9
Red Flag
REQUIREMENTS




               10
Red Flag
REQUIREMENTS
1. A Written Information Security Program




                                            10
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft




                                                                10
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management




                                                                10
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis




                                                                10
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees




                                                                10
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees
6. Must contain an incident response capability




                                                                10
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees
6. Must contain an incident response capability
7. Must ensure that vendors and suppliers are also compliant



                                                                10
“What happens
if I don’t comply?”
‱ Noncompliance carries several penalties
  – Civil Liability
  – Class-Action Lawsuits
  – Federal Fines
  – State Fines




                                            11
“Didn’t the ADA
send me something?”
‱ The ADA’s written template still leaves you
  vulnerable:
  – No vendor integrity assessment
  – No employee training, just signature line
  – No mitigation of damages in the event of an incident
    ‱ Who will you call when you have a question?
‱ No context of how Red Flag Policy fits into your business
  – What’s worth doing is worth doing right.
  – Missing an opportunity to GROW your practice


                                                              12
The solution
‣ The idBUSINESS Red Flag Compliance Module
  ‣ Built on real-world forensic fieldwork
  ‣ Includes tools & benefits that actively involve
    employees in your compliance efforts
  ‣ Transitions information security from a
    compliance issue into a competitive advantage




                                                      13
The Red Flag
Compliance Module




‣ Secure online interface

                            14
The Red Flag
Compliance Module




‣ Learning tools available as text or video webinar
                                                      15
The Red Flag
Compliance Module




‣ Risk Assessment tool provides ranking of your
   company in 12 key focus areas
                                                  16
The Red Flag
Compliance Module




‣ Customizable checklist of 26 Red Flags to meet
   requirements of FACT Act
                                                   17
The Red Flag
Compliance Module




‣ Employee training automated & easy, integrates
   automatically with your compliance report
                                                   18
The Red Flag
Compliance Module




‣ Ability to evaluate supplier compliance practices using
                                                        19
The Red Flag
Compliance Module



‣ Access individual identity recovery protection using
   FraudStop and Restore from ID Experts
  ‣   Available as employee benefit, cafeteria-style add-on,
      customer blanket, or new revenue stream
‣ In the event of a breach, one-click access to best-in-
   breed data breach services and forensic services


                                                           20
So I’m compliant...
  ‣ NOW WHAT?
    ‣ Don’t let it sit on a shelf
    ‣ Talk to your employees
    ‣ Talk to your patients
  ‣ Use your policy as a practice-building tool




                                                  21
A final word
‣   “I understand the mindset of other dentists in practice for themselves, and that it is easy
    to minimize identity theft as a business threat or a patient care issue. It is low on their
    list of priorities, which is unfortunate because if and when a patient data breach occurs,
    we are by law responsible. I personally would recommend that dentists act with a sense
    of urgency to become compliant with the FTC ‘Red Flag Rules’ both to avoid penalty
    and to protect your patients from a life-wrenching identity theft experience. You’ll be
    protecting yourself as well, and as a result, will sleep better at night.”

                                                                          Dr. Miles Collett, DDS




                                                                                                   22
Thank you!
 ‣ To learn more, please visit idBUSINESS.com
 ‣ Discounts are available for some dental
   associations - check with your association or call
   Carla Adams, 303-810-3091




                                                        23

Weitere Àhnliche Inhalte

Was ist angesagt?

2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1cGene Kim
 
The paypers Vol 5.
The paypers Vol 5. The paypers Vol 5.
The paypers Vol 5. EastNets
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?CBIZ, Inc.
 
Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation TransUnion
 
Passwords don't work multifactor controls do!
Passwords don't work   multifactor controls do!Passwords don't work   multifactor controls do!
Passwords don't work multifactor controls do!FitCEO, Inc. (FCI)
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3techcouncil
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf mattsson webinar jun 7 2012   slideshare versionUlf mattsson webinar jun 7 2012   slideshare version
Ulf mattsson webinar jun 7 2012 slideshare versionUlf Mattsson
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud managementrkappear
 
Fraud Detection Using A Database Platform
Fraud Detection Using A Database PlatformFraud Detection Using A Database Platform
Fraud Detection Using A Database PlatformEZ-R Stats, LLC
 
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CloudIDSummit
 
The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White Listderektop
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics FraudBusters
 
Avoiding IT Litigation with Great IT & Software Development Contracts
Avoiding IT Litigation with Great IT & Software Development ContractsAvoiding IT Litigation with Great IT & Software Development Contracts
Avoiding IT Litigation with Great IT & Software Development ContractsWarren S. Reid
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudFraudBusters
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisFraudBusters
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisFraudBusters
 

Was ist angesagt? (18)

2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
The paypers Vol 5.
The paypers Vol 5. The paypers Vol 5.
The paypers Vol 5.
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation
 
Passwords don't work multifactor controls do!
Passwords don't work   multifactor controls do!Passwords don't work   multifactor controls do!
Passwords don't work multifactor controls do!
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf mattsson webinar jun 7 2012   slideshare versionUlf mattsson webinar jun 7 2012   slideshare version
Ulf mattsson webinar jun 7 2012 slideshare version
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
Fraud Detection Using A Database Platform
Fraud Detection Using A Database PlatformFraud Detection Using A Database Platform
Fraud Detection Using A Database Platform
 
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
 
The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White List
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 
Avoiding IT Litigation with Great IT & Software Development Contracts
Avoiding IT Litigation with Great IT & Software Development ContractsAvoiding IT Litigation with Great IT & Software Development Contracts
Avoiding IT Litigation with Great IT & Software Development Contracts
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 

Andere mochten auch

Art To Heart
Art To HeartArt To Heart
Art To Heartpslthomas
 
Project Skylab: Helping You Get Your Cloud On
Project Skylab: Helping You Get Your Cloud OnProject Skylab: Helping You Get Your Cloud On
Project Skylab: Helping You Get Your Cloud Oncraigbalding
 
Sect 1.1 1.4
Sect 1.1 1.4Sect 1.1 1.4
Sect 1.1 1.4guest6643d5
 
Presentation1[1]
Presentation1[1]Presentation1[1]
Presentation1[1]khinkamper
 
Useful Tools Preso 6.24.2009
Useful Tools Preso 6.24.2009Useful Tools Preso 6.24.2009
Useful Tools Preso 6.24.2009Rick Huebsch
 
E Learning Guild E Magazine Article
E Learning Guild E Magazine ArticleE Learning Guild E Magazine Article
E Learning Guild E Magazine ArticleMargot Finley-Aguilera
 
Nice Copy Of Article With Header
Nice Copy Of Article With HeaderNice Copy Of Article With Header
Nice Copy Of Article With HeaderMargot Finley-Aguilera
 
Presentation1[1]
Presentation1[1]Presentation1[1]
Presentation1[1]khinkamper
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Baldingcraigbalding
 
Early Childhood Development
Early Childhood DevelopmentEarly Childhood Development
Early Childhood Developmentguest5f348a5
 
Presentaci2n De Teed
Presentaci2n De TeedPresentaci2n De Teed
Presentaci2n De Teedosvaldoroman69
 
P R E S E N T A C I O N M U L T I M E D I A
P R E S E N T A C I O N  M U L T I M E D I AP R E S E N T A C I O N  M U L T I M E D I A
P R E S E N T A C I O N M U L T I M E D I Acapptito
 

Andere mochten auch (15)

Art To Heart
Art To HeartArt To Heart
Art To Heart
 
Change The World (Highlights)
Change The World (Highlights)Change The World (Highlights)
Change The World (Highlights)
 
Project Skylab: Helping You Get Your Cloud On
Project Skylab: Helping You Get Your Cloud OnProject Skylab: Helping You Get Your Cloud On
Project Skylab: Helping You Get Your Cloud On
 
Sect 1.1 1.4
Sect 1.1 1.4Sect 1.1 1.4
Sect 1.1 1.4
 
You Are More Than Your Resume
You Are More Than Your ResumeYou Are More Than Your Resume
You Are More Than Your Resume
 
Presentation1[1]
Presentation1[1]Presentation1[1]
Presentation1[1]
 
Useful Tools Preso 6.24.2009
Useful Tools Preso 6.24.2009Useful Tools Preso 6.24.2009
Useful Tools Preso 6.24.2009
 
E Learning Guild E Magazine Article
E Learning Guild E Magazine ArticleE Learning Guild E Magazine Article
E Learning Guild E Magazine Article
 
Interview With Chani Pangali
Interview With Chani PangaliInterview With Chani Pangali
Interview With Chani Pangali
 
Nice Copy Of Article With Header
Nice Copy Of Article With HeaderNice Copy Of Article With Header
Nice Copy Of Article With Header
 
Presentation1[1]
Presentation1[1]Presentation1[1]
Presentation1[1]
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Balding
 
Early Childhood Development
Early Childhood DevelopmentEarly Childhood Development
Early Childhood Development
 
Presentaci2n De Teed
Presentaci2n De TeedPresentaci2n De Teed
Presentaci2n De Teed
 
P R E S E N T A C I O N M U L T I M E D I A
P R E S E N T A C I O N  M U L T I M E D I AP R E S E N T A C I O N  M U L T I M E D I A
P R E S E N T A C I O N M U L T I M E D I A
 

Ähnlich wie idBUSINESS Red Flag Rules For Dentists

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineFraudBusters
 
Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!pdallen
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)NAFCU Services Corporation
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudFraudBusters
 
Fraud Training for Auditees (1).pptx
Fraud Training for Auditees (1).pptxFraud Training for Auditees (1).pptx
Fraud Training for Auditees (1).pptxQualityAdviceService
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Strategic Treasurer
 
Business Resilience
Business ResilienceBusiness Resilience
Business Resiliencerix57
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Pairat Srivilairit
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Pairat Srivilairit
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to knowNathan Desfontaines
 
PCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailPCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailInDefense Security
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls PresentationBill Lisse
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber WarfareSwapnil Jagtap
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure BrochureDave Lloyd
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudWynyard Group
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsPerficient, Inc.
 

Ähnlich wie idBUSINESS Red Flag Rules For Dentists (20)

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Fraud Training for Auditees (1).pptx
Fraud Training for Auditees (1).pptxFraud Training for Auditees (1).pptx
Fraud Training for Auditees (1).pptx
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Banks payback for non compliance and money laundering
Banks payback for non  compliance and money launderingBanks payback for non  compliance and money laundering
Banks payback for non compliance and money laundering
 
Business Resilience
Business ResilienceBusiness Resilience
Business Resilience
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
PCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailPCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for Retail
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure Brochure
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 

KĂŒrzlich hochgeladen

Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Miss joya
 
Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...
Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...
Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...narwatsonia7
 
VIP Call Girls Pune Vrinda 9907093804 Short 1500 Night 6000 Best call girls S...
VIP Call Girls Pune Vrinda 9907093804 Short 1500 Night 6000 Best call girls S...VIP Call Girls Pune Vrinda 9907093804 Short 1500 Night 6000 Best call girls S...
VIP Call Girls Pune Vrinda 9907093804 Short 1500 Night 6000 Best call girls S...Miss joya
 
Call Girls In Andheri East Call 9920874524 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9920874524 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9920874524 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9920874524 Book Hot And Sexy Girlsnehamumbai
 
See the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformSee the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformKweku Zurek
 
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original PhotosBook Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photosnarwatsonia7
 
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% SafeBangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safenarwatsonia7
 
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service JaipurHigh Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipurparulsinha
 
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment BookingCall Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Bookingnarwatsonia7
 
call girls in green park DELHI 🔝 >àŒ’9540349809 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in green park  DELHI 🔝 >àŒ’9540349809 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïžcall girls in green park  DELHI 🔝 >àŒ’9540349809 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in green park DELHI 🔝 >àŒ’9540349809 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïžsaminamagar
 
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...narwatsonia7
 
Aspirin presentation slides by Dr. Rewas Ali
Aspirin presentation slides by Dr. Rewas AliAspirin presentation slides by Dr. Rewas Ali
Aspirin presentation slides by Dr. Rewas AliRewAs ALI
 
Call Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort Service
Call Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort ServiceCall Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort Service
Call Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort Serviceparulsinha
 
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfHemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfMedicoseAcademics
 
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceCollege Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceNehru place Escorts
 
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 

KĂŒrzlich hochgeladen (20)

Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
 
Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...
Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...
Russian Call Girls Chickpet - 7001305949 Booking and charges genuine rate for...
 
VIP Call Girls Pune Vrinda 9907093804 Short 1500 Night 6000 Best call girls S...
VIP Call Girls Pune Vrinda 9907093804 Short 1500 Night 6000 Best call girls S...VIP Call Girls Pune Vrinda 9907093804 Short 1500 Night 6000 Best call girls S...
VIP Call Girls Pune Vrinda 9907093804 Short 1500 Night 6000 Best call girls S...
 
Call Girls In Andheri East Call 9920874524 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9920874524 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9920874524 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9920874524 Book Hot And Sexy Girls
 
See the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformSee the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy Platform
 
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original PhotosBook Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
 
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% SafeBangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
 
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service JaipurHigh Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
 
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
 
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
 
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Servicesauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
 
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment BookingCall Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
 
call girls in green park DELHI 🔝 >àŒ’9540349809 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in green park  DELHI 🔝 >àŒ’9540349809 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïžcall girls in green park  DELHI 🔝 >àŒ’9540349809 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
call girls in green park DELHI 🔝 >àŒ’9540349809 🔝 genuine Escort Service đŸ”âœ”ïžâœ”ïž
 
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
 
Escort Service Call Girls In Sarita Vihar,, 99530°56974 Delhi NCR
Escort Service Call Girls In Sarita Vihar,, 99530°56974 Delhi NCREscort Service Call Girls In Sarita Vihar,, 99530°56974 Delhi NCR
Escort Service Call Girls In Sarita Vihar,, 99530°56974 Delhi NCR
 
Aspirin presentation slides by Dr. Rewas Ali
Aspirin presentation slides by Dr. Rewas AliAspirin presentation slides by Dr. Rewas Ali
Aspirin presentation slides by Dr. Rewas Ali
 
Call Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort Service
Call Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort ServiceCall Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort Service
Call Girls Service In Shyam Nagar Whatsapp 8445551418 Independent Escort Service
 
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfHemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
 
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceCollege Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
 
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
 

idBUSINESS Red Flag Rules For Dentists

  • 1. Red Flag Compliance for Dental Practices May 17, 2009 1
  • 3. Our goals today ‣ To give you the WHAT
 2
  • 4. Our goals today ‣ To give you the WHAT
 ‣ The FTC’s Red Flag Rules 2
  • 5. Our goals today ‣ To give you the WHAT
 ‣ The FTC’s Red Flag Rules ‣ ...review the HOW
 2
  • 6. Our goals today ‣ To give you the WHAT
 ‣ The FTC’s Red Flag Rules ‣ ...review the HOW
 ‣ demo the idBUSINESS Red Flag Compliance Module 2
  • 7. Our goals today ‣ To give you the WHAT
 ‣ The FTC’s Red Flag Rules ‣ ...review the HOW
 ‣ demo the idBUSINESS Red Flag Compliance Module ‣ but also give you the WHY 2
  • 8. Our goals today ‣ To give you the WHAT
 ‣ The FTC’s Red Flag Rules ‣ ...review the HOW
 ‣ demo the idBUSINESS Red Flag Compliance Module ‣ but also give you the WHY ‣ Why information security should be a part of your business 2
  • 9. An issue of PATIENT CARE “The possibility for medical identity theft gives rises to a duty to monitor for the potential that patients may be victims. The prudent provider will also monitor employee and vendor access to patient data.” - World Privacy Forum, 9/24/08 3
  • 11. What this means ‣ Medical identity theft is on the rise ‣ Costs $192 per record to restore ‣ Often an inside job ‣ Organized crime is involved 4
  • 12. What this means ‣ Medical identity theft is on the rise ‣ Costs $192 per record to restore ‣ Often an inside job ‣ Organized crime is involved ‣ Dental offices are unique ‣ Reliance on office manager to run operations ‣ No line between your brand and your name 4
  • 13. The Opportunity ‣ There is a unique opportunity to grow a practice by leveraging strong information security policy and sharing it with patients ‣ Build trust with patients ‣ Strengthen employee relationships ‣ Tighten operations with vendors 5
  • 14. The facts 30% 40% 60% 70% Business has suffered breach Thief is employee or knows employee Business has yet to incur a breach Thief is unknown ‱ Since 2/15/05, over 251,000,000 Americans have had identities or other personal information compromised 6
  • 15. The facts The average breach and its impact on customer confidence is growing. 58% of customers will lose conïŹdence in your business after a breach. 31% of your customers will immediately cease doing business with you following a breach. Source: Ponemon Institute, 2008. 7
  • 16. The Red Flag Rules 8
  • 17. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act 8
  • 18. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: 8
  • 19. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: ‣ you hold “covered accounts” 8
  • 20. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: ‣ you hold “covered accounts” ‣ your customer records present a “reasonably foreseeable risk of identity theft” 8
  • 21. Why are dentists COVERED ENTITIES? ‣ Accepting insurance ‣ Deferral of 100% of payment, you collect enough patient data to collect the remainder that insurance does not pay. ‣ Reasonably foreseeable risk ‣ Your patient files are a treasure trove ‣ Each record worth between $80-300 each* * Source: Black Market Identity Auction attended by Net Reaction mole, 2008. 9
  • 23. Red Flag REQUIREMENTS 1. A Written Information Security Program 10
  • 24. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 10
  • 25. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 10
  • 26. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 10
  • 27. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 10
  • 28. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 6. Must contain an incident response capability 10
  • 29. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 6. Must contain an incident response capability 7. Must ensure that vendors and suppliers are also compliant 10
  • 30. “What happens if I don’t comply?” ‱ Noncompliance carries several penalties – Civil Liability – Class-Action Lawsuits – Federal Fines – State Fines 11
  • 31. “Didn’t the ADA send me something?” ‱ The ADA’s written template still leaves you vulnerable: – No vendor integrity assessment – No employee training, just signature line – No mitigation of damages in the event of an incident ‱ Who will you call when you have a question? ‱ No context of how Red Flag Policy fits into your business – What’s worth doing is worth doing right. – Missing an opportunity to GROW your practice 12
  • 32. The solution ‣ The idBUSINESS Red Flag Compliance Module ‣ Built on real-world forensic fieldwork ‣ Includes tools & benefits that actively involve employees in your compliance efforts ‣ Transitions information security from a compliance issue into a competitive advantage 13
  • 33. The Red Flag Compliance Module ‣ Secure online interface 14
  • 34. The Red Flag Compliance Module ‣ Learning tools available as text or video webinar 15
  • 35. The Red Flag Compliance Module ‣ Risk Assessment tool provides ranking of your company in 12 key focus areas 16
  • 36. The Red Flag Compliance Module ‣ Customizable checklist of 26 Red Flags to meet requirements of FACT Act 17
  • 37. The Red Flag Compliance Module ‣ Employee training automated & easy, integrates automatically with your compliance report 18
  • 38. The Red Flag Compliance Module ‣ Ability to evaluate supplier compliance practices using 19
  • 39. The Red Flag Compliance Module ‣ Access individual identity recovery protection using FraudStop and Restore from ID Experts ‣ Available as employee benefit, cafeteria-style add-on, customer blanket, or new revenue stream ‣ In the event of a breach, one-click access to best-in- breed data breach services and forensic services 20
  • 40. So I’m compliant... ‣ NOW WHAT? ‣ Don’t let it sit on a shelf ‣ Talk to your employees ‣ Talk to your patients ‣ Use your policy as a practice-building tool 21
  • 41. A final word ‣ “I understand the mindset of other dentists in practice for themselves, and that it is easy to minimize identity theft as a business threat or a patient care issue. It is low on their list of priorities, which is unfortunate because if and when a patient data breach occurs, we are by law responsible. I personally would recommend that dentists act with a sense of urgency to become compliant with the FTC ‘Red Flag Rules’ both to avoid penalty and to protect your patients from a life-wrenching identity theft experience. You’ll be protecting yourself as well, and as a result, will sleep better at night.” Dr. Miles Collett, DDS 22
  • 42. Thank you! ‣ To learn more, please visit idBUSINESS.com ‣ Discounts are available for some dental associations - check with your association or call Carla Adams, 303-810-3091 23