{"id":2323,"date":"2010-05-05T03:48:10","date_gmt":"2010-05-05T03:48:10","guid":{"rendered":"https:\/\/www.empowerbpo.com\/blog\/?p=2323"},"modified":"2023-03-20T07:24:44","modified_gmt":"2023-03-20T07:24:44","slug":"red-flags-rule-protecting-patient-identity","status":"publish","type":"post","link":"https:\/\/www.empowerelearning.com\/blog\/red-flags-rule-protecting-patient-identity\/","title":{"rendered":"Red Flags Rule: Protecting Patient Identity"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Health-care identity theft causes untrue entries into existing medical records at doctor\u2019s offices, pharmacies, hospitals, and insurance companies. These erroneous entries made to victims\u2019 medical files may not be corrected for years or even not discovered. Medical identity theft victims may not get proper medical treatment or may find their health insurance destroyed. Health-care providers who do false billing of victims of identity theft may be required to disregard all its health-care expenses. Medical identity thieves may steal physician\u2019s name, license number or any other account information, forge a signature or prescriptions. Health-care providers and plans may lose its prestige which in turns results in irreversible business consequences.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To prevent and detect identity theft, the \u201cRed Flags\u201d Rule is enforced by the Federal Trade Commission (FTC) requires all financial institutions and creditors including physician offices, to develop and implement written identity theft prevention program\u00a0 for detection, prevention and mitigation of identity theft in connection with the covered account. As per FTC\u2019s rules, physicians who regularly bill their patients for services rendered are considered creditors and required to comply with the Red Flags rules. Red Flags Rule covers:<\/span><\/p>\n<ul style=\"font-weight: 400;\">\n<li>Insurance Claim Information<\/li>\n<li>Credit Card Details<\/li>\n<li>Tax Identification Numbers<\/li>\n<li>Background checks for employees and service providers<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\">Formerly, health-care industry was tagged as technology laggard as no electronic system maintained for health records. The ultimate objective of Health Care entities is to become highly efficient providers of quality patient care, equip system to maintain electronic health records and information and securely control critical aspects of patient safety care. Complete compliance to Red Flags Rule by health-care sector is necessary to protect the patient identity and protects the organization from penalties and criminal convictions arising due to any lapse.<\/p>\n<p style=\"font-weight: 400;\">Red Flags rule ensures privacy of patient health information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Health-care identity theft causes untrue entries into existing medical records at doctor\u2019s offices, pharmacies, hospitals, and insurance companies. These erroneous entries made to victims\u2019 medical files may not be corrected for years or even not discovered. Medical identity theft victims may not get proper medical treatment or may find their health insurance destroyed. Health-care providers [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[81],"tags":[82],"class_list":["post-2323","post","type-post","status-publish","format-standard","hentry","category-red-flags-rule","tag-red-flags-rule"],"_links":{"self":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/2323","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/comments?post=2323"}],"version-history":[{"count":0,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/2323\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media?parent=2323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/categories?post=2323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/tags?post=2323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}