At the completion of this course participants should be able to:
• Define medical identity theft
• Recall the consequences of medical identity theft
• Identify when an organization is required to comply to the Red Flags Rule
• Comprehend the Red Flags Rule policy and procedures
• Identify the steps of the written Identity Theft Prevention Program
Description:
This course provides an overview of Medical identity theft and the impact it can have on its victims; the importance of keeping protected health information private and secure; how to determine whether or not your organization is required to comply with the Red Flags Rule; the Red Flags Rule policy and procedure; and the steps needed to write an Identity Theft Prevention Program for your organization
Keywords: HIPAA, Red Flags Rule, Red Flags, Medical Identity Theft, Identity Theft, Covered Accounts, Fraud, Electronic Medical Records, Protected Health Information, Privacy, Security