SlideShare a Scribd company logo
Red Flag Compliance for Dental Practices
            May 17, 2009

                                           1
Our goals today




                  2
Our goals today
 ‣ To give you the WHAT…




                           2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules




                                2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…




                                2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…
   ‣ demo the idBUSINESS Red Flag Compliance
     Module




                                               2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…
   ‣ demo the idBUSINESS Red Flag Compliance
      Module
 ‣ but also give you the WHY




                                               2
Our goals today
 ‣ To give you the WHAT…
   ‣ The FTC’s Red Flag Rules
 ‣ ...review the HOW…
   ‣ demo the idBUSINESS Red Flag Compliance
      Module
 ‣ but also give you the WHY
   ‣ Why information security should be a part of
      your business



                                                    2
An issue of
PATIENT CARE

    “The possibility for medical identity theft
     gives rises to a duty to monitor for the
   potential that patients may be victims. The
  prudent provider will also monitor employee
      and vendor access to patient data.”

        - World Privacy Forum, 9/24/08


                                                  3
What this means




                  4
What this means
‣ Medical identity theft is on the rise
  ‣ Costs $192 per record to restore
  ‣ Often an inside job
  ‣ Organized crime is involved




                                          4
What this means
‣ Medical identity theft is on the rise
  ‣ Costs $192 per record to restore
  ‣ Often an inside job
  ‣ Organized crime is involved
‣ Dental offices are unique
  ‣ Reliance on office manager to run operations
  ‣ No line between your brand and your name


                                                   4
The Opportunity
‣ There is a unique opportunity to grow a
  practice by leveraging strong information
  security policy and sharing it with patients
  ‣ Build trust with patients
  ‣ Strengthen employee relationships
  ‣ Tighten operations with vendors




                                                 5
The facts

                                                30%
     40%

                      60%
                                                             70%



     Business has suffered breach         Thief is employee or knows employee
     Business has yet to incur a breach   Thief is unknown


 •   Since 2/15/05, over 251,000,000 Americans have had
     identities or other personal information compromised




                                                                                6
The facts
The average breach and its impact on customer confidence is growing.


                                            58% of customers will
                                            lose confidence in your
                                            business after a breach.




                                            31% of your customers
                                            will immediately cease
                                            doing business with
                                            you following a breach.




Source: Ponemon Institute, 2008.



                                                                       7
The Red Flag Rules




                     8
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act




                                                8
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:




                                                8
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:
  ‣ you hold “covered accounts”




                                                8
The Red Flag Rules
‣ Sections 114 & 315 of the Fair and Accurate
  Credit Transactions Act
‣ Applies to you if:
  ‣ you hold “covered accounts”
  ‣ your customer records present a “reasonably
     foreseeable risk of identity theft”




                                                  8
Why are dentists
COVERED ENTITIES?
‣ Accepting insurance
       ‣ Deferral of 100% of payment, you collect
             enough patient data to collect the remainder
             that insurance does not pay.
‣ Reasonably foreseeable risk
       ‣ Your patient files are a treasure trove
       ‣ Each record worth between $80-300 each*


  * Source: Black Market Identity Auction attended by Net Reaction mole, 2008.

                                                                                 9
Red Flag
REQUIREMENTS




               10
Red Flag
REQUIREMENTS
1. A Written Information Security Program




                                            10
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft




                                                                10
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management




                                                                10
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis




                                                                10
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees




                                                                10
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees
6. Must contain an incident response capability




                                                                10
Red Flag
REQUIREMENTS
1. A Written Information Security Program
2. Controls to prevent and mitigate the risks associated with
   identity theft
3. Must be administered by a board of directors or a member
   of senior management
4. Must deliver compliance report on at least an annual basis
5. Must contain mechanism to train employees
6. Must contain an incident response capability
7. Must ensure that vendors and suppliers are also compliant



                                                                10
“What happens
if I don’t comply?”
• Noncompliance carries several penalties
  – Civil Liability
  – Class-Action Lawsuits
  – Federal Fines
  – State Fines




                                            11
“Didn’t the ADA
send me something?”
• The ADA’s written template still leaves you
  vulnerable:
  – No vendor integrity assessment
  – No employee training, just signature line
  – No mitigation of damages in the event of an incident
    • Who will you call when you have a question?
• No context of how Red Flag Policy fits into your business
  – What’s worth doing is worth doing right.
  – Missing an opportunity to GROW your practice


                                                              12
The solution
‣ The idBUSINESS Red Flag Compliance Module
  ‣ Built on real-world forensic fieldwork
  ‣ Includes tools & benefits that actively involve
    employees in your compliance efforts
  ‣ Transitions information security from a
    compliance issue into a competitive advantage




                                                      13
The Red Flag
Compliance Module




‣ Secure online interface

                            14
The Red Flag
Compliance Module




‣ Learning tools available as text or video webinar
                                                      15
The Red Flag
Compliance Module




‣ Risk Assessment tool provides ranking of your
   company in 12 key focus areas
                                                  16
The Red Flag
Compliance Module




‣ Customizable checklist of 26 Red Flags to meet
   requirements of FACT Act
                                                   17
The Red Flag
Compliance Module




‣ Employee training automated & easy, integrates
   automatically with your compliance report
                                                   18
The Red Flag
Compliance Module




‣ Ability to evaluate supplier compliance practices using
                                                        19
The Red Flag
Compliance Module



‣ Access individual identity recovery protection using
   FraudStop and Restore from ID Experts
  ‣   Available as employee benefit, cafeteria-style add-on,
      customer blanket, or new revenue stream
‣ In the event of a breach, one-click access to best-in-
   breed data breach services and forensic services


                                                           20
So I’m compliant...
  ‣ NOW WHAT?
    ‣ Don’t let it sit on a shelf
    ‣ Talk to your employees
    ‣ Talk to your patients
  ‣ Use your policy as a practice-building tool




                                                  21
A final word
‣   “I understand the mindset of other dentists in practice for themselves, and that it is easy
    to minimize identity theft as a business threat or a patient care issue. It is low on their
    list of priorities, which is unfortunate because if and when a patient data breach occurs,
    we are by law responsible. I personally would recommend that dentists act with a sense
    of urgency to become compliant with the FTC ‘Red Flag Rules’ both to avoid penalty
    and to protect your patients from a life-wrenching identity theft experience. You’ll be
    protecting yourself as well, and as a result, will sleep better at night.”

                                                                          Dr. Miles Collett, DDS




                                                                                                   22
Thank you!
 ‣ To learn more, please visit idBUSINESS.com
 ‣ Discounts are available for some dental
   associations - check with your association or call
   Carla Adams, 303-810-3091




                                                        23

More Related Content

What's hot

2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
Gene Kim
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
SAS Institute India Pvt. Ltd
 
The paypers Vol 5.
The paypers Vol 5. The paypers Vol 5.
The paypers Vol 5. EastNets
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
CBIZ, Inc.
 
Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation
TransUnion
 
Passwords don't work multifactor controls do!
Passwords don't work   multifactor controls do!Passwords don't work   multifactor controls do!
Passwords don't work multifactor controls do!
FitCEO, Inc. (FCI)
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3
techcouncil
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf mattsson webinar jun 7 2012   slideshare versionUlf mattsson webinar jun 7 2012   slideshare version
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf Mattsson
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
rkappear
 
Fraud Detection Using A Database Platform
Fraud Detection Using A Database PlatformFraud Detection Using A Database Platform
Fraud Detection Using A Database Platform
EZ-R Stats, LLC
 
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CloudIDSummit
 
The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White List
derektop
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
FraudBusters
 
Avoiding IT Litigation with Great IT & Software Development Contracts
Avoiding IT Litigation with Great IT & Software Development ContractsAvoiding IT Litigation with Great IT & Software Development Contracts
Avoiding IT Litigation with Great IT & Software Development Contracts
Warren S. Reid
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
FraudBusters
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
FraudBusters
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
FraudBusters
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
FraudBusters
 

What's hot (18)

2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
 
Fraud Management Solutions
Fraud Management SolutionsFraud Management Solutions
Fraud Management Solutions
 
The paypers Vol 5.
The paypers Vol 5. The paypers Vol 5.
The paypers Vol 5.
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation Doubling Down Winning over your VIP Customers Webinar with iovation
Doubling Down Winning over your VIP Customers Webinar with iovation
 
Passwords don't work multifactor controls do!
Passwords don't work   multifactor controls do!Passwords don't work   multifactor controls do!
Passwords don't work multifactor controls do!
 
Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3Emids Morning Security Virtual India V3
Emids Morning Security Virtual India V3
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf mattsson webinar jun 7 2012   slideshare versionUlf mattsson webinar jun 7 2012   slideshare version
Ulf mattsson webinar jun 7 2012 slideshare version
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
Fraud Detection Using A Database Platform
Fraud Detection Using A Database PlatformFraud Detection Using A Database Platform
Fraud Detection Using A Database Platform
 
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
CIS13: From Governance to Virtualization: The Expanding Arena of Privileged I...
 
The Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White ListThe Power of a Black List, the Promise of a White List
The Power of a Black List, the Promise of a White List
 
Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics Vendor Master File Fraud Detection and Prevention Using Data Analytics
Vendor Master File Fraud Detection and Prevention Using Data Analytics
 
Avoiding IT Litigation with Great IT & Software Development Contracts
Avoiding IT Litigation with Great IT & Software Development ContractsAvoiding IT Litigation with Great IT & Software Development Contracts
Avoiding IT Litigation with Great IT & Software Development Contracts
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 

Viewers also liked

Art To Heart
Art To HeartArt To Heart
Art To Heartpslthomas
 
Change The World (Highlights)
Change The World (Highlights)Change The World (Highlights)
Change The World (Highlights)
Change the World Corp
 
Project Skylab: Helping You Get Your Cloud On
Project Skylab: Helping You Get Your Cloud OnProject Skylab: Helping You Get Your Cloud On
Project Skylab: Helping You Get Your Cloud On
craigbalding
 
Presentation1[1]
Presentation1[1]Presentation1[1]
Presentation1[1]khinkamper
 
Useful Tools Preso 6.24.2009
Useful Tools Preso 6.24.2009Useful Tools Preso 6.24.2009
Useful Tools Preso 6.24.2009
Rick Huebsch
 
Presentation1[1]
Presentation1[1]Presentation1[1]
Presentation1[1]khinkamper
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Balding
craigbalding
 
Early Childhood Development
Early Childhood DevelopmentEarly Childhood Development
Early Childhood Developmentguest5f348a5
 
Presentaci2n De Teed
Presentaci2n De TeedPresentaci2n De Teed
Presentaci2n De Teed
osvaldoroman69
 
P R E S E N T A C I O N M U L T I M E D I A
P R E S E N T A C I O N  M U L T I M E D I AP R E S E N T A C I O N  M U L T I M E D I A
P R E S E N T A C I O N M U L T I M E D I A
capptito
 

Viewers also liked (15)

Art To Heart
Art To HeartArt To Heart
Art To Heart
 
Change The World (Highlights)
Change The World (Highlights)Change The World (Highlights)
Change The World (Highlights)
 
Project Skylab: Helping You Get Your Cloud On
Project Skylab: Helping You Get Your Cloud OnProject Skylab: Helping You Get Your Cloud On
Project Skylab: Helping You Get Your Cloud On
 
Sect 1.1 1.4
Sect 1.1 1.4Sect 1.1 1.4
Sect 1.1 1.4
 
You Are More Than Your Resume
You Are More Than Your ResumeYou Are More Than Your Resume
You Are More Than Your Resume
 
Presentation1[1]
Presentation1[1]Presentation1[1]
Presentation1[1]
 
Useful Tools Preso 6.24.2009
Useful Tools Preso 6.24.2009Useful Tools Preso 6.24.2009
Useful Tools Preso 6.24.2009
 
E Learning Guild E Magazine Article
E Learning Guild E Magazine ArticleE Learning Guild E Magazine Article
E Learning Guild E Magazine Article
 
Interview With Chani Pangali
Interview With Chani PangaliInterview With Chani Pangali
Interview With Chani Pangali
 
Nice Copy Of Article With Header
Nice Copy Of Article With HeaderNice Copy Of Article With Header
Nice Copy Of Article With Header
 
Presentation1[1]
Presentation1[1]Presentation1[1]
Presentation1[1]
 
A Cloud Security Ghost Story Craig Balding
A Cloud Security Ghost Story   Craig BaldingA Cloud Security Ghost Story   Craig Balding
A Cloud Security Ghost Story Craig Balding
 
Early Childhood Development
Early Childhood DevelopmentEarly Childhood Development
Early Childhood Development
 
Presentaci2n De Teed
Presentaci2n De TeedPresentaci2n De Teed
Presentaci2n De Teed
 
P R E S E N T A C I O N M U L T I M E D I A
P R E S E N T A C I O N  M U L T I M E D I AP R E S E N T A C I O N  M U L T I M E D I A
P R E S E N T A C I O N M U L T I M E D I A
 

Similar to idBUSINESS Red Flag Rules For Dentists

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
FraudBusters
 
Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!
pdallen
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)
NAFCU Services Corporation
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
FraudBusters
 
Fraud Training for Auditees (1).pptx
Fraud Training for Auditees (1).pptxFraud Training for Auditees (1).pptx
Fraud Training for Auditees (1).pptx
QualityAdviceService
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
Strategic Treasurer
 
Business Resilience
Business ResilienceBusiness Resilience
Business Resilience
rix57
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Pairat Srivilairit
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Pairat Srivilairit
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
 
PCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailPCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for Retail
InDefense Security
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
Metaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
Metaorange
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls PresentationBill Lisse
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
Swapnil Jagtap
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure BrochureDave Lloyd
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
Wynyard Group
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Perficient, Inc.
 

Similar to idBUSINESS Red Flag Rules For Dentists (20)

Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!Red Flag Rules Compliant? Maybe Not...!
Red Flag Rules Compliant? Maybe Not...!
 
Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)Data Breaches Preparedness (Credit Union Conference Session)
Data Breaches Preparedness (Credit Union Conference Session)
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Fraud Training for Auditees (1).pptx
Fraud Training for Auditees (1).pptxFraud Training for Auditees (1).pptx
Fraud Training for Auditees (1).pptx
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Banks payback for non compliance and money laundering
Banks payback for non  compliance and money launderingBanks payback for non  compliance and money laundering
Banks payback for non compliance and money laundering
 
Business Resilience
Business ResilienceBusiness Resilience
Business Resilience
 
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...
 
Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4Cdic 2009 fraud audit pairat 4
Cdic 2009 fraud audit pairat 4
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
PCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for RetailPCI Compliance Myths, Reality and Solutions for Retail
PCI Compliance Myths, Reality and Solutions for Retail
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
Information and Cyber Warfare
Information and Cyber WarfareInformation and Cyber Warfare
Information and Cyber Warfare
 
Signacure Brochure
Signacure BrochureSignacure Brochure
Signacure Brochure
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 

Recently uploaded

Couples presenting to the infertility clinic- Do they really have infertility...
Couples presenting to the infertility clinic- Do they really have infertility...Couples presenting to the infertility clinic- Do they really have infertility...
Couples presenting to the infertility clinic- Do they really have infertility...
Sujoy Dasgupta
 
Lung Cancer: Artificial Intelligence, Synergetics, Complex System Analysis, S...
Lung Cancer: Artificial Intelligence, Synergetics, Complex System Analysis, S...Lung Cancer: Artificial Intelligence, Synergetics, Complex System Analysis, S...
Lung Cancer: Artificial Intelligence, Synergetics, Complex System Analysis, S...
Oleg Kshivets
 
MANAGEMENT OF ATRIOVENTRICULAR CONDUCTION BLOCK.pdf
MANAGEMENT OF ATRIOVENTRICULAR CONDUCTION BLOCK.pdfMANAGEMENT OF ATRIOVENTRICULAR CONDUCTION BLOCK.pdf
MANAGEMENT OF ATRIOVENTRICULAR CONDUCTION BLOCK.pdf
Jim Jacob Roy
 
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...
VarunMahajani
 
Triangles of Neck and Clinical Correlation by Dr. RIG.pptx
Triangles of Neck and Clinical Correlation by Dr. RIG.pptxTriangles of Neck and Clinical Correlation by Dr. RIG.pptx
Triangles of Neck and Clinical Correlation by Dr. RIG.pptx
Dr. Rabia Inam Gandapore
 
Hemodialysis: Chapter 3, Dialysis Water Unit - Dr.Gawad
Hemodialysis: Chapter 3, Dialysis Water Unit - Dr.GawadHemodialysis: Chapter 3, Dialysis Water Unit - Dr.Gawad
Hemodialysis: Chapter 3, Dialysis Water Unit - Dr.Gawad
NephroTube - Dr.Gawad
 
THOA 2.ppt Human Organ Transplantation Act
THOA 2.ppt Human Organ Transplantation ActTHOA 2.ppt Human Organ Transplantation Act
THOA 2.ppt Human Organ Transplantation Act
DrSathishMS1
 
Ocular injury ppt Upendra pal optometrist upums saifai etawah
Ocular injury  ppt  Upendra pal  optometrist upums saifai etawahOcular injury  ppt  Upendra pal  optometrist upums saifai etawah
Ocular injury ppt Upendra pal optometrist upums saifai etawah
pal078100
 
24 Upakrama.pptx class ppt useful in all
24 Upakrama.pptx class ppt useful in all24 Upakrama.pptx class ppt useful in all
24 Upakrama.pptx class ppt useful in all
DrSathishMS1
 
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
bkling
 
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTSARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
Dr. Vinay Pareek
 
HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...
HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...
HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...
GL Anaacs
 
Antiulcer drugs Advance Pharmacology .pptx
Antiulcer drugs Advance Pharmacology .pptxAntiulcer drugs Advance Pharmacology .pptx
Antiulcer drugs Advance Pharmacology .pptx
Rohit chaurpagar
 
Flu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore KarnatakaFlu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore Karnataka
addon Scans
 
BENIGN PROSTATIC HYPERPLASIA.BPH. BPHpdf
BENIGN PROSTATIC HYPERPLASIA.BPH. BPHpdfBENIGN PROSTATIC HYPERPLASIA.BPH. BPHpdf
BENIGN PROSTATIC HYPERPLASIA.BPH. BPHpdf
DR SETH JOTHAM
 
Prix Galien International 2024 Forum Program
Prix Galien International 2024 Forum ProgramPrix Galien International 2024 Forum Program
Prix Galien International 2024 Forum Program
Levi Shapiro
 
Cervical & Brachial Plexus By Dr. RIG.pptx
Cervical & Brachial Plexus By Dr. RIG.pptxCervical & Brachial Plexus By Dr. RIG.pptx
Cervical & Brachial Plexus By Dr. RIG.pptx
Dr. Rabia Inam Gandapore
 
For Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #Girls
For Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #GirlsFor Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #Girls
For Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #Girls
Savita Shen $i11
 
POST OPERATIVE OLIGURIA and its management
POST OPERATIVE OLIGURIA and its managementPOST OPERATIVE OLIGURIA and its management
POST OPERATIVE OLIGURIA and its management
touseefaziz1
 
Non-respiratory Functions of the Lungs.pdf
Non-respiratory Functions of the Lungs.pdfNon-respiratory Functions of the Lungs.pdf
Non-respiratory Functions of the Lungs.pdf
MedicoseAcademics
 

Recently uploaded (20)

Couples presenting to the infertility clinic- Do they really have infertility...
Couples presenting to the infertility clinic- Do they really have infertility...Couples presenting to the infertility clinic- Do they really have infertility...
Couples presenting to the infertility clinic- Do they really have infertility...
 
Lung Cancer: Artificial Intelligence, Synergetics, Complex System Analysis, S...
Lung Cancer: Artificial Intelligence, Synergetics, Complex System Analysis, S...Lung Cancer: Artificial Intelligence, Synergetics, Complex System Analysis, S...
Lung Cancer: Artificial Intelligence, Synergetics, Complex System Analysis, S...
 
MANAGEMENT OF ATRIOVENTRICULAR CONDUCTION BLOCK.pdf
MANAGEMENT OF ATRIOVENTRICULAR CONDUCTION BLOCK.pdfMANAGEMENT OF ATRIOVENTRICULAR CONDUCTION BLOCK.pdf
MANAGEMENT OF ATRIOVENTRICULAR CONDUCTION BLOCK.pdf
 
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...
Pulmonary Thromboembolism - etilogy, types, medical- Surgical and nursing man...
 
Triangles of Neck and Clinical Correlation by Dr. RIG.pptx
Triangles of Neck and Clinical Correlation by Dr. RIG.pptxTriangles of Neck and Clinical Correlation by Dr. RIG.pptx
Triangles of Neck and Clinical Correlation by Dr. RIG.pptx
 
Hemodialysis: Chapter 3, Dialysis Water Unit - Dr.Gawad
Hemodialysis: Chapter 3, Dialysis Water Unit - Dr.GawadHemodialysis: Chapter 3, Dialysis Water Unit - Dr.Gawad
Hemodialysis: Chapter 3, Dialysis Water Unit - Dr.Gawad
 
THOA 2.ppt Human Organ Transplantation Act
THOA 2.ppt Human Organ Transplantation ActTHOA 2.ppt Human Organ Transplantation Act
THOA 2.ppt Human Organ Transplantation Act
 
Ocular injury ppt Upendra pal optometrist upums saifai etawah
Ocular injury  ppt  Upendra pal  optometrist upums saifai etawahOcular injury  ppt  Upendra pal  optometrist upums saifai etawah
Ocular injury ppt Upendra pal optometrist upums saifai etawah
 
24 Upakrama.pptx class ppt useful in all
24 Upakrama.pptx class ppt useful in all24 Upakrama.pptx class ppt useful in all
24 Upakrama.pptx class ppt useful in all
 
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
 
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTSARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
 
HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...
HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...
HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...
 
Antiulcer drugs Advance Pharmacology .pptx
Antiulcer drugs Advance Pharmacology .pptxAntiulcer drugs Advance Pharmacology .pptx
Antiulcer drugs Advance Pharmacology .pptx
 
Flu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore KarnatakaFlu Vaccine Alert in Bangalore Karnataka
Flu Vaccine Alert in Bangalore Karnataka
 
BENIGN PROSTATIC HYPERPLASIA.BPH. BPHpdf
BENIGN PROSTATIC HYPERPLASIA.BPH. BPHpdfBENIGN PROSTATIC HYPERPLASIA.BPH. BPHpdf
BENIGN PROSTATIC HYPERPLASIA.BPH. BPHpdf
 
Prix Galien International 2024 Forum Program
Prix Galien International 2024 Forum ProgramPrix Galien International 2024 Forum Program
Prix Galien International 2024 Forum Program
 
Cervical & Brachial Plexus By Dr. RIG.pptx
Cervical & Brachial Plexus By Dr. RIG.pptxCervical & Brachial Plexus By Dr. RIG.pptx
Cervical & Brachial Plexus By Dr. RIG.pptx
 
For Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #Girls
For Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #GirlsFor Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #Girls
For Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #Girls
 
POST OPERATIVE OLIGURIA and its management
POST OPERATIVE OLIGURIA and its managementPOST OPERATIVE OLIGURIA and its management
POST OPERATIVE OLIGURIA and its management
 
Non-respiratory Functions of the Lungs.pdf
Non-respiratory Functions of the Lungs.pdfNon-respiratory Functions of the Lungs.pdf
Non-respiratory Functions of the Lungs.pdf
 

idBUSINESS Red Flag Rules For Dentists

  • 1. Red Flag Compliance for Dental Practices May 17, 2009 1
  • 3. Our goals today ‣ To give you the WHAT… 2
  • 4. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules 2
  • 5. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… 2
  • 6. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… ‣ demo the idBUSINESS Red Flag Compliance Module 2
  • 7. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… ‣ demo the idBUSINESS Red Flag Compliance Module ‣ but also give you the WHY 2
  • 8. Our goals today ‣ To give you the WHAT… ‣ The FTC’s Red Flag Rules ‣ ...review the HOW… ‣ demo the idBUSINESS Red Flag Compliance Module ‣ but also give you the WHY ‣ Why information security should be a part of your business 2
  • 9. An issue of PATIENT CARE “The possibility for medical identity theft gives rises to a duty to monitor for the potential that patients may be victims. The prudent provider will also monitor employee and vendor access to patient data.” - World Privacy Forum, 9/24/08 3
  • 11. What this means ‣ Medical identity theft is on the rise ‣ Costs $192 per record to restore ‣ Often an inside job ‣ Organized crime is involved 4
  • 12. What this means ‣ Medical identity theft is on the rise ‣ Costs $192 per record to restore ‣ Often an inside job ‣ Organized crime is involved ‣ Dental offices are unique ‣ Reliance on office manager to run operations ‣ No line between your brand and your name 4
  • 13. The Opportunity ‣ There is a unique opportunity to grow a practice by leveraging strong information security policy and sharing it with patients ‣ Build trust with patients ‣ Strengthen employee relationships ‣ Tighten operations with vendors 5
  • 14. The facts 30% 40% 60% 70% Business has suffered breach Thief is employee or knows employee Business has yet to incur a breach Thief is unknown • Since 2/15/05, over 251,000,000 Americans have had identities or other personal information compromised 6
  • 15. The facts The average breach and its impact on customer confidence is growing. 58% of customers will lose confidence in your business after a breach. 31% of your customers will immediately cease doing business with you following a breach. Source: Ponemon Institute, 2008. 7
  • 16. The Red Flag Rules 8
  • 17. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act 8
  • 18. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: 8
  • 19. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: ‣ you hold “covered accounts” 8
  • 20. The Red Flag Rules ‣ Sections 114 & 315 of the Fair and Accurate Credit Transactions Act ‣ Applies to you if: ‣ you hold “covered accounts” ‣ your customer records present a “reasonably foreseeable risk of identity theft” 8
  • 21. Why are dentists COVERED ENTITIES? ‣ Accepting insurance ‣ Deferral of 100% of payment, you collect enough patient data to collect the remainder that insurance does not pay. ‣ Reasonably foreseeable risk ‣ Your patient files are a treasure trove ‣ Each record worth between $80-300 each* * Source: Black Market Identity Auction attended by Net Reaction mole, 2008. 9
  • 23. Red Flag REQUIREMENTS 1. A Written Information Security Program 10
  • 24. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 10
  • 25. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 10
  • 26. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 10
  • 27. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 10
  • 28. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 6. Must contain an incident response capability 10
  • 29. Red Flag REQUIREMENTS 1. A Written Information Security Program 2. Controls to prevent and mitigate the risks associated with identity theft 3. Must be administered by a board of directors or a member of senior management 4. Must deliver compliance report on at least an annual basis 5. Must contain mechanism to train employees 6. Must contain an incident response capability 7. Must ensure that vendors and suppliers are also compliant 10
  • 30. “What happens if I don’t comply?” • Noncompliance carries several penalties – Civil Liability – Class-Action Lawsuits – Federal Fines – State Fines 11
  • 31. “Didn’t the ADA send me something?” • The ADA’s written template still leaves you vulnerable: – No vendor integrity assessment – No employee training, just signature line – No mitigation of damages in the event of an incident • Who will you call when you have a question? • No context of how Red Flag Policy fits into your business – What’s worth doing is worth doing right. – Missing an opportunity to GROW your practice 12
  • 32. The solution ‣ The idBUSINESS Red Flag Compliance Module ‣ Built on real-world forensic fieldwork ‣ Includes tools & benefits that actively involve employees in your compliance efforts ‣ Transitions information security from a compliance issue into a competitive advantage 13
  • 33. The Red Flag Compliance Module ‣ Secure online interface 14
  • 34. The Red Flag Compliance Module ‣ Learning tools available as text or video webinar 15
  • 35. The Red Flag Compliance Module ‣ Risk Assessment tool provides ranking of your company in 12 key focus areas 16
  • 36. The Red Flag Compliance Module ‣ Customizable checklist of 26 Red Flags to meet requirements of FACT Act 17
  • 37. The Red Flag Compliance Module ‣ Employee training automated & easy, integrates automatically with your compliance report 18
  • 38. The Red Flag Compliance Module ‣ Ability to evaluate supplier compliance practices using 19
  • 39. The Red Flag Compliance Module ‣ Access individual identity recovery protection using FraudStop and Restore from ID Experts ‣ Available as employee benefit, cafeteria-style add-on, customer blanket, or new revenue stream ‣ In the event of a breach, one-click access to best-in- breed data breach services and forensic services 20
  • 40. So I’m compliant... ‣ NOW WHAT? ‣ Don’t let it sit on a shelf ‣ Talk to your employees ‣ Talk to your patients ‣ Use your policy as a practice-building tool 21
  • 41. A final word ‣ “I understand the mindset of other dentists in practice for themselves, and that it is easy to minimize identity theft as a business threat or a patient care issue. It is low on their list of priorities, which is unfortunate because if and when a patient data breach occurs, we are by law responsible. I personally would recommend that dentists act with a sense of urgency to become compliant with the FTC ‘Red Flag Rules’ both to avoid penalty and to protect your patients from a life-wrenching identity theft experience. You’ll be protecting yourself as well, and as a result, will sleep better at night.” Dr. Miles Collett, DDS 22
  • 42. Thank you! ‣ To learn more, please visit idBUSINESS.com ‣ Discounts are available for some dental associations - check with your association or call Carla Adams, 303-810-3091 23