Investigating and Reporting Suspected Fraud and Abuse Sample Clauses

Investigating and Reporting Suspected Fraud and Abuse. The Contractor shall have methods and criteria for identifying suspected Medicaid fraud and abuse. The Contractor shall initiate an investigation of possible Medicaid fraud and abuse based upon a variety of data sources, including but not limited to the following: • Claims data mining to identify aberrant billing patterns • Feedback from enrollees based upon EOMB transmittal processes • Calls received on the Contractor’s toll-free telephone number for reporting possible Medicaid fraud and abuse • Peer profiling and provider credentialing functions • Analyses of utilization management reports and prior authorization requests • Monthly reviews of the CMS’ List of Excluded Individuals and Entities (LEIE) and the System for Award Management (XXX) • Queries from State or Federal agencies At the conclusion of its initial investigation, in the event that the Contractor determines that possible provider or vendor fraud and/or abuse has been identified, then the Contractor will notify the RI EOHHS and the State’s Medicaid Fraud Control Unit (MFCU) at the RI Department of the Attorney General (RI DAG) by secure electronic mail of its findings using a referral template established by the RI EOHHS. This notification by the Contractor must take place within five (5) business days of the Contractor’s conclusion of its initial investigation. In addition to reporting any suspected cases of provider or vendor fraud and/or abuse to the Medicaid Fraud Control Unit (MFCU) within five (5) business days following the close of an initial investigation, the Contractor shall also submit quarterly reports to EOHHS and to the State’s Medicaid Fraud Control Unit documenting the Contractor’s open and closed cases. The quarterly reports shall be formatted in conformance with requirements established by the Rhode Island Medicaid Managed Care Fraud and Abuse Prevention, Detection and Reporting Requirements for members and shall document all open and closed cases of suspected provider and vendor fraud and/or abuse. These quarterly reporting requirements are addressed further in Section 2.13.06 (Fraud and Abuse Reports).
AutoNDA by SimpleDocs

Related to Investigating and Reporting Suspected Fraud and Abuse

  • Fraud, Waste, and Abuse Contractor understands that HHS does not tolerate any type of fraud, waste, or abuse. Violations of law, agency policies, or standards of ethical conduct will be investigated, and appropriate actions will be taken. Pursuant to Texas Government Code, Section 321.022, if the administrative head of a department or entity that is subject to audit by the state auditor has reasonable cause to believe that money received from the state by the department or entity or by a client or contractor of the department or entity may have been lost, misappropriated, or misused, or that other fraudulent or unlawful conduct has occurred in relation to the operation of the department or entity, the administrative head shall report the reason and basis for the belief to the Texas State Auditor’s Office (SAO). All employees or contractors who have reasonable cause to believe that fraud, waste, or abuse has occurred (including misconduct by any HHS employee, Grantee officer, agent, employee, or subcontractor that would constitute fraud, waste, or abuse) are required to immediately report the questioned activity to the Health and Human Services Commission's Office of Inspector General. Contractor agrees to comply with all applicable laws, rules, regulations, and System Agency policies regarding fraud, waste, and abuse including, but not limited to, HHS Circular C-027. A report to the SAO must be made through one of the following avenues: ● SAO Toll Free Hotline: 1-800-TX-AUDIT ● SAO website: xxxx://xxx.xxxxx.xxxxx.xx.xx/ All reports made to the OIG must be made through one of the following avenues: ● OIG Toll Free Hotline 0-000-000-0000 ● OIG Website: XxxxxxXxxxxXxxxx.xxx ● Internal Affairs Email: XxxxxxxxXxxxxxxXxxxxxxx@xxxx.xxxxx.xx.xx ● OIG Hotline Email: XXXXxxxxXxxxxxx@xxxx.xxxxx.xx.xx. ● OIG Mailing Address: Office of Inspector General Attn: Fraud Hotline MC 1300 P.O. Box 85200 Austin, Texas 78708-5200

  • Fraud, Xxxxx and Abuse If you have concerns about being billed for services you never received, or that your insurance information has been stolen or used by someone else, you may report potential health care fraud, waste or abuse to our Special Investigations Unit by using our confidential anti-fraud hotline at 0-000-000-0000 or by email at XXX@xxxxxx.xxx. You may also send an anonymous letter to us at: Blue Cross & Blue Shield of Rhode Island Special Investigations Unit 000 Xxxxxxxx Xxxxxx Providence RI, 02903

  • Fraud and Abuse The Company, the Shareholders and all persons and entities providing professional services for the Company's business have not, to the knowledge of the Company and the Shareholders, engaged in any activities which are prohibited under ss. 1320a-7b or ss. 1395nn of Title 42 of the United States Code or the regulations promulgated thereunder, or related state or local statutes or regulations, or which are prohibited by rules of professional conduct, including, but not limited to, the following: (a) knowingly and willfully making or causing to be made a false statement or representation of a material fact in any application for any benefit or payment; (b) knowingly and willfully making or causing to be made any false statement or representation of a material fact for use in determining rights to any benefit or payment; (c) any failure by a claimant to disclose knowledge of the occurrence of any event affecting the initial or continued right to any benefit or payment on its own behalf or on behalf of another, with the intent to fraudulently secure such benefit or payment; and (d) knowingly and willfully soliciting or receiving any remuneration (including any kickback, bribe or rebate) directly or indirectly, overtly or covertly, in cash or in kind, or offering to pay or receive such remuneration (i) in return for referring an individual to a person for the furnishing or arranging for the furnishing of any item or service for which payment may be made in whole or in part by Medicare or Medicaid, or (ii) in return for purchasing, leasing or ordering or arranging for, or recommending, purchasing, leasing or ordering any good, facility, service or item for which payment may be made in whole or in part by Medicare or Medicaid, or (e) referring a patient for designated health services to or providing designated health services to a patient upon referral from an entity or person with which the orthodontist or an immediate family member has a financial relationship, and to which no exception under ss.1395nn of Title 42 of the United States Code applies.

  • CHILD AND DEPENDENT ADULT/ELDER ABUSE REPORTING CONTRACTOR shall establish a procedure acceptable to ADMINISTRATOR to ensure that all employees, agents, subcontractors, and all other individuals performing services under this Agreement report child abuse or neglect to one of the agencies specified in Penal Code Section 11165.9 and dependent adult or elder abuse as defined in Section 15610.07 of the WIC to one of the agencies specified in WIC Section 15630. CONTRACTOR shall require such employees, agents, subcontractors, and all other individuals performing services under this Agreement to sign a statement acknowledging the child abuse reporting requirements set forth in Sections 11166 and 11166.05 of the Penal Code and the dependent adult and elder abuse reporting requirements, as set forth in Section 15630 of the WIC, and shall comply with the provisions of these code sections, as they now exist or as they may hereafter be amended.

  • Documenting and Reporting Breaches 6.1 Business Associate shall report to Covered Entity any Breach of Unsecured PHI, including Breaches reported to it by a Subcontractor, as soon as it (or any of its employees or agents) becomes aware of any such Breach, and in no case later than two (2) business days after it (or any of its employees or agents) becomes aware of the Breach, except when a law enforcement official determines that a notification would impede a criminal investigation or cause damage to national security.

  • Monitoring and Reporting 3.1 The Contractor shall provide workforce monitoring data as detailed in paragraph 3.2 of this Schedule 8. A template for data collected in paragraphs 3.2, 3.3 and 3.4 will be provided by the Authority. Completed templates for the Contractor and each Sub-contractor will be submitted by the Contractor with the Diversity and Equality Delivery Plan within six (6) Months of the Commencement Date and annually thereafter. Contractors are required to provide workforce monitoring data for the workforce involved in delivery of the Contract. Data relating to the wider Contractor workforce and wider Sub-contractors workforce would however be well received by the Authority. Contractors and any Sub-contractors are required to submit percentage figures only in response to paragraphs 3.2(a), 3.2(b) and 3.2(c).

  • CHILD ABUSE REPORTING CONTRACTOR hereby agrees to annually train all staff members, including volunteers, so that they are familiar with and agree to adhere to its own child and dependent adult abuse reporting obligations and procedures as specified in California Penal Code section 11165.7, AB 1432, and Education Code 44691. To protect the privacy rights of all parties involved (i.e., reporter, child and alleged abuser), reports will remain confidential as required by law and professional ethical mandates. A written statement acknowledging the legal requirements of such reporting and verification of staff adherence to such reporting shall be submitted to the LEA.

  • Governance and Anticorruption 14. The Borrower, the Project Executing Agency, and the implementing agencies shall (a) comply with ADB’s Anticorruption Policy (1998, as amended to date) and acknowledge that ADB reserves the right to investigate directly, or through its agents, any alleged corrupt, fraudulent, collusive or coercive practice relating to the Project; and

  • Safeguards Monitoring and Reporting 8. The Borrower shall do the following or cause the Project Executing Agency to do the following:

  • Security Breach Notice and Reporting The Contractor shall have policies and procedures in place for the effective management of Security Breaches, as defined below, which shall be made available to the State upon request. In addition to the requirements set forth in any applicable Business Associate Agreement as may be attached to this Contract, in the event of any actual security breach or reasonable belief of an actual security breach the Contractor either suffers or learns of that either compromises or could compromise State Data (a “Security Breach”), the Contractor shall notify the State within 24 hours of its discovery. Contractor shall immediately determine the nature and extent of the Security Breach, contain the incident by stopping the unauthorized practice, recover records, shut down the system that was breached, revoke access and/or correct weaknesses in physical security. Contractor shall report to the State: (i) the nature of the Security Breach; (ii) the State Data used or disclosed; (iii) who made the unauthorized use or received the unauthorized disclosure; (iv) what the Contractor has done or shall do to mitigate any deleterious effect of the unauthorized use or disclosure; and (v) what corrective action the Contractor has taken or shall take to prevent future similar unauthorized use or disclosure. The Contractor shall provide such other information, including a written report, as reasonably requested by the State. Contractor shall analyze and document the incident and provide all notices required by applicable law. In accordance with Section 9 V.S.A. §2435(b)(3), the Contractor shall notify the Office of the Attorney General, or, if applicable, Vermont Department of Financial Regulation (“DFR”), within fourteen (14) business days of the Contractor’s discovery of the Security Breach. The notice shall provide a preliminary description of the breach. The foregoing notice requirement shall be included in the subcontracts of any of Contractor’s subcontractors, affiliates or agents which may be “data collectors” hereunder. The Contractor agrees to fully cooperate with the State and assume responsibility at its own expense for the following, to be determined in the sole discretion of the State: (i) notice to affected consumers if the State determines it to be appropriate under the circumstances of any particular Security Breach, in a form recommended by the AGO; and (ii) investigation and remediation associated with a Security Breach, including but not limited to, outside investigation, forensics, counsel, crisis management and credit monitoring, in the sole determination of the State. The Contractor agrees to comply with all applicable laws, as such laws may be amended from time to time (including, but not limited to, Chapter 62 of Title 9 of the Vermont Statutes and all applicable State and federal laws, rules or regulations) that require notification in the event of unauthorized release of personally-identifiable information or other event requiring notification. In addition to any other indemnification obligations in this Contract, the Contractor shall fully indemnify and save harmless the State from any costs, loss or damage to the State resulting from a Security Breach or the unauthorized disclosure of State Data by the Contractor, its officers, agents, employees, and subcontractors.

Time is Money Join Law Insider Premium to draft better contracts faster.