Commercial Repayment Center (CRC) Intake
Date signed: 12/27/2023
PIA Questions | PIA Answers |
---|---|
OPDIV: | CMS |
PIA Unique Identifier: | P-5955437-706419 |
Name: | Commercial Repayment Center (CRC) Intake |
The subject of this PIA is which of the following? | Major Application |
Identify the Enterprise Performance Lifecycle Phase of the system. | Operate |
Is this a FISMA-Reportable system? | Yes |
Does the system include a Website or online application available to and for the use of the general public? | No |
Identify the operator: | Agency |
Is this a new or existing system? | New |
Does the system have Security Authorization (SA)? | No |
Planned Date of Authorization | 7/31/2024 |
Describe the purpose of the system | Within this system, the Medicare Secondary Player (MSP) Commercial Repayment Center (CRC) Intake contractor will utilize internal and CMS systems to review MSP leads for Group Health Plan (GHP) and Non-Group Health Plan (NGHP) cases. The Commercial Repayment Center (CRC) will identify claims and/or services potentially appropriate to the MSP recovery case, issue correspondence regarding the MSP case and validate MSP responsibility from Group Health Plans (GHPs) and Non-Group Health Plans (NGHPs). To develop these cases, the CRC organization consists of staff who support the following processes and functions: correspondence intake and processing, correspondence review and adjudication, financial management, payment receipt and processing, quality assurance, internal audit and incoming telephone call receipt and response. The CRC operates a mail intake service that provides lockbox and incoming media processing. The lockbox function conducts compliant trust accounting services, involving processing of deposits, mapping of payments into the CMS Healthcare Integrated General Ledger Accounting System (HIGLAS) financial management system and issuance of refunds. The incoming media process matches and maps images of communications received for upload into the FILENET system and documentation on the proper account record located in the CMS owned correspondence system known as MSPSC-MA system. |
Describe the type of information the system will collect, maintain (store), or share. (Subsequent questions will identify if this information is PII and ask about the specific data elements) | CRC system maintains patient, provider and Insurer applicable information in relation to Medicare paid claims. This information is NOT collected by the CRC. All claims information contained in CMS’ MSPSC-MA, maintained by systems maintainer General Dynamic Information Technology Services (GDIT) is collected and stored in the CMS' National Claims History (NCH) system which has its own PIA. The CMS MSPSC-MA, which the CRC is a user, contains the following Personally Identifiable Information (PII) about patients: social security number (SSN), taxpayer ID, date of death, therapy records, beneficiary identifier, name, date of birth, mailing address, telephone number, health insurance claim number (HICN), sex, ethnicity, medical notes, medical record information (procedure codes, diagnosis codes, dates of service, total charges, Medicare payment amount) and provider credentials to access the Claims Status website are also stored in the CRC system. The system also contains information about providers, such as: National Provider Identifier (NPI), facility name and address, and provider name and telephone number. PII records are maintained and stored for 7 years unless requested to be deleted. |
Provide an overview of the system and describe the information it will collect, maintain (store), or share, either permanently or temporarily. | The purpose of this contract is for the Centers for Medicare & Medicaid Services (CMS) to exercise its authority under §1893 of the Social Security Act (also 42 U.S.C. 1395ddd), to utilize a Contractor (Performant Recovery, Inc.,) compensated on a contingency fee basis to identify and recover certain payments made under the Medicare program. These payments are for services for which the Medicare program made payment under Part A or B of title XVIII of the Social Security Act, but another party ultimately had primary payment responsibility. Specifically, Performant Recovery, Inc. (“MSP CRC contractor”) shall identify and recover Medicare Secondary Payer (MSP) Group Health Plan (GHP) mistaken payments and certain Non-Group Health Plan (NGHP) conditional payments, based on data collected by the CMS MSPSC-MA. The Contractor shall only pursue those debts where the debtor is not a beneficiary. Under the program, the MSP CRC contractor will utilize CMS systems to review MSP leads for Group Health Plan (GHP) and Non-Group Health Plan (NGHP) cases. The CRC will identify claims and/or services potentially appropriate to the MSP case, issue correspondence regarding the MSP case and timelines and validate MSP responsibility from GHP and certain other NGHP parties. To develop these cases, the CRC operates a call center to handle all incoming calls, receives and images case documentation, conducts dispute and redetermination reviews and updates CMS systems to document all case development activity. The CRC will operate a lockbox and conducts compliant trust accounting services, involving processing of deposits, mapping of payments into the CMS Healthcare Integrated General Ledger Accounting System (HIGLAS) system and issuance of refunds. Data is received from the National Claims History (NCH) database managed by CMS and accessed via a Secure File Transfer Protocol (SFTP) connection over a dedicated network link between CMS and CMS CRC Contractor. Data collected and processed by the CMS CRC Contractor includes the following: - Social Security Number |
Does the system collect, maintain, use or share PII? | Yes |
Indicate the type of PII that the system will collect or maintain. |
|
Indicate the categories of individuals about whom PII is collected, maintained or shared. | Patients |
How many individuals' PII in the system? | 1,000,000 or more |
For what primary purpose is the PII used? | To accurately and properly identify the Group Health Plan or Non-Group Health Plan Medicare debt and the associated Medicare Beneficiary |
Describe the secondary uses for which the PII will be used (e.g. testing, training or research) | None |
Describe the function of the SSN. | By default, the SSN is not leveraged as part of the contract. SSN is at times included in the HICN, but HICN have been transitioned to use Medicare Beneficiary Identifier (MBI). Only historical HICNs may contain SSN. HICN is used for correspondence with providers to identify Medicare claim |
Cite the legal authority to use the SSN. | EXECUTIVE ORDER 9397 NUMBERING SYSTEM FOR FEDERAL ACCOUNTS RELATING TO INDIVIDUAL PERSONS |
Identify legal authorities governing information use and disclosure specific to the system and program. | Sections 1816, and 1874, 1874(a) and 1875 of Title XVIII of the Social Security Act; 42 United States Code (U.S.C.) 1395h, 1395kk, and 1395ll |
Are records on the system retrieved by one or more PII data elements? | Yes |
Identify the number and title of the Privacy Act System of Records (SORN) that is being used to cover the system or identify if a SORN is being developed. | 09-70-0558 National Claims History (NCH) SORN history: 71 FR 67137 (11/20/06); updated 76 FR 65196 (10/20/11), 78 FR 23938 (4/23/13), 78 FR 32257 (5/29/13), *83 FR 6591 (2/14/18) |
Identify the sources of PII in the system: Directly from an individual about whom the information pertains |
|
Identify the sources of PII in the system: Government Sources |
|
Identify the sources of PII in the system: Non-Government Sources | Other - N/A |
Identify the OMB information collection approval number and expiration date | Not applicable. There is no OMB approval number because the system does not collect information from 10 or more members of the public, per the Paperwork Reduction Act |
Is the PII shared with other organizations? | No |
Describe the process in place to notify individuals that their personal information will be collected. If no prior notice is given, explain the reason. | Not applicable. Notice is responsibility of CMS MSP that collects information directly from an individual and that is covered by its own PIA. |
Is the submission of the PII by individuals voluntary or mandatory? | Voluntary |
Describe the method for individuals to opt-out of the collection or use of their PII. If there is no option to object to the information collection, provide a reason. | CRC does not interact with Medicare Beneficiary (patient) directly as part of the MSP CRC contract. Medicare Beneficiary (patient) has no option for opt-out of the collection or use of their PII with MSP CRC. MSP CRC system is not the authoritative source of PII obtained from National Claims History. CRC contractor only receives and does not modify any of the PII from National Claims History. Any such requests for modification of PII will be redirected to CMS MSP COR. In case the beneficiary does contact MSP CRC contractor, the beneficiary is redirected to contact the provider if they believe their PII is inaccurate. Should the Medicare Beneficiary believe their PII has been inappropriately obtained, used, or disclosed by MSP CRC contractor, the MSP CRC compliance department will perform an investigation to include information security on the concern. Should the investigation determine data is inappropriately obtained, used, or disclosed, MSP CRC contractor will submit a security incident ticket with the CMS helpdesk along with any corrective actions required. |
Describe the process to notify and obtain consent from the individuals whose PII is in the system when major changes occur to the system (e.g., disclosure and/or data uses have changes since the notice at the time of original collection). Alternatively, describe why they cannot be notified or have their consent obtained. | MSP CRC does not interact with Medicare Beneficiary (patient) directly as part of the MSP CRC contract and MSP CRC system is not the authoritative source of PII obtained. As such, CMS MSP CRC is responsible for the notification and obtaining of consent of individual's PII when major changes occur and is covered by CMS MSP CRC PIA. |
Describe the process in place to resolve an individual's concerns when they believe their PII has been inappropriately obtained, used, or disclosed, or that the PII is inaccurate. If no process exists, explain why not. | CRC does not interact with Medicare Beneficiary (patient) directly as part of the MSP CRC contract. Medicare Beneficiary (patient) has no option for opt-out of the collection or use of their PII with MSP CRC. MSP CRC system is not the authoritative source of PII obtained from National Claims History. CRC contractor only receives and does not modify any of the PII from National Claims History. Any such requests for modification of PII will be redirected to CMS MSP COR. In case the beneficiary does contact MSP CRC contractor, the beneficiary is redirected to contact the provider if they believe their PII is inaccurate. Should the Medicare Beneficiary believe their PII has been inappropriately obtained, used, or disclosed by MSP CRC contractor, the MSP CRC compliance department will perform an investigation to include information security on the concern. Should the investigation determine data is inappropriately obtained, used, or disclosed, MSP CRC contractor will submit a security incident ticket with the CMS helpdesk along with any corrective actions required. |
Describe the process in place for periodic reviews of PII contained in the system to ensure the data's integrity, availability, accuracy and relevancy. If no processes are in place, explain why not. | The MSP CRC system is designed with logic checks to ensure data accuracy and integrity. Protection of the integrity and availability of PII is reviewed at least every quarter by a series of automated and manual review processes. Databases are updated and validated and are redundant allowing for the availability of the information. The security controls for the database are constantly reviewed to ensure safeguards are in place to protect the data. |
Identify who will have access to the PII in the system and the reason why they require access. |
|
Describe the procedures in place to determine which system users (administrators, developers, contractors, etc.) may access PII. | CRC uses role-based access controls to ensure that users, administrators, and developers are granted access on a "need-to-know" and "need-to-access" for their assigned job duties. CRC individuals requesting access must complete an Account Request form prior to account creation and indicates the person's name, email, phone number and access level needed. This form is reviewed and approved by the Recovery Audit Contractor Regions 1 and 5 system manager prior to account creation. |
Describe the methods in place to allow those with access to PII to only access the minimum amount of information necessary to perform their job. | There are several methods for restricting access. First, is to program user interfaces to limit the display of PII to only those elements needed to perform specific tasks. Second, is to limit the transmission of PII to validate information rather than copy or pull information from another authoritative source. Third, system administrators review user accounts at least semi-annually. Any anomalies are addressed and resolved by contacting the user and modifying their user data, or by removing their access if no longer required. Activities of all CRC users including system and database administrators are logged and reviewed by a designated individual to identify any unusual activity. |
Identifying training and awareness provided to personnel (system owners, managers, operators, contractors and/or program managers) using the system to make them aware of their responsibilities for protecting the information being collected and maintained. | CRC staff who access or operate CRC systems are required to complete the annual CMS Security Awareness training provided annually as a Computer Based Training (CBT) course. Contractor also completes annual corporate security awareness training and complete annual Health Insurance Portability and Accountability Act (HIPAA) of 1996 training. CRC administrators with privileged access must also complete role-based security training commensurate with the position they are working in on an annual basis. |
Describe training system users receive (above and beyond general security and privacy awareness training) | CRC Administrators with privileged access must complete role-based security training commensurate with the position they are working in on an annual basis. CRC users and administrators must also take annual Health Insurance Portability and Accountability Act (HIPAA) training along with Security Awareness Training. Additionally, CRC developers are required to take training on secure coding best practices |
Do contracts include Federal Acquisition Regulation and other appropriate clauses ensuring adherence to privacy provisions and practices? | Yes |
Describe the process and guidelines in place with regard to the retention and destruction of PII. Cite specific records retention schedules. | CRC follows the CMS Records Schedule, Section III. Medicare - Program Related which cites the National Archives and Records Administration (NARA) Disposition Authority: N1-440-04-3, which states that records will be destroyed after a total retention of six (6) years and three (3) months. |
Describe, briefly but with specificity, how the PII will be secured in the system using administrative, technical, and physical controls. | The CRC system is in data center within a surrounding secure area. The security measures in place are the use of dual factor authentication with card key access system and biometrics; an active intrusion alarm system, and video surveillance to monitor and record physical access. Administrative controls such as written policy, procedures and guidelines have been established for system access. Access to the system is limited to authorized users. Each user is granted access based on the principle of least privilege. From a technical perspective, PII is secured via firewalls, encrypted transmissions and connections, intrusion detection systems, anti-virus, and email content filtering software. Additionally, the use of portable storage devices is blocked. |