What is the OIG exclusions list?

OIG (Office of Inspector General) Exclusions list:

It is very important to make sure you do not hire anyone that has committed Medicare or Medicaid fraud or been convicted of elder abuse. Be sure to check this list before you hire new employees.

  • The database only includes the name known to OIG at the time the individual was excluded, any former names used by the individual (e.g., maiden name, previous married name, etc.) should be searched in addition to the individual's current name.
  • An individual with a hyphenated name should be checked under each of the last names in the hyphenated name (e.g., Jane Smith-Jones should be checked under Jane Smith and Jane Jones, in addition to Jane Smith-Jones).
  • If checking only a few names, use the Online Searchable Database to search up to five names at once.
  • If checking many names, consider downloading the Downloadable Database into a spreadsheet or database program. This will enable the user to use that program's search functions to crosscheck the names against the thousands of names on the LEIE. Verify the correct spelling of any names before starting a search.
  • For a potential match, verify the results by entering the SSN for an individual or EIN for an entity on the Online Searchable Database. (Note: The Privacy Act prohibits the distribution of SSNs so they cannot be included in the Downloadable Database).


The OIG would like to you check this list monthly, but that is very difficult to keep up with. We recommend checking it annually for all employees. With that said, if you have an employee that is acting strange or is having financial difficulties, it is suggested to check this list more often.

To document your efforts, use the “Print Screen” button on your keyboard, then “paste” into a Word Document. When saving the file we recommend using a consistent format:

Date-  OIG - Name (052322 OIG Smith Mary or for annual - 052322 OIG Annual), then upload your document under the Uploads tab on your Profile page.


  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

What is a Business Associate?

A Business Associate is a person or entity that performs certain functions or activities that...

What is a Security Risk Analysis?

All medical practices and business associates must conduct a HIPAA Security Risk Analysis under...

What is PHI and ePHI?

PHI stands for Protected Health Information. There are 18 identifiers and includes patient...

What is the HIPAA Security Rule?

The National Institute of Standards and Technology (NIST) wrote the Security Rule. The...

What is Recognized Security Practices?

When an organization is investigated by the Office for Civil Rights a minimum of a one year look...