Help  | IVR (JB): 877-299-7900  |  Customer Support (JB): 866-590-6727
   IVR (JC): 866-238-9650  |  Customer Support (JC): 866-270-4909

Welcome to myCGS!


Log in to myCGS
  

CMS identified a concerning trend of malicious actors stealing MBIs and using them to commit Medicare fraud. Some are misusing Medicare Administrative Contractor (MAC) MBI lookup tools.

We’re implementing enhanced monitoring controls to prevent this abuse.

What You Need to Know

Only use the MAC MBI lookup tool for people you intend to provide a service or product to that you’ll bill to Medicare. Our enhanced monitoring compares the MBIs you look up against actual claims submitted with NPIs.

If we notice an unusually high rate of MBI lookups without associated claims, your access to the lookup tool may be removed.

Make sure your MAC portal users are associated with NPIs in your organization on whose behalf they may perform MBI lookups. This helps us verify legitimate use and protects your access to the lookup tool.

    • This warning banner provides privacy and security notices consistent with applicable federal laws, directives, and other federal guidance for accessing this Government system, which includes (1) this computer network, (2) all computers connected to this network, and (3) all devices and storage media attached to this network or to a computer on this network.
    • This system is provided for Government-authorized use only.
    • Unauthorized or improper use of this system is prohibited and may result in disciplinary action and/or civil and criminal penalties.
    • Personal use of social media and networking sites on this system is limited as to not interfere with official work duties and is subject to monitoring.
    • By using this system, you understand and consent to the following:
      • The Government may monitor, record, and audit your system usage, including usage of personal devices and email systems for official duties or to conduct HHS business. Therefore, you have no reasonable expectation of privacy regarding any communication or data transiting or stored on this system. At any time, and for any lawful Government purpose, the government may monitor, intercept, and search and seize any communication or data transiting or stored on this system.
      • Any communication or data transiting or stored on this system may be disclosed or used for any lawful Government purpose.