Identity Discovery: The Global Identity Summit

The key to success in discovery of an identity is understanding how disparate data elements combine to form a conclusive identity. A remote (online or mobile) application for access or services could be from the true person or a stolen or fictitious identity. Good identity verification uses a broad range of data elements to verify the [Read More…]

Using Analytics to Power Identity Proofing

Revolving Door Turnover

Confirming the identities of an individual user in a large populations can be challenging. A government agency giving a constituent access to sign up for benefits or check records may potentially be challenged with identifying a single person among more than 230 million adults. Combating identity-based fraud on that scale can be even more challenging. While [Read More…]

Webinar: Improving Patient Record Matching

How To Incorporate Financial Data For Better Ad Targeting

On July 16, Michael Nelson, DPM, VP of Healthcare Strategy and Business Development for Equifax Identity and Fraud Solutions, will conduct a CHIME College Live Presentation on the topic of improving patient data matching as a key for health information exchange. Accurate and complete patient personal and health information is required to meet industry requirements for [Read More…]

King v. Burwell: Subsidies Stand

The U.S. Supreme Court has issued a ruling in the King v. Burwell case stating that the Affordable Care Act (ACA) does in fact allow the Internal Revenue Service (IRS) to provide Premium Tax Credits, or subsidies, for health insurance provided under the Federal Marketplace. Although the language of the law states that subsidies are [Read More…]

Webinar – ACA is Here to Stay: Best Practices for ACA Management

Webinar – ACA is Here to Stay: Best Practices for ACA Management Tuesday | July 7, 2015 | 1:00 PM EDT The Supreme Court has issued a ruling in the King v. Burwell case upholding Premium Tax Credits, or subsidies, for health insurance provided under the federal Marketplace. But what does this mean in terms [Read More…]

Medical Identity Theft on the Rise

thumb_Healthcare

Medical identity theft and fraud are rising as more private patient data is put online without adequate security measures. Not only are patients being billed for treatments they never received, medical records are being altered in ways that can have life-threatening consequences. In the most recent survey conducted by the Identity Theft Resource Center, medical identity [Read More…]

We’re the government. Trust us.

government_slide

Posted with premission from FCW. By Troy K. Schneider Aug 13, 2014 The Federal Housing Administration works with lenders to insure more than $1 trillion in mortgage loans. The Department of Homeland Security shares vital information with thousands of partners at the international, federal, state, local, territorial and tribal levels, as well as in the [Read More…]

HSPD-12 – Ten Years On

white-house

Homeland Security Presidential Directive 12 (HSPD-12), signed by President Bush on August 27, 2004, was originally enacted to address the wide variety and differing security levels of identification credentials used to access secure facilities. The directive established standards for verifying an individual’s identity and issuing a tamper-proof credential that could be rapidly authenticated electronically. The [Read More…]

MESC: Streamlining the Applicant Eligibility Experience with Program Integrity

Health Care Reform ACA

Rich Huffman, Sr Director – Identity Product Management, recently presented at MESC  on how to improve program integrity by understanding applicant eligibility early in the process. Public health and welfare outcomes are enhanced when members smoothly access the correct programs. States, exchanges, and human services programs need to balance the applicant experience with the need for integrity [Read More…]

Identity Proofing Essentials for Effective Government Operations

socialServices_940x255

Who are you and how can you prove it? Seems like an easy question, yet in the digital environments where we work and live, this is no longer such a straightforward matter. Each individual is identified not only by a name, authoritative source (such as a Social Security Number, Passport, or Driver’s License), address, phone number, [Read More…]