Identity Proofing Essentials for Effective Government Operations

socialServices_940x255

Who are who and how can you prove it? Seems like an easy question, yet in the digital environments where we work and live, this is no longer such a straightforward matter. Each individual is identified not only by a name, authoritative source (such as a Social Security Number, Passport, or Driver’s License), address, phone [Read More...]

Detecting Fraud and Abuse in Healthcare

docs-smiling

Join us at the AHIMA CDI Summit on Tuesday, August 5 at the Grand Hyatt in Washington, DC for a panel discussion on “Leveraging Data and Analytics to Detect Fraud and Abuse in Healthcare” with Dr. Michael Nelson as one of the panelists. The AHIMA CDI Summit is the premier industry event dedicated to leading the documentation [Read More...]

MESC: Streamlining the Applicant Eligibility Experience with Program Integrity

Health Care Reform ACA

Will you be at MESC this year?  Join us on Thursday, August 21 at 11:00 AM in Room 702 for a presentation on how to improve program integrity by understanding applicant eligibility early in the process. Public health and welfare outcomes are enhanced when members smoothly access the correct programs. States, exchanges, and human services programs need [Read More...]

Remote Access — Do You Know Who Is In Your Data?

remote user

Just over 80 percent of HR managers in a recent survey gave their agencies a grade of B or C for progress in meeting the Telework Enhancement Act’s goals of using telework to achieve greater flexibility in workforce management Letting workers access sensitive systems and data from off-site locations and, potentially, using uncontrolled devices raises a [Read More...]

Improving Patient Outcomes through Secure Data Exchanges

shutterstock_32336797

Michael Nelson recently presented at the WEDI Annual Conference on the topic of Secure Medical Record Exchanges. Sharing patient information across healthcare networks helps providers offer better care, improve patient outcomes, and reduce costs. However, as more and more health information becomes available electronically through secure data exchanges – Electronic Health Records (EHRs) and Health [Read More...]

Protecting Against Willful Compromise

shutterstock_5675935

A lock is easily opened when the owner gives the key to somebody else. This is true for gaining access to online accounts with passwords as well as second factor authentication tokens and smart cards. A person can willfully share their credentials for a number of reasons. A husband may share password and token with [Read More...]

2014 Farm Bill Requires New Report to Prove SNAP Benefits Not Paid to the Deceased

Agricultural Bill

A provision of the 2014 Farm Bill requires agencies to submit a report to the USDA to prove they haven’t issued benefits to the deceased. Section 4032 of the Agricultural Act of 2014, “Annual State report on verification of SNAP participation,” says that agencies must submit a report to the Secretary of Agriculture …containing sufficient [Read More...]

FCRA Compliance for Social Service Agencies

Compliance Board

If you’re still mailing verification requests, even for employers who are part of The Work Number®, soon you’ll have a much better way to serve your clients and your agency more securely. In the near future, all agencies will be required to authenticate themselves on our website in addition to selecting a permissible purpose. These [Read More...]

Human Services Upcoming Conferences – Hope to See You There!

Human Service Conferences

We’ll be exhibiting at many of the key conferences and forums for human services in coming months. We’d love to set aside some time so we can hear about your needs and explore a potential partnership. Ohio CSEA Directors’ Association 2014 Spring Symposium April 27-29 Dublin, OH >> Request a Meeting Pacific Southwest Regional Council [Read More...]

Authentication and Encryption Working Together

shutterstock_127894739

As online traffic increases, organizations are making decisions about appropriate levels of authentication for their consumer-facing portals. These organizations are determining how authentication “speed bumps” in front of consumers affect adoption and use because they want to make it easy for a consumer to get to his data. The problem, of course, is that making it easy [Read More...]