How the Government Is Leveraging Data to Verify Identities

Several members of the Identity and Fraud Solutions team recently attended the Global Identity Summit in Tampa. Rich Huffman, vice president of identity and fraud product management, spoke on a panel about how government entities are leveraging data when verifying identities to increase security and decrease fraud. The federal government identifies millions of people every [Read More…]

Short-Term E-Verify Reauthorization Passes with Stop-Gap Bill

Hours before the government was due to shut down, President Obama signed into law a stopgap measure which will fund the federal government through Dec. 11, 2015. As reported in our previous post, E-Verify Reauthorization Deadline Looms, the possibility of a government shutdown would have affected, among other programs, the E-Verify® program administered by U.S. Citizenship [Read More…]

Identity Discovery: The Global Identity Summit

The key to success in discovery of an identity is understanding how disparate data elements combine to form a conclusive identity. A remote (online or mobile) application for access or services could be from the true person or a stolen or fictitious identity. Good identity verification uses a broad range of data elements to verify the [Read More…]

Using Analytics to Power Identity Proofing

Confirming the identities of an individual user in a large populations can be challenging. A government agency giving a constituent access to sign up for benefits or check records may potentially be challenged with identifying a single person among more than 230 million adults. Combating identity-based fraud on that scale can be even more challenging. While [Read More…]

Fraud Prevention: Crimes against Revenue on the Rise

Fraud perpetrated by or on behalf of local public assistance recipients continues to be a recurring sore spot in the ability of local jurisdictions to control growing costs, and improve revenue collections and use. “Crimes against revenue” is a particular phrase used over past years by localities seeking to address this kind of public sector [Read More…]

Webinar – ACA is Here to Stay: Best Practices for ACA Management

Webinar – ACA is Here to Stay: Best Practices for ACA Management Tuesday | July 7, 2015 | 1:00 PM EDT The Supreme Court has issued a ruling in the King v. Burwell case upholding Premium Tax Credits, or subsidies, for health insurance provided under the federal Marketplace. But what does this mean in terms [Read More…]

We’re the government. Trust us.

Posted with premission from FCW. By Troy K. Schneider Aug 13, 2014 The Federal Housing Administration works with lenders to insure more than $1 trillion in mortgage loans. The Department of Homeland Security shares vital information with thousands of partners at the international, federal, state, local, territorial and tribal levels, as well as in the [Read More…]

HSPD-12 – Ten Years On

Homeland Security Presidential Directive 12 (HSPD-12), signed by President Bush on August 27, 2004, was originally enacted to address the wide variety and differing security levels of identification credentials used to access secure facilities. The directive established standards for verifying an individual’s identity and issuing a tamper-proof credential that could be rapidly authenticated electronically. The [Read More…]

Identity Proofing Essentials for Effective Government Operations

Who are you and how can you prove it? Seems like an easy question, yet in the digital environments where we work and live, this is no longer such a straightforward matter. Each individual is identified not only by a name, authoritative source (such as a Social Security Number, Passport, or Driver’s License), address, phone number, [Read More…]

Remote Access — Do You Know Who Is In Your Data?

Just over 80 percent of HR managers in a recent survey gave their agencies a grade of B or C for progress in meeting the Telework Enhancement Act’s goals of using telework to achieve greater flexibility in workforce management Letting workers access sensitive systems and data from off-site locations and, potentially, using uncontrolled devices raises a [Read More…]