Charge Auditing: Prevent Improper UC Benefits Payments

charge auditing

While the prevention of improper unemployment benefits via compliant claims response remains the primary focus of UI integrity legislation, the rapid identification of these charges (after they begin) can also go a long way toward reducing the $5 billion in overpayments. Improper charges can have a direct effect on your company’s unemployment experience, potentially causing [Read More...]

Tax Intelligence – State Targeted Hiring Tax Credits

state targeted hiring programs

Situation State targeted hiring programs provide tax credits for businesses who hire individuals falling into various categories such as disabled, unemployed, economically disadvantaged, and veterans.  Most states allow any business, regardless of industry, to take advantage of these programs.  Accessing and qualifying for these programs can vary from state to state. Solution To benefit from [Read More...]

California EZ – Third Party Vouchering

California EZ

Some good news in the “wind-down” of the California Enterprise Zone Program! The California HCD has assigned third-party agents to continue vouchering for all Los Angeles zones as of September 1, 2014 through the end of 2014. Previously, Los Angeles announced that they would no longer accept voucher applications after August 31, 2014. Even though [Read More...]

We’re the government. Trust us.

government_slide

Posted with premission from FCW. By Troy K. Schneider Aug 13, 2014 The Federal Housing Administration works with lenders to insure more than $1 trillion in mortgage loans. The Department of Homeland Security shares vital information with thousands of partners at the international, federal, state, local, territorial and tribal levels, as well as in the [Read More...]

HSPD-12 – Ten Years On

white-house

Homeland Security Presidential Directive 12 (HSPD-12), signed by President Bush on August 27, 2004, was originally enacted to address the wide variety and differing security levels of identification credentials used to access secure facilities. The directive established standards for verifying an individual’s identity and issuing a tamper-proof credential that could be rapidly authenticated electronically. The [Read More...]

Identity Proofing Essentials for Effective Government Operations

socialServices_940x255

Who are you and how can you prove it? Seems like an easy question, yet in the digital environments where we work and live, this is no longer such a straightforward matter. Each individual is identified not only by a name, authoritative source (such as a Social Security Number, Passport, or Driver’s License), address, phone number, [Read More...]

Remote Access — Do You Know Who Is In Your Data?

remote user

Just over 80 percent of HR managers in a recent survey gave their agencies a grade of B or C for progress in meeting the Telework Enhancement Act’s goals of using telework to achieve greater flexibility in workforce management Letting workers access sensitive systems and data from off-site locations and, potentially, using uncontrolled devices raises a [Read More...]

Tax Intelligence – Maximizing WOTC ROI

August Tax Intelligence Bulletin

As the Work Opportunity Tax Credit (WOTC) is currently in hiatus status, it is more important than ever for companies that hire to ensure that their WOTC capture program is as effective as it can be to ensure maximum credit value generation once the program is renewed.  Recall that even when WOTC is in hiatus, [Read More...]

Protecting Against Willful Compromise

shutterstock_5675935

A lock is easily opened when the owner gives the key to somebody else. This is true for gaining access to online accounts with passwords as well as second factor authentication tokens and smart cards. A person can willfully share their credentials for a number of reasons. A husband may share password and token with [Read More...]

Authentication and Encryption Working Together

shutterstock_127894739

As online traffic increases, organizations are making decisions about appropriate levels of authentication for their consumer-facing portals. These organizations are determining how authentication “speed bumps” in front of consumers affect adoption and use because they want to make it easy for a consumer to get to his data. The problem, of course, is that making it easy [Read More...]