WHT/082311 Fighting Fraud, Waste and Abuse with Cross-Jurisdiction Contributory Systems Monty Faidley, Director of Market Planning Proprietary and Confidential.

Slides:



Advertisements
Similar presentations
Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Advertisements

Big Data - Ethical Data Use Kimberlin Cranford. Ethical Use in the Era of Big Data  Landscape has Changed  Attitudes about Big Data  PII, Anonymous,
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Creating a Winning E-Business Second Edition
Creating a Winning E-Business Second Edition Operating Your E-Business Chapter 5.
Truven Health Analytics State Exchanges - Data Collection & Analysis April 2014.
© 2009 Experian Limited. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
DUNSRight and XBRL – Enhancing Transparency through a Common Commitment to Global Standards 13 th XBRL International Congress June, 2006 CONFIDENTIAL &
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Workshop for Custom Committee, Almaty, Kazakhstan
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
© Experian CheetahMail All rights reserved. Confidential and proprietary. 1 © Experian Information Solutions, Inc All rights reserved. Confidential.
We get them there SHIP AFRIKA ® shipafrika.com shipafrika.com © Ship Afrika ®, LLC
Legal Audits for E-Commerce Copyright (c) 2000 Montana Law Review Montana Law Review Winter, Mont. L. Rev. 77 by Richard C. Bulman, Jr., Esq. and.
Four tips to mitigate Mobile fraud in the future.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Section 12-2-Regulatory Agencies and Laws.   These agencies make or enforce rules and regulations  Agencies provide oversight or supervision of activities.
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
Electronic Records Management: What Management Needs to Know May 2009.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
© 2015 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Accelerating Development Using Open Source Software Black Duck Software Company Presentation.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
LexisNexis ® …More Than Research. Legal Solutions Plus Business Solutions Equal a Wide Array of Solutions for Your Practice.
Total Solutions for Your Practice from LexisNexis TM.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Online banking security best practices Access via ‘transaction devices’
1 ©2012 Experian Information Solutions, Inc. All rights reserved. Experian Public. ©2012 Experian Information Solutions, Inc. All rights reserved. Experian.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
The information supply chain FDIC XBRL International Conference Mr. Inscoe.
Federal Flexibility Initiative and Schoolwide Programs.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Privacy and Data Breach Issues Kirk Herath, VP, Chief Privacy Officer, Nationwide & Dino Tsibouris, Founding Principal, Tsibouris & Associates.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
The Collection Analyst, Inc. Proudly Serving the Collection Industry for over 25 years!
Federal Flexibility Initiative and Schoolwide Programs.
©2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
JFMIP Management Conference Washington, DC | May 9, 2015.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
© 2013 Deloitte Global Services Limited Growing Markets for Social Impact September 16 th, 2014 Global Public SectorThinking people.
© 2009 Experian Limited. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
Presented by: David Reid, DBA International
The time to address enterprise mobility is now
MGMT 452 Corporate Social Responsibility
Data Minimization Framework
Regulatory Compliance
Microsoft 365 Get help with regulatory compliance
What is a Credit Bureau? A cooperative repository of information
Breakthrough technologies and innovations on the financial markets
Rights Management Services (RMS)
Current Privacy Issues That May Affect Your Credit Union
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Reiniger LLC.
Microsoft Data Insights Summit
Presentation transcript:

WHT/ Fighting Fraud, Waste and Abuse with Cross-Jurisdiction Contributory Systems Monty Faidley, Director of Market Planning Proprietary and Confidential

WHT/ Government Benefits Programs Impact Everyone 2 108,592,000 people receiving benefits in the United States $1.8 Trillion annual cost Estimated $90 Billion in Improper Payments Key Issue: Reducing Fraud, Waste, and Abuse

WHT/ What is a Contributory System 3 Shared pool providing insights Similar stakeholders contributing similar information Agreed upon usage rules Adding one source gives immediate benefit to all participants To get, you must give Give a little, Get a lot

WHT/ Examples of Contributory Systems 4

WHT/ Examples of Contributory Systems 5

WHT/ Contributory System: An Inter-Agency Example 6 Agency Sources IDENTITY DATA J. Simmons Miami, FL East 3 rd St Name: Address: Address 2: XXX SSN: IDENTITY DATA Jack Simon E Third Name: Address: Address 2: -5555SSN: IDENTITY DATA Jackson Simons Miami, FL 40 W. Main Ave Name: Address: Address 2: XXX SSN: DOR DMV HHS Consolidated IDENTITY DATA Jackson 72 East 3 rd Street Simmons First: Last: Address: MiamiCity: FL, /14/1972 XXX State/Zip: SSN: DOB: DL #: Simmons Inc. (999) Company: Phone: Single View of Identity Information Across the State Services Identity Proofing Risk Assessment Information Exchange No Yes Deceased: Incarc: Resident: No Corrected

WHT/ Contributory System Benefits in Fraud, Waste, and Abuse 7 Improve Program Integrity Identify known high risk activities and individuals Verify and authenticate identity information in online transactions Resolve information across agencies Improve Decision Timeliness Required information is available at your fingertips Updated in real time or near real time Improve Accuracy Identify relevant, reliable information that improves decision-making Verify eligibility information before determination is made

WHT/ Contributory Systems: Common Challenges 8 Who owns the data? What are the Department regulations on data usage? Data sharing? What are your State laws governing data sharing and privacy? What Federal Regulations for data sharing exist that impact your Agency? Legal and Regulatory Issues Clearly define Permissible Use – “Who is allowed to access this information?” Clearly define Permissible Purpose – “What are they allowed to do with this information?” Work closely with Policy, Regulators, and Lawmakers Best Practices

WHT/ Contributory Systems: Common Challenges 9 Does your application process include permission to use an individuals data for this purpose? How will the system be viewed by individuals? The press? The ACLU? How do you minimize sharing of Personally Identifiable Information (PII)? Privacy Identify ways to secure individual approval through language on applications or online click-through Provide an opt-in / opt-out function for individuals Avoid terms like “profiling”, “dossiers”, “surveillance”, or “total information awareness” Best Practices

WHT/ Contributory Systems: Common Challenges 10 Security Track, Report, and Audit data access at the data element layer Follow federal and industry best practices for physical, network, and server security. Patch often! Limit access, at the data element layer, to a need-to-know basis Best Practices What is the risk of storing contributed data in a single place? Who owns the liability for a data breach? Is your cyber security up to the task?

WHT/ Contributory Systems: Common Challenges 11 How big will this system grow? Can it handle millions of records? Billions? Trillions? How do you securely contribute data to the system? How do you secure access to the data? How do you track, audit, and report on compliance? Technical Implications Use proven solutions and platforms Leverage cloud-based technology Use open source where possible Follow industry standards Best Practices

WHT/ Starting a Contributory Project 12 Where Do I Begin? Create a Vision – what problem do you want to solve? Start Networking – build a team of stakeholders Seek out Industry Partners with contributory experience Pick a Leader Look to the Future - accept that the process will take time

WHT/ Questions Proprietary and Confidential - 13 Confidential and Proprietary. Copyright © 2014 LexisNexis. All rights reserved. Monty Faidley, Director of Market Planning LexisNexis Risk Solutions About LexisNexis Risk Solutions LexisNexis® Risk Solutions (lexisnexis.com/risk) is a leader in providing essential information that helps customers across all industries and government predict, assess and manage risk. Combining cutting-edge technology, unique data and advanced scoring analytics, we provide products and services that address evolving client needs in the risk sector while upholding the highest standards of security and privacy. LexisNexis Risk Solutions is part of Reed Elsevier, a leading publisher and information provider that serves customers in more than 100 countries with more than 30,000 employees worldwide. Bridger Insight, InstantID and FraudPoint services are not provided by “consumer reporting agencies,” as that term is defined in the Fair Credit Reporting Act (15 U.S.C. § 1681, et seq.) (“FCRA”) and do not constitute “consumer reports,” as that term is defined in the FCRA. Accordingly, Bridger Insight, InstantID and FraudPoint service may not be used in whole or in part as a factor in determining eligibility for credit, insurance, employment or another purpose in connection with which a consumer report may be used under the FCRA. Due to the nature of the origin of public record information, the public records and commercially available data sources used in reports may contain errors. Source data is sometimes reported or entered inaccurately, processed poorly or incorrectly, and is generally not free from defect. These products and services aggregate and report data, as provided by the public records and commercially available data sources, and are not the source of the data, nor are they comprehensive compilations of the data. Before relying on any data, it should be independently verified. LexisNexis, Lexis, Nexis and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties Inc., used under license. InstantID and FraudPoint are registered trademarks of LexisNexis Risk Solutions Inc. Bridger Insight are trademarks of LexisNexis Risk Solutions Inc. Other products and services may be trademarks or registered trademarks of their respective companies. LexisNexis and the Knowledge Burst logo are registered trademarks of Reed Elsevier Properties Inc., used under license. Other products and services may be trademarks or registered trademarks of their respective companies. Copyright © 2013 LexisNexis. All rights reserved.