Billing for services or medical equipment not received or medically unnecessary

Size: px
Start display at page:

Download "Billing for services or medical equipment not received or medically unnecessary"

Transcription

1 V E N D O R S P O T L I G H T H e a l t h c a r e Fr a ud Management: Solutions for I d e n t i f i c a t i on and Interve n t i o n November 2011 Adapted from Perspective: 360-Degree View Health Reform as a Market and Technology Disruptor by Lynne A. Dunbrack, Judy Hanover, Sven Lohse, et al., IDC #HI Sponsored by Verizon Healthcare fraud costs our already financially constrained healthcare system between $74 billion and $247 billion annually. Prompt payment laws have compelled payers to pay claims first and then analyze them retrospectively for potential fraud. This strategy often referred to as "pay, chase, and recover" allows fraudulent behavior to continue undetected for a period of time and hampers full recovery of improper payments. New legislation is requiring the federal government to use predictive modeling to identify potentially fraudulent healthcare claims and prevent improper payment from occurring. This strategy identify and intervene represents an important change in fraud management and one that more payers should pursue to rein in escalating healthcare costs. This Vendor Spotlight highlights the impact of healthcare fraud on private and public payers, as well as the personal toll such fraud takes on consumers who have had their medical records compromised as a result. It examines the efficacy of prospective identification strategies versus retrospective recovery strategies traditionally used by payers. This paper also discusses Verizon's Fraud Management for Healthcare Solution, a customized version of the Fraud Management Software Platform that the company uses for its own fraud detection program. The Impact of Healthcare Fraud Healthcare fraud is a significant and growing problem in the United States, and it will continue to worsen as cybercriminals become more sophisticated. The Federal Bureau of Investigation (FBI) estimates that fraudulent billing accounts for between 3% and 10% of healthcare expenditures each year. Put another way, healthcare fraud costs private and public payers between $74 billion and $247 billion annually. Healthcare fraud can take many forms, ranging from licensed practitioners and their staff committing fraud to organized crime rings that use stolen patient and provider identities to submit fraudulent claims for payment. Other examples of healthcare fraud include: Billing for services or medical equipment not received or medically unnecessary Upcoding or unbundling procedure codes to maximize payments for services rendered Misrepresenting diagnosis codes to ensure and/or maximize payment Waiving patient copayments and deductibles and overbilling the payer Accepting kickbacks for patient referrals Stealing provider and patient identities for fraudulent claims IDC 1212

2 Healthcare Fraud Is Not a Victimless Crime Healthcare fraud, much like identity theft, can have a profound impact on individuals when their medical identities are stolen. The Coalition Against Insurance Fraud reported that in 2010, 1.4 million Americans were victims of medical identify theft, up from 500,000 in Consumers can spend countless hours trying to resolve billing issues. Maximum limits might be reached as a result of fraudulent claims, but this issue is discovered only when the consumer's claims for legitimate services are denied. According to the Coalition Against Insurance Fraud, consumers pay on average $20,000 to resolve their cases, sometimes even paying for medical care they did not receive to restore their health coverage. More egregiously, the consumer's medical record might be compromised with falsified diagnosis or procedure codes, thus making it difficult to obtain health or life insurance because of pre-existing conditions. While the Patient Protection and Affordable Care Act of 2010 (PPACA) will eliminate pre-existing conditions within a few years, this legislation may be overturned after the 2012 elections. In the worst-case scenario, it can be a matter of life and death if vital information, such as allergies and blood type, is compromised and the wrong drugs or blood products are administered to a patient. Consumers are also placed at risk when unscrupulous clinicians provide medically unnecessary services or services that they are not qualified to provide. Legislation Increases the Focus on Preventing Fraud The passage of the Patient Protection and Affordable Care Act of 2010 (HR 3950) serves to increase the focus on preventing fraud and strengthening the tools to combat fraud when it occurs. A few notable examples are as follows: Approximately 32 million uninsured Americans will be eligible for health insurance coverage, thus providing more opportunity for fraud to be committed against their patient records. The expansion of covered persons and services as a result of insurance reform (e.g., eliminating pre-existing condition provisions, lifetime maximum limits) will increase healthcare expenditures; at the same time, the industry is trying to reduce costs. Two ways to controls costs are to reduce fraud and abuse and to improve operational efficiencies in the areas of claims processing and payment recovery. PPACA allocates $350 million over 10 years (with $95 million in the first year) through the Healthcare Fraud and Abuse Control (HCFAC) Program from FY2011 through FY2020 to provide new resources to fight fraud and abuse. PPACA will require the Secretary of Health and Human Services (HHS) to establish a national healthcare fraud and abuse data collection program that will collect data from multiple federal healthcare programs and help identify providers that have an action filed against them by another agency. Greater coordination among federal and state agencies will also be required, and sharing with private health plans will be encouraged. There are new rules and sentences that increase sentencing guidelines by 25% to 50% for crimes that involve more than $1 million in losses and tougher civil and monetary penalties for those who have committed fraud. The Secretary of Health and Human Services can withhold payment to Medicare and Medicaid providers if there is a credible allegation that fraud has been committed and an investigation is pending. This provision reverses the typical strategy of the federal government, which is to pay healthcare claims first and then attempt to recover improper payments after the fact. In addition to PPACA, other recently passed legislation is compelling federal and state agencies to focus on how they combat fraud. One such example is the Small Business Jobs and Credit Act of 2010, which was signed into law on September 27, 2010, by President Obama and requires the federal government to use predictive modeling to detect fraudulent healthcare claims. According to the legislation, the predictive modeling program had to be in place by July 1, 2011, in the 10 states identified by the HHS Secretary as being at the highest risk for fraud and abuse in the Medicare Fee- For-Service program IDC

3 Recovery Strategies: Prevention Versus "Pay, Chase, and Recover" Historically, fraud and abuse detection has been a retrospective function referred to as "pay, chase, and recover." This strategy is pursued by payers in part because prompt payment regulations require claims to be paid within a prescribed time frame typically between 30 and 60 days, and faster for electronic claims. As a result, fraudulent activity may not be detected until months after claims have been paid, and even more time may pass before improper payments are recovered. In that time, fraudsters may have ceased operations in one location and set up shop elsewhere to avoid getting caught. Thus, payment recovery is made more difficult, if not impossible. Furthermore, retrospective analysis for fraud and abuse is typically applied to a sampling of claims because of the sheer volume of paid claims data. On average, using a "pay, chase, and recover" strategy, payers recover between 50% and 60% of improper payments. In contrast, some payers, including the federal government, are re-evaluating the "pay, chase, and recover" approach and are deploying more proactive, preventive strategies that use predictive modeling to identify potentially fraudulent claims. "Identify and intervene" strategies are particularly effective for low-dollar fraud where, despite the volume of this activity, there is little economic incentive to recover an individual claim of approximately $50. Considering Verizon Verizon, a $107 billion company headquartered in New York, provides IT, communications, network, and security solutions to enterprises and government agencies around the world and has a multibillion presence in healthcare. Expanding upon its core services into new areas of growing importance in the healthcare industry, Verizon has launched a number of healthcare solutions and services in the past several years through its Connected Healthcare Solutions practice. They include: Telehealth Collaborative Services (2009) Verizon Security Management Program-Healthcare (SMP-H) (2009) Data Discovery, Identification and Security Classification suite of security consulting services (2010) Verizon Medical Data Exchange (2010) Verizon Health Information Exchange (2010) Medical identity credentials for 2.3 million clinicians (2010) Verizon Fraud Management for the Healthcare Vertical Market (2011) Verizon processes billions of records in near real time on a daily basis. Over the past 10 years, Verizon's fraud operations has monitored more than 10 times the traffic including voice, data, and managed services and security with less than half the staff and has driven a significant decline in Verizon annual fraud losses during that period of time. Verizon uses a combination of data reduction architecture and predictive modeling to find the proverbial "needle in a haystack" and detect fraud. (see Figure 1) IDC 3

4 F i g u r e 1 Data Reduction Architecture: "Finding the Needle in the Haystack" Source: Verizon, 2011 According to Verizon, hundreds of alerts and patented algorithms for data reduction, pattern recognition, and artificial intelligence are applied to the data in real time to detect potential anomalies such as fraud and security breaches. These anomalies are then further analyzed, and if warranted, cases are created to be prioritized for further investigation by case managers and, in extreme cases, law enforcement agencies. If fraud is detected, Verizon can immediately shut down further fraudulent activity by deactivating the calling card or outbound telephone number or blocking the switch at the network layer depending upon the type of fraud committed. Verizon's Fraud Management for Healthcare Solution Verizon's Fraud Management for Healthcare Solution is a customized version of the platform Verizon uses for its own fraud detection program. The Fraud Management Software Platform includes the following key components: Fraud Case Management Workbench features a Web-based user interface and workflow engine to support healthcare fraud analysis. The workflow tools can be configured to route potentially fraudulent claims to the appropriate staff for further investigation. Interactive and Visual Graphic Analysis uses links analysis and geomapping to visually show the relationship between providers and patients. Healthcare domain-specific alerts identify suspicious claims. For example, alerts can identify claims from a provider seeing patients at locations that are geographically dispersed across state lines or treating more patients than can be physically seen in a given time period. Geomapping also provides a street-level view of the service address, which can help verify whether the place of service is legitimate or a sham. Case Management Tools help fraud analysts document cases, access case notes, and track internal and external documentation to compile the evidence necessary to demonstrate fraudulent activity and support an enforcement action. Reporting and Analytics support performance metric reporting, regularly scheduled reports, and ad hoc queries. A large volume data warehouse is available for data mining and trending and analytics IDC

5 Verizon's Fraud Management for Healthcare Solution can be provided as a comprehensive managed service that combines the Fraud Management Software Platform with technical and professional services ranging from software hosting and data integration to healthcare fraud operations. Verizon Professional Services can help customers assess their fraud programs, develop appropriate procedures for their risk levels, and design new programs to address evolving threats. Advanced domain-specific predictive models are applied to healthcare claims to examine them by patient, provider, service origin, and other patterns that might indicate an anomaly requiring further review by fraud analysts and investigation by law enforcement investigators. Verizon has a significant footprint in the healthcare sector; the company reported that it provides IT solutions to more than 90% of the Healthcare Fortune As noted previously, Verizon has launched a number of products and services designed to address the unique requirements of the healthcare industry. The company also has strong expertise in security, identity management, datacenter management, and managed network services. According to the company, a key differentiator for Verizon's Fraud Management for Healthcare Solution is its data reduction architecture, which enables the solution to examine 100% of the claims in near real time and supports "identify and intervene" strategies. Thus, fraudulent activity is discovered earlier in the claims processing cycle and before the claim is paid. Challenges A challenge faced by Verizon is that it is a recent entrant into the relatively crowded market of healthcare fraud management solutions. A number of vendors offer fraud and abuse solutions for the healthcare industry. However, these solutions tend to mirror the current industry practice of performing a retrospective analysis to identify fraudulent activity. A comparatively new offering, Verizon's Fraud Management for Healthcare Solution is a customized version of the Fraud Management Software Platform that Verizon has used internally with success. Verizon can point to this success and also to the fact that the healthcare solution will scale because it supports Verizon's global fraud operations. Conclusion Predictive modeling for fraud detection is an essential weapon in a healthcare organization's arsenal to combat fraud and abuse. The current practice of "pay, chase, and recover" allows fraudulent activity to flourish undetected for longer periods of time, allowing losses to grow. The U.S. healthcare system cannot afford to withstand these substantial losses. Funds used for improper payments could be used to provide services for legitimate beneficiaries, fund innovation, or stem rising premiums. As a result, the healthcare industry needs a new approach to fraud management that is less retrospective in nature and that utilizes data reduction and predictive modeling technologies. If Verizon can address the challenges outlined in this paper, IDC believes the company can succeed in the important market for healthcare fraud solutions. A B O U T T H I S P U B L I C A T I ON This publication was produced by IDC Health Insights Go-to-Market Services. The opinion, analysis, and research results presented herein are drawn from more detailed research and analysis independently conducted and published by IDC Health Insights, unless specific vendor sponsorship is noted. IDC Health Insights Go-to-Market Services makes IDC Health Insights content available in a wide range of formats for distribution by various companies. A license to distribute IDC Health Insights content does not imply endorsement of or opinion about the licensee IDC 5

6 C O P Y R I G H T A N D R E S T R I C T I O N S Any IDC Health Insights information or reference to IDC Health Insights that is to be used in advertising, press releases, or promotional materials requires prior written approval from IDC Health Insights. For permission requests, contact the GMS information line at or gms@idc.com. Translation and/or localization of this document requires an additional license from IDC Health Insights. For more information on IDC Health Insights, an IDC company, visit For more information on IDC, visit For more information on GMS, visit Global Headquarters: 5 Speen Street Framingham, MA USA P F IDC

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,

More information

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations Preventing Healthcare Fraud through Predictive Modeling Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services Project initiated: July 2012 Project

More information

Preventing Health Care Fraud

Preventing Health Care Fraud Preventing Health Care Fraud Project: Predictive Modeling for Fraud Detection at MassHealth Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services

More information

The Predictive Fraud and Abuse Analytic and Risk Management System

The Predictive Fraud and Abuse Analytic and Risk Management System The Predictive Fraud and Abuse Analytic and Risk Management System Empowering healthcare payers and stakeholders in preventing and recovering fraudulent healthcare payments IkaIntegrity : Your real-time

More information

Medical Fraud Detection Through Data Mining Megaputer Case Study www.megaputer.com Megaputer Intelligence, Inc. 120 West Seventh Street, Suite 310 Bloomington, IN 47404, USA +1 812-330-0110 Medical Fraud

More information

An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection

An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection October 2012 Whitepaper Series Issue No. 7 Copyright 2012 Jvion LLC All Rights Reserved 1 that are

More information

I D C A N A L Y S T C O N N E C T I O N

I D C A N A L Y S T C O N N E C T I O N I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)

More information

Research Brief: Insurers Efforts to Prevent Health Care Fraud

Research Brief: Insurers Efforts to Prevent Health Care Fraud Research Brief: Insurers Efforts to Prevent Health Care Fraud January 2011 The issue of fraud prevention has emerged with a new sense of urgency among administrators of public health insurance programs.

More information

Prevention is Better than Cure: Protect Your Medical Identity

Prevention is Better than Cure: Protect Your Medical Identity Prevention is Better than Cure: Protect Your Medical Identity Center for Program Integrity Centers for Medicare & Medicaid Services Shantanu Agrawal, MD, MPhil Medical Director Washington State Medical

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T E n t r y- L e ve l S olutions for Priva t e C l o u d Au t o m a t i o n D e l i ve r R a p i d R e t u r n s May 2012 Adapted from Worldwide Cloud Systems

More information

I D C A N A L Y S T C O N N E C T I O N

I D C A N A L Y S T C O N N E C T I O N I D C A N A L Y S T C O N N E C T I O N David Tapper Vice President, Outsourcing and Managed Services T h e B u s i n e ss Value of Managed Servi c e s i n Optimizing Productivi t y, D r i vi n g D ow

More information

I D C V E N D O R S P O T L I G H T. S t o r a g e Ar c h i t e c t u r e t o Better Manage B i g D a t a C hallenges

I D C V E N D O R S P O T L I G H T. S t o r a g e Ar c h i t e c t u r e t o Better Manage B i g D a t a C hallenges I D C V E N D O R S P O T L I G H T S t o r a g e Ar c h i t e c t u r e t o Better Manage B i g D a t a C hallenges September 2012 Adapted from Worldwide File-Based Storage 2011 2015 Forecast: Foundation

More information

Taming IT Management Chaos

Taming IT Management Chaos I D C T E C H N O L O G Y S P O T L I G H T Taming IT Management Chaos January 2009 Adapted from Datacenter Automation: Accelerating Market Maturity Through Investment in IT by Tim Grieser, IDC #213868

More information

SAS Fraud Framework for Health Care Evolution and Learnings

SAS Fraud Framework for Health Care Evolution and Learnings SAS Fraud Framework for Health Care Evolution and Learnings Julie Malida, Principal for Health Care Fraud, SAS Jay King, Manager, Advanced Analytics Lab, SAS Copyright 2009, SAS Institute Inc. All rights

More information

Workload Automation Challenges and Opportunities

Workload Automation Challenges and Opportunities I D C E X E C U T I V E B R I E F Workload Automation Challenges and Opportunities May 2011 Sponsored by BMC Executive Summary Enterprise IT workload environments are becoming more complex, dynamic, and

More information

On-Demand vs. On-Premise Customer Relationship Management: A New Hybrid Emerges

On-Demand vs. On-Premise Customer Relationship Management: A New Hybrid Emerges I D C I - V I E W Mary Wardley Vice President, Enterprise Applications and CRM Software On-Demand vs. On-Premise Customer Relationship Management: A New Hybrid Emerges September 2007 Adapted from Worldwide

More information

I D C V E N D O R S P O T L I G H T. H yb r i d C l o u d Solutions for ERP

I D C V E N D O R S P O T L I G H T. H yb r i d C l o u d Solutions for ERP I D C V E N D O R S P O T L I G H T H yb r i d C l o u d Solutions for ERP November 2014 Adapted from Worldwide Enterprise Applications 2014 2018 Forecast and 2013 Vendor Shares by Christine Dover Sponsored

More information

I D C V E N D O R S P O T L I G H T. F l a s h, C l o u d, a nd Softw ar e - D e f i n e d Storage:

I D C V E N D O R S P O T L I G H T. F l a s h, C l o u d, a nd Softw ar e - D e f i n e d Storage: I D C V E N D O R S P O T L I G H T F l a s h, C l o u d, a nd Softw ar e - D e f i n e d Storage: N ew T rends Impacting Enterprise Datacenters March 2014 Adapted from IDC Worldwide Storage Predictions

More information

Data Management: Foundational Technologies for Health Insurance Exchange Success

Data Management: Foundational Technologies for Health Insurance Exchange Success INDUSTRY BRIEF Data Management: Foundational Technologies for Health Insurance Exchange Success Sponsored by: Informatica Janice W. Young November 2013 IN THIS INDUSTRY BRIEF U.S. health plans have been

More information

Self-Service Big Data Analytics for Line of Business

Self-Service Big Data Analytics for Line of Business I D C A N A L Y S T C O N N E C T I O N Dan Vesset Program Vice President, Business Analytics and Big Data Self-Service Big Data Analytics for Line of Business March 2015 Big data, in all its forms, is

More information

I D C E V E N T P R O C E E D I N G S

I D C E V E N T P R O C E E D I N G S I D C E V E N T P R O C E E D I N G S As i a / P a c i f i c Perspecti ve s : N a vi g a t i n g t h e D a t a c e n t e r Security I m p e r a t i ve September 2014 By Chuang Shyne-Song; Program Director,

More information

Perspective: Cloud Solutions and Deployment for Healthcare Payers in 2014

Perspective: Cloud Solutions and Deployment for Healthcare Payers in 2014 Perspective Perspective: Cloud Solutions and Deployment for Healthcare Payers in 2014 Lynne A. Dunbrack Judy Hanover IN THIS PERSPECTIVE This IDC Health Insights Perspective examines the current status

More information

I D C M A R K E T S P O T L I G H T. P r i va t e a n d H yb r i d C l o u d s E n a b l e New L e ve l s o f B u s i n e s s and IT Collaboration

I D C M A R K E T S P O T L I G H T. P r i va t e a n d H yb r i d C l o u d s E n a b l e New L e ve l s o f B u s i n e s s and IT Collaboration I D C M A R K E T S P O T L I G H T P r i va t e a n d H yb r i d C l o u d s E n a b l e New L e ve l s o f B u s i n e s s and IT Collaboration September 2013 Adapted from IDC Maturity Model: Cloud A

More information

I D C M A R K E T S P O T L I G H T

I D C M A R K E T S P O T L I G H T I D C M A R K E T S P O T L I G H T M a naging the Data Ar c h i ve : Ar e I T a n d L i n e s o f B u siness at Odds w i t h Legal and C o m p l i a n c e? June 2015 By Laura DuBois and Sean Pike Sponsored

More information

C l o u d - B a s e d S u p p l y C h a i n s : T r a n s f o rming M a n u f a c t u r ing Performance

C l o u d - B a s e d S u p p l y C h a i n s : T r a n s f o rming M a n u f a c t u r ing Performance M A R K E T S P O T L I G H T C l o u d - B a s e d S u p p l y C h a i n s : T r a n s f o rming M a n u f a c t u r ing Performance October 2012 Adapted from Business Strategy: Supply Chain in the Cloud

More information

I D C M A R K E T S P O T L I G H T

I D C M A R K E T S P O T L I G H T I D C M A R K E T S P O T L I G H T E n t r y- L e ve l E n t e r p r ise Storage: Stepping Up t o B i g C h a l lenges October 2012 Adapted from The Appliance-ization of the Datacenter and Its Impact

More information

EMDEON PAYMENT INTEGRITY SERVICES

EMDEON PAYMENT INTEGRITY SERVICES EMDEON PAYMENT INTEGRITY SERVICES Emdeon Fraud Prevention Services Emdeon Fraud Investigative Services Emdeon Clinical Integrity for Claims Emdeon Third-Party Liability Analysis Simplifying the Business

More information

Combating Fraud, Waste, and Abuse in Healthcare

Combating Fraud, Waste, and Abuse in Healthcare Combating Fraud, Waste, and Abuse in Healthcare ABSTRACT This paper discusses how real time analytics and event intelligence technologies can be used to analyze, detect, and prevent fraud, waste, and abuse

More information

STAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES HEALTH CARE REFORM A POTENTIAL PLAYGROUND FOR FRAUD

STAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES HEALTH CARE REFORM A POTENTIAL PLAYGROUND FOR FRAUD STAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES HEALTH CARE REFORM A POTENTIAL PLAYGROUND FOR FRAUD With the upcoming Health Care Reform Act, health care fraudsters will be using new tactics to defraud

More information

Network Management Services: A Cost-Effective Approach to Complexity

Network Management Services: A Cost-Effective Approach to Complexity Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com I D C E X E C U T I V E B R I E F Network Management Services: A Cost-Effective Approach to Complexity

More information

From Chase to Prevention. Stopping Healthcare Fraud Before it Happens

From Chase to Prevention. Stopping Healthcare Fraud Before it Happens From Chase to Prevention Stopping Healthcare Fraud Before it Happens Healthcare fraud, waste, and abuse cost taxpayers tens of billions of dollars per year, with Medicare and Medicaid fraud alone estimated

More information

Optimizing Information Management in the Cloud

Optimizing Information Management in the Cloud I D C E X E C U T I V E B R I E F Optimizing Information Management in the Cloud June 2011 Adapted from Cloud Storage Impacted by Datacenter Transformations and the Changing Role of IT by Laura DuBois,

More information

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s I D C S P O T L I G H T Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s March 2012 Adapted from Worldwide Cloud Security 2011 2015 Forecast: A Comprehensive

More information

I D C T E C H N O L O G Y S P O T L I G H T. E n a b l i n g Quality I n n o va t i o n w i t h Servi c e

I D C T E C H N O L O G Y S P O T L I G H T. E n a b l i n g Quality I n n o va t i o n w i t h Servi c e I D C T E C H N O L O G Y S P O T L I G H T E n a b l i n g Quality I n n o va t i o n w i t h Servi c e V i r t u a lization a nd Netw or k Virtualization December 2014 Adapted from Worldwide Automated

More information

ME DIC BENEFIT INTEGRITY ACTIVITIES IN MEDICARE PARTS C AND D

ME DIC BENEFIT INTEGRITY ACTIVITIES IN MEDICARE PARTS C AND D Department of Health and Human Services OFFICE OF INSPECTOR GENERAL ME DIC BENEFIT INTEGRITY ACTIVITIES IN MEDICARE PARTS C AND D Daniel R. Levinson Inspector General January 2013 OEI-03-11-00310 EXECUTIVE

More information

Big Data Tips the Power Balance Between IT and Business Users

Big Data Tips the Power Balance Between IT and Business Users I D C A N A L Y S T C O N N E C T I O N Carla Arend Programme Director, European Software IDC EMEA Big Data Tips the Power Balance Between IT and Business Users Sponsored by: Computacenter November 2012

More information

Virtualization in Healthcare: Less Can Be More

Virtualization in Healthcare: Less Can Be More HEALTH INDUSTRY INSIGHTS EXECUTIVE BRIEF Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.935.4445 F.508.988.7881 www.healthindustry-insights.com Virtualization in Healthcare: Less Can

More information

PREVENTING FRAUD, ABUSE, & WASTE: A Primer for Physical Therapists

PREVENTING FRAUD, ABUSE, & WASTE: A Primer for Physical Therapists PREVENTING FRAUD, ABUSE, & WASTE: A Primer for Physical Therapists Available at: http://www.apta.org/integrity 2014 American Physical Therapy Association. All rights reserved. All reproduction or redistribution

More information

I D C A N A L Y S T C O N N E C T I O N. I m p r o vi n g C o m m u n i c a t i o n s w i t h Au t o m a t e d T r a n s l a t i o n

I D C A N A L Y S T C O N N E C T I O N. I m p r o vi n g C o m m u n i c a t i o n s w i t h Au t o m a t e d T r a n s l a t i o n I D C A N A L Y S T C O N N E C T I O N David Schubmehl Research Manager, Search, Content Analytics, and Discovery Sue Feldman Research Vice President, Search and Discovery Technologies I m p r o vi n

More information

Benefits fraud: Shrink the risk Gain group plan sustainability

Benefits fraud: Shrink the risk Gain group plan sustainability Benefits fraud: Shrink the risk Gain group plan sustainability Life s brighter under the sun Fraud: A real threat to group plan sustainability Fraud in group benefits has always existed, but never has

More information

Achieving Real Program Integrity 2011 NAMD Annual Conference

Achieving Real Program Integrity 2011 NAMD Annual Conference Achieving Real Program Integrity 2011 NAMD Annual Conference Center for Program Integrity Centers for Medicare & Medicaid Services Angela Brice-Smith Director, Medicaid Integrity Group November 9, 2011

More information

How Big Data Transforms Data Protection and Storage

How Big Data Transforms Data Protection and Storage I D C E X E C U T I V E B R I E F How Big Data Transforms Data Protection and Storage August 2012 Written by Carla Arend Sponsored by CommVault Introduction: How Big Data Transforms Storage Omøgade 8 P.O.Box

More information

Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011

Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Y0067_H2816_H6169_WEB_UAMC IA 11/22/2010 Last Updated: 11/22/2010 Medicare Requirements The Centers for Medicare and Medicaid

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T AP M S a a S and An a l yt i c s S t e p U p t o Meet the N e e d s o f M odern Ap p l i c a t i o n s, M o b i le Users, a n d H yb r i d C l o ud Ar c h i

More information

FEHB Program Carrier Letter

FEHB Program Carrier Letter FEHB Program Carrier Letter All Carriers U.S. Office of Personnel Management Healthcare and Insurance Letter No. 2014-29 Date: December 19, 2014 Fee-for-service [ 25 ] Experience-rated HMO [ 25 ] Community-rated

More information

Using Analytics to detect and prevent Healthcare fraud. Copyright 2010 SAS Institute Inc. All rights reserved.

Using Analytics to detect and prevent Healthcare fraud. Copyright 2010 SAS Institute Inc. All rights reserved. Using Analytics to detect and prevent Healthcare fraud Copyright 2010 SAS Institute Inc. All rights reserved. Agenda Introductions International Fraud Trends Overview of the use of Analytics in Healthcare

More information

Fraud and Improve Provider and Member Management?

Fraud and Improve Provider and Member Management? Using IdentityManagement andpredictiveanalyticsto to Prevent Fraud and Improve Provider and Member Management? Kathy Mosbaugh, Director, Health Care February 6, 2013 LexisNexis leverages data about people,

More information

FRAUD AND ABUSE (SECTION-BY-SECTION ANALYSIS)

FRAUD AND ABUSE (SECTION-BY-SECTION ANALYSIS) FRAUD AND ABUSE (SECTION-BY-SECTION ANALYSIS) (Information compiled from the Democratic Policy Committee (DPC) Report on The Patient Protection and Affordable Care Act and the Health Care and Education

More information

I D C V E N D O R S P O T L I G H T. W o r k l o a d Management Enables Big Data B u s i n e s s Process Optimization

I D C V E N D O R S P O T L I G H T. W o r k l o a d Management Enables Big Data B u s i n e s s Process Optimization I D C V E N D O R S P O T L I G H T W o r k l o a d Management Enables Big Data B u s i n e s s Process Optimization November 2015 Adapted from Worldwide Workload Management Software Market Shares, 2014:

More information

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology

The State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies

More information

Medicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010

Medicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010 Medicare Advantage and Part D Fraud, Waste, and Abuse Training October 2010 Introduction 2008: United States spent $2.3 trillion on health care. Federal fiscal year 2010: Medicare expected to cover an

More information

Strengthening Medicare: Better Health, Better Care, Lower Costs Efforts Will Save Nearly $120 Billion for Medicare Over Five Years.

Strengthening Medicare: Better Health, Better Care, Lower Costs Efforts Will Save Nearly $120 Billion for Medicare Over Five Years. Strengthening Medicare: Better Health, Better Care, Lower Costs Efforts Will Save Nearly $120 Billion for Medicare Over Five Years Introduction The Centers for Medicare and Medicaid Services (CMS) and

More information

I D C M A R K E T S P O T L I G H T. S M B s Embrace Business Televi s i o n :

I D C M A R K E T S P O T L I G H T. S M B s Embrace Business Televi s i o n : I D C M A R K E T S P O T L I G H T S M B s Embrace Business Televi s i o n : N ew Options in a Visual World December 2013 Adapted from 2012 SMB Emerging Services Survey Results: U.S. SMB Television Market

More information

I N D U S T R Y S P O T L I G H T. T h e Grow i n g Appeal of Ad va n c e d a n d P r e d i c ti ve Analytics f o r the Utility I n d u s t r y

I N D U S T R Y S P O T L I G H T. T h e Grow i n g Appeal of Ad va n c e d a n d P r e d i c ti ve Analytics f o r the Utility I n d u s t r y (% of respondents) I N D U S T R Y S P O T L I G H T T h e Grow i n g Appeal of Ad va n c e d a n d P r e d i c ti ve Analytics f o r the Utility I n d u s t r y October 2014 Sponsored by SAP Advanced

More information

Building a Web Security Ecosystem to Combat Emerging Internet Threats

Building a Web Security Ecosystem to Combat Emerging Internet Threats I D C V E N D O R S P O T L I G H T Building a Web Security Ecosystem to Combat Emerging Internet Threats September 2005 Adapted from: Worldwide Secure Content Management 2005 2009 Forecast Update and

More information

I D C A N A L Y S T C O N N E C T I O N. C o g n i t i ve C o m m e r c e i n B2B M a rketing a n d S a l e s

I D C A N A L Y S T C O N N E C T I O N. C o g n i t i ve C o m m e r c e i n B2B M a rketing a n d S a l e s I D C A N A L Y S T C O N N E C T I O N Dave Schubmehl Research Director, Cognitive Systems and Content Analytics Greg Girard Program Director, Omni-Channel Retail Analytics Strategies C o g n i t i ve

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Advanced Analytics Dan Vesset September 2003 INTRODUCTION In the previous sections of this series

More information

Got Files? Get Cloud!

Got Files? Get Cloud! I D C V E N D O R S P O T L I G H T Got Files? Get Cloud! November 2010 Adapted from State of File-Based Storage Use in Organizations by Richard Villars, IDC #221138 Sponsored by F5 Networks The explosion

More information

I D C V E N D O R S P O T L I G H T

I D C V E N D O R S P O T L I G H T I D C V E N D O R S P O T L I G H T S u p p o r t i n g Softw a re Business Transformation w ith Sys t e m s D e s i g n e d for the Task November 2014 Adapted from Managing Business Model Transitions

More information

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by

More information

I D C V E N D O R S P O T L I G H T

I D C V E N D O R S P O T L I G H T I D C V E N D O R S P O T L I G H T S t o r a g e T rends: Delive r i n g M a n a g e m ent and I n t e l l i g e n c e T h r o u g h C l o u d S e r vi c es April 2013 Adapted from IDC's Worldwide Storage

More information

2015 Fraud, Waste & Abuse Prevention

2015 Fraud, Waste & Abuse Prevention Quality Independent Physicians, LLC Awareness Training 2015 Fraud, Waste & Abuse Prevention Fraud, Waste and Abuse (FWA) Training Objectives After completing this training you should be able to: Recognize

More information

What Can Software as a Service Do for Your Business?

What Can Software as a Service Do for Your Business? I D C E X E C U T I V E B R I E F What Can Software as a Service Do for Your Business? November 2010 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

I D C A N A L Y S T C O N N E C T I O N. T h e C r i t i cal Role of I/O in Public Cloud S e r vi c e P r o vi d e r E n vi r o n m e n t s

I D C A N A L Y S T C O N N E C T I O N. T h e C r i t i cal Role of I/O in Public Cloud S e r vi c e P r o vi d e r E n vi r o n m e n t s ($B) I D C A N A L Y S T C O N N E C T I O N Rick Villars Vice President, Information and Cloud T h e C r i t i cal Role of I/O in Public Cloud S e r vi c e P r o vi d e r E n vi r o n m e n t s August

More information

Implementing a New Technology: FPS Successes, Challenges, and Best Practices

Implementing a New Technology: FPS Successes, Challenges, and Best Practices Implementing a New Technology: FPS Successes, Challenges, and Best Practices Centers for Medicare & Medicaid Services Raymond Wedgeworth Director, Data Analytics and Control Group Center for Program Integrity

More information

Helping Enterprises Succeed: Responsible Corporate Strategy and Intelligent Business Insights

Helping Enterprises Succeed: Responsible Corporate Strategy and Intelligent Business Insights I D C E X E C U T I V E I N S I G H T S Helping Enterprises Succeed: Responsible Corporate Strategy and Intelligent Business Insights May 2009 By Albert Pang, Research Director, Enterprise Applications

More information

Summary of Anti-Fraud Provisions in the Affordable Care Act

Summary of Anti-Fraud Provisions in the Affordable Care Act Summary of Anti-Fraud Provisions in the Affordable Care Act Michael F. Ruggio Shareholder Patrick J. Hurd Senior Counsel Sarah Reimers McIntee Associate Before we begin... Reminder that phone lines are

More information

Maintaining Business Continuity with Disk-Based Backup and Recovery Solutions

Maintaining Business Continuity with Disk-Based Backup and Recovery Solutions I D C V E N D O R S P O T L I G H T Maintaining Business Continuity with Disk-Based Backup and Recovery Solutions March 2008 Adapted from Worldwide Data Protection and Recovery Software 2007 2011 Forecast:

More information

Medicare Compliance and Fraud, Waste, and Abuse Training

Medicare Compliance and Fraud, Waste, and Abuse Training Medicare Compliance and Fraud, Waste, and Abuse Training Objectives Recognize laws and concepts affecting compliance and fraud, waste, and abuse (FWA) Increase awareness of FWA Use identification techniques

More information

An Integrated Approach to Digital Marketing through Web Analytics

An Integrated Approach to Digital Marketing through Web Analytics I D C V E N D O R S P O T L I G H T An Integrated Approach to Digital Marketing through Web Analytics June 2005 Adapted from Worldwide Web Analytics Software Applications 2005-2008 Forecast and Analysis:

More information

Fraud and abuse overview

Fraud and abuse overview Fraud and abuse overview The National Insurance Association of America (NIAA) and the National Health Care Anti-Fraud Association (NHCAA) estimate that the financial losses due to health care fraud are

More information

Medicaid Fraud Prevention & Detection

Medicaid Fraud Prevention & Detection Medicaid Fraud Prevention & Detection Best practices for combating fraud, waste, and abuse 2012 Dun & Bradstreet Executive Summary Medicaid fraud, waste and abuse cost taxpayers up to $160 billion annually

More information

Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper

Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper Fraudulent accounts in collections: improve detection and reduce collector workload An Experian briefing paper September 2010 1. The inter-relationship of fraud and collections The fraud and collections

More information

FWA Program. Program Description. Issued by: Regulatory Compliance Department

FWA Program. Program Description. Issued by: Regulatory Compliance Department FWA Program Program Description Issued by: Regulatory Compliance Department July 2016 2016 FWA Program Description Page 1 of 16 Table of Contents Introduction Introduction..3 Definitions 4 Examples..6

More information

The Next Phase of Datacenter Network Resource Management and Automation March 2011

The Next Phase of Datacenter Network Resource Management and Automation March 2011 I D C T E C H N O L O G Y S P O T L I G H T The Next Phase of Datacenter Network Resource Management and Automation March 2011 Adapted from Worldwide Datacenter Network 2010 2015 Forecast and Analysis

More information

I D C V E N D O R S P O T L I G H T

I D C V E N D O R S P O T L I G H T I D C V E N D O R S P O T L I G H T R e c o ve r y i n t h e C l o u d July 2011 Adapted from The State of Business Continuity in End-User Environments in 2011 by Laura DuBois, Jean S. Bozman, and Eric

More information

I D C M A R K E T S P O T L I G H T

I D C M A R K E T S P O T L I G H T I D C M A R K E T S P O T L I G H T B u yi n g I n t o t h e C l o u d April 2015 By Marilyn Carr Sponsored by Ingram Micro and Microsoft This paper is part of a series developed by IDC to educate organizations

More information

Fraud Solution for Financial Services

Fraud Solution for Financial Services Fraud Solution for Financial Services Transforming Fraud Detection and Prevention in Banks and Financial Services In the digital age, the implications of financial crime against banks and other financial

More information

U s i n g S D N - and NFV-based Servi c e s to M a x i m iz e C SP Reve n u e s a n d I n c r e ase

U s i n g S D N - and NFV-based Servi c e s to M a x i m iz e C SP Reve n u e s a n d I n c r e ase I D C T E C H N O L O G Y S P O T L I G H T U s i n g S D N - and NFV-based Servi c e s to M a x i m iz e C SP Reve n u e s a n d I n c r e ase Operational Efficiency March 2013 Adapted from Will New SDN

More information

Investing in an Internet of Things (IoT) Solution: Asking the Right Questions to Minimize TCO

Investing in an Internet of Things (IoT) Solution: Asking the Right Questions to Minimize TCO I D C W O R K B O O K Investing in an Internet of Things (IoT) Solution: Asking the Right Questions to Minimize TCO January 2014 Adapted from IDC's Worldwide Internet of Things Taxonomy, IDC #243397 Sponsored

More information

Fraud, Waste and Abuse Training. Protecting the Health Care Investment. Section Three

Fraud, Waste and Abuse Training. Protecting the Health Care Investment. Section Three Fraud, Waste and Abuse Training Protecting the Health Care Investment Section Three Section 1.2: Purpose According to the National Health Care Anti-Fraud Association, the United States spends more than

More information

I D C T E C H N O L O G Y S P O T L I G H T. I m p r o ve I T E f ficiency, S t o p S e r ve r S p r aw l

I D C T E C H N O L O G Y S P O T L I G H T. I m p r o ve I T E f ficiency, S t o p S e r ve r S p r aw l I D C T E C H N O L O G Y S P O T L I G H T Optimizing Blade Ser ve r s f o r V irtualization: I m p r o ve I T E f ficiency, S t o p S e r ve r S p r aw l August 2011 Adapted from IDC Blade Market Survey:

More information

Smarter Analytics Leadership Summit Content Review

Smarter Analytics Leadership Summit Content Review Smarter Analytics Leadership Summit Content Review Agenda Fraud Point of View IBM Claims Fraud Solution Overview Infinity Insurance: Combating Fraud with IBM Claims Fraud Solution Building the Business

More information

I D C V E N D O R S P O T L I G H T

I D C V E N D O R S P O T L I G H T I D C V E N D O R S P O T L I G H T I n t e g r a t i n g Mobile Business Workflow s: T h e E vo l u t i o n f r o m D e vi c e s t o E n t erprise S o l u t i o n s August 2012 Adapted from The State

More information

Medicare 101. Presented by Area Agency on Aging 1-A

Medicare 101. Presented by Area Agency on Aging 1-A Medicare 101 Presented by Area Agency on Aging 1-A What is Medicare? n Federal Health Insurance for: n People 65 years of age or older n Some persons with disabilities, after a 24 month waiting period

More information

Update on Anthem Cyber Attack General Information for Clients and Brokers

Update on Anthem Cyber Attack General Information for Clients and Brokers Update on Anthem Cyber Attack General Information for Clients and Brokers February 20, 2015 What happened? Anthem, Inc. was the victim of a cyber attack. Anthem discovered that one of its database warehouses

More information

Software as a Service: A Transformative Way to Deliver Applications

Software as a Service: A Transformative Way to Deliver Applications I D C E X E C U T I V E B R I E F Software as a Service: A Transformative Way to Deliver Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com October 2010

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T Capitalizing on the Future with Data Solutions December 2015 Adapted from IDC PeerScape: Practices for Ensuring a Successful Big Data and Analytics Project,

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T U n i fied Cloud Management Increases IT- as- a - S e r vi c e Ag i l i t y November 2013 Adapted from VMware Unifies Cloud Management Portfolio with a Focus

More information

Making the Business Case for HR Investments During Economic Crisis

Making the Business Case for HR Investments During Economic Crisis I D C V E N D O R S P O T L I G H T Making the Business Case for HR Investments During Economic Crisis March 2009 Adapted from Putting Performance at the Hub of the Talent Universe by Lisa Rowan, IDC #214468

More information

The Fraud Enforcement and Recovery Act and Healthcare Reform: Implications for Compliance Initiatives and Fraud Investigations

The Fraud Enforcement and Recovery Act and Healthcare Reform: Implications for Compliance Initiatives and Fraud Investigations The Fraud Enforcement and Recovery Act and Healthcare Reform: Implications for Compliance Initiatives and Fraud Investigations Presented by: Robert Threlkeld, Esq. Holly Pierson, Esq. Paul F. Danello,

More information

I D C V E N D O R S P O T L I G H T

I D C V E N D O R S P O T L I G H T I D C V E N D O R S P O T L I G H T L e ve r a g i n g N e x t - Generation Servi c e D e l i ve r y: T h e M o ve t o C l o ud Servi c e s November 2011 Adapted from CSC Innoventure 2011: Good Things

More information

I D C T E C H N O L O G Y S P O T L I G H T. L e ve r a g i n g N e tw o r k Virtualization for B u s i n e s s D i fferentiation

I D C T E C H N O L O G Y S P O T L I G H T. L e ve r a g i n g N e tw o r k Virtualization for B u s i n e s s D i fferentiation I D C T E C H N O L O G Y S P O T L I G H T L e ve r a g i n g N e tw o r k Virtualization for B u s i n e s s D i fferentiation July 2014 Adapted from The Network Virtualization Evolution in Telecom by

More information

Definitions Statutory Requirements Implementation

Definitions Statutory Requirements Implementation AHCCCS Coordination of Benefits and Third Party Liability Definitions Coordination of Benefits/Cost Avoidance (COB) a method of avoiding payment of claims when other insurance resources are available to

More information

I D C T E C H N O L O G Y S P O T L I G H T. B i g D a t a a n d E C M : Making Smarter Decisions

I D C T E C H N O L O G Y S P O T L I G H T. B i g D a t a a n d E C M : Making Smarter Decisions I D C T E C H N O L O G Y S P O T L I G H T B i g D a t a a n d E C M : Making Smarter Decisions October 2013 Adapted from Worldwide Big Data Technology and Services 2012 2016 Forecast, Melissa Webster

More information

Healthcare Utilizing Trusted Identity Credentials

Healthcare Utilizing Trusted Identity Credentials Healthcare Utilizing Trusted NextgenID - Headquarters 10226 San Pedro Ave, Suite 100 San Antonio, TX 78216 (210) 530-9991 NextgenID - Washington DC 13454 Sunrise Valley Drive, Suite 430 Herndon, VA 20171

More information

SaaS BI Tools: Better Decision Making for the Rest of Us

SaaS BI Tools: Better Decision Making for the Rest of Us I D C T E C H N O L O G Y S P O T L I G H T SaaS BI Tools: Better Decision Making for the Rest of Us May 2010 Adapted from Worldwide Business Analytics Software as a Service 2009 2013 Forecast by Brian

More information

DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified

DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified Insight DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified Stephen Elliot IDC OPINION Based on a research survey conducted during October and November of 2014 across multiple

More information

Smart Identity Security: The Next Generation of Identity and Access Management

Smart Identity Security: The Next Generation of Identity and Access Management I D C V E N D O R S P O T L I G H T Smart Identity Security: The Next Generation of Identity and Access Management February 2006 Adapted from Worldwide Identity and Access Management 2005-2009 Forecast

More information

Touchstone Health Training Guide: Fraud, Waste and Abuse Prevention

Touchstone Health Training Guide: Fraud, Waste and Abuse Prevention Touchstone Health Training Guide: Fraud, Waste and Abuse Prevention About the Training Guide Touchstone is providing this Fraud, Waste and Abuse Prevention Training Guide as a resource for meeting Centers

More information