Billing for services or medical equipment not received or medically unnecessary
|
|
- Kathlyn Patrick
- 8 years ago
- Views:
Transcription
1 V E N D O R S P O T L I G H T H e a l t h c a r e Fr a ud Management: Solutions for I d e n t i f i c a t i on and Interve n t i o n November 2011 Adapted from Perspective: 360-Degree View Health Reform as a Market and Technology Disruptor by Lynne A. Dunbrack, Judy Hanover, Sven Lohse, et al., IDC #HI Sponsored by Verizon Healthcare fraud costs our already financially constrained healthcare system between $74 billion and $247 billion annually. Prompt payment laws have compelled payers to pay claims first and then analyze them retrospectively for potential fraud. This strategy often referred to as "pay, chase, and recover" allows fraudulent behavior to continue undetected for a period of time and hampers full recovery of improper payments. New legislation is requiring the federal government to use predictive modeling to identify potentially fraudulent healthcare claims and prevent improper payment from occurring. This strategy identify and intervene represents an important change in fraud management and one that more payers should pursue to rein in escalating healthcare costs. This Vendor Spotlight highlights the impact of healthcare fraud on private and public payers, as well as the personal toll such fraud takes on consumers who have had their medical records compromised as a result. It examines the efficacy of prospective identification strategies versus retrospective recovery strategies traditionally used by payers. This paper also discusses Verizon's Fraud Management for Healthcare Solution, a customized version of the Fraud Management Software Platform that the company uses for its own fraud detection program. The Impact of Healthcare Fraud Healthcare fraud is a significant and growing problem in the United States, and it will continue to worsen as cybercriminals become more sophisticated. The Federal Bureau of Investigation (FBI) estimates that fraudulent billing accounts for between 3% and 10% of healthcare expenditures each year. Put another way, healthcare fraud costs private and public payers between $74 billion and $247 billion annually. Healthcare fraud can take many forms, ranging from licensed practitioners and their staff committing fraud to organized crime rings that use stolen patient and provider identities to submit fraudulent claims for payment. Other examples of healthcare fraud include: Billing for services or medical equipment not received or medically unnecessary Upcoding or unbundling procedure codes to maximize payments for services rendered Misrepresenting diagnosis codes to ensure and/or maximize payment Waiving patient copayments and deductibles and overbilling the payer Accepting kickbacks for patient referrals Stealing provider and patient identities for fraudulent claims IDC 1212
2 Healthcare Fraud Is Not a Victimless Crime Healthcare fraud, much like identity theft, can have a profound impact on individuals when their medical identities are stolen. The Coalition Against Insurance Fraud reported that in 2010, 1.4 million Americans were victims of medical identify theft, up from 500,000 in Consumers can spend countless hours trying to resolve billing issues. Maximum limits might be reached as a result of fraudulent claims, but this issue is discovered only when the consumer's claims for legitimate services are denied. According to the Coalition Against Insurance Fraud, consumers pay on average $20,000 to resolve their cases, sometimes even paying for medical care they did not receive to restore their health coverage. More egregiously, the consumer's medical record might be compromised with falsified diagnosis or procedure codes, thus making it difficult to obtain health or life insurance because of pre-existing conditions. While the Patient Protection and Affordable Care Act of 2010 (PPACA) will eliminate pre-existing conditions within a few years, this legislation may be overturned after the 2012 elections. In the worst-case scenario, it can be a matter of life and death if vital information, such as allergies and blood type, is compromised and the wrong drugs or blood products are administered to a patient. Consumers are also placed at risk when unscrupulous clinicians provide medically unnecessary services or services that they are not qualified to provide. Legislation Increases the Focus on Preventing Fraud The passage of the Patient Protection and Affordable Care Act of 2010 (HR 3950) serves to increase the focus on preventing fraud and strengthening the tools to combat fraud when it occurs. A few notable examples are as follows: Approximately 32 million uninsured Americans will be eligible for health insurance coverage, thus providing more opportunity for fraud to be committed against their patient records. The expansion of covered persons and services as a result of insurance reform (e.g., eliminating pre-existing condition provisions, lifetime maximum limits) will increase healthcare expenditures; at the same time, the industry is trying to reduce costs. Two ways to controls costs are to reduce fraud and abuse and to improve operational efficiencies in the areas of claims processing and payment recovery. PPACA allocates $350 million over 10 years (with $95 million in the first year) through the Healthcare Fraud and Abuse Control (HCFAC) Program from FY2011 through FY2020 to provide new resources to fight fraud and abuse. PPACA will require the Secretary of Health and Human Services (HHS) to establish a national healthcare fraud and abuse data collection program that will collect data from multiple federal healthcare programs and help identify providers that have an action filed against them by another agency. Greater coordination among federal and state agencies will also be required, and sharing with private health plans will be encouraged. There are new rules and sentences that increase sentencing guidelines by 25% to 50% for crimes that involve more than $1 million in losses and tougher civil and monetary penalties for those who have committed fraud. The Secretary of Health and Human Services can withhold payment to Medicare and Medicaid providers if there is a credible allegation that fraud has been committed and an investigation is pending. This provision reverses the typical strategy of the federal government, which is to pay healthcare claims first and then attempt to recover improper payments after the fact. In addition to PPACA, other recently passed legislation is compelling federal and state agencies to focus on how they combat fraud. One such example is the Small Business Jobs and Credit Act of 2010, which was signed into law on September 27, 2010, by President Obama and requires the federal government to use predictive modeling to detect fraudulent healthcare claims. According to the legislation, the predictive modeling program had to be in place by July 1, 2011, in the 10 states identified by the HHS Secretary as being at the highest risk for fraud and abuse in the Medicare Fee- For-Service program IDC
3 Recovery Strategies: Prevention Versus "Pay, Chase, and Recover" Historically, fraud and abuse detection has been a retrospective function referred to as "pay, chase, and recover." This strategy is pursued by payers in part because prompt payment regulations require claims to be paid within a prescribed time frame typically between 30 and 60 days, and faster for electronic claims. As a result, fraudulent activity may not be detected until months after claims have been paid, and even more time may pass before improper payments are recovered. In that time, fraudsters may have ceased operations in one location and set up shop elsewhere to avoid getting caught. Thus, payment recovery is made more difficult, if not impossible. Furthermore, retrospective analysis for fraud and abuse is typically applied to a sampling of claims because of the sheer volume of paid claims data. On average, using a "pay, chase, and recover" strategy, payers recover between 50% and 60% of improper payments. In contrast, some payers, including the federal government, are re-evaluating the "pay, chase, and recover" approach and are deploying more proactive, preventive strategies that use predictive modeling to identify potentially fraudulent claims. "Identify and intervene" strategies are particularly effective for low-dollar fraud where, despite the volume of this activity, there is little economic incentive to recover an individual claim of approximately $50. Considering Verizon Verizon, a $107 billion company headquartered in New York, provides IT, communications, network, and security solutions to enterprises and government agencies around the world and has a multibillion presence in healthcare. Expanding upon its core services into new areas of growing importance in the healthcare industry, Verizon has launched a number of healthcare solutions and services in the past several years through its Connected Healthcare Solutions practice. They include: Telehealth Collaborative Services (2009) Verizon Security Management Program-Healthcare (SMP-H) (2009) Data Discovery, Identification and Security Classification suite of security consulting services (2010) Verizon Medical Data Exchange (2010) Verizon Health Information Exchange (2010) Medical identity credentials for 2.3 million clinicians (2010) Verizon Fraud Management for the Healthcare Vertical Market (2011) Verizon processes billions of records in near real time on a daily basis. Over the past 10 years, Verizon's fraud operations has monitored more than 10 times the traffic including voice, data, and managed services and security with less than half the staff and has driven a significant decline in Verizon annual fraud losses during that period of time. Verizon uses a combination of data reduction architecture and predictive modeling to find the proverbial "needle in a haystack" and detect fraud. (see Figure 1) IDC 3
4 F i g u r e 1 Data Reduction Architecture: "Finding the Needle in the Haystack" Source: Verizon, 2011 According to Verizon, hundreds of alerts and patented algorithms for data reduction, pattern recognition, and artificial intelligence are applied to the data in real time to detect potential anomalies such as fraud and security breaches. These anomalies are then further analyzed, and if warranted, cases are created to be prioritized for further investigation by case managers and, in extreme cases, law enforcement agencies. If fraud is detected, Verizon can immediately shut down further fraudulent activity by deactivating the calling card or outbound telephone number or blocking the switch at the network layer depending upon the type of fraud committed. Verizon's Fraud Management for Healthcare Solution Verizon's Fraud Management for Healthcare Solution is a customized version of the platform Verizon uses for its own fraud detection program. The Fraud Management Software Platform includes the following key components: Fraud Case Management Workbench features a Web-based user interface and workflow engine to support healthcare fraud analysis. The workflow tools can be configured to route potentially fraudulent claims to the appropriate staff for further investigation. Interactive and Visual Graphic Analysis uses links analysis and geomapping to visually show the relationship between providers and patients. Healthcare domain-specific alerts identify suspicious claims. For example, alerts can identify claims from a provider seeing patients at locations that are geographically dispersed across state lines or treating more patients than can be physically seen in a given time period. Geomapping also provides a street-level view of the service address, which can help verify whether the place of service is legitimate or a sham. Case Management Tools help fraud analysts document cases, access case notes, and track internal and external documentation to compile the evidence necessary to demonstrate fraudulent activity and support an enforcement action. Reporting and Analytics support performance metric reporting, regularly scheduled reports, and ad hoc queries. A large volume data warehouse is available for data mining and trending and analytics IDC
5 Verizon's Fraud Management for Healthcare Solution can be provided as a comprehensive managed service that combines the Fraud Management Software Platform with technical and professional services ranging from software hosting and data integration to healthcare fraud operations. Verizon Professional Services can help customers assess their fraud programs, develop appropriate procedures for their risk levels, and design new programs to address evolving threats. Advanced domain-specific predictive models are applied to healthcare claims to examine them by patient, provider, service origin, and other patterns that might indicate an anomaly requiring further review by fraud analysts and investigation by law enforcement investigators. Verizon has a significant footprint in the healthcare sector; the company reported that it provides IT solutions to more than 90% of the Healthcare Fortune As noted previously, Verizon has launched a number of products and services designed to address the unique requirements of the healthcare industry. The company also has strong expertise in security, identity management, datacenter management, and managed network services. According to the company, a key differentiator for Verizon's Fraud Management for Healthcare Solution is its data reduction architecture, which enables the solution to examine 100% of the claims in near real time and supports "identify and intervene" strategies. Thus, fraudulent activity is discovered earlier in the claims processing cycle and before the claim is paid. Challenges A challenge faced by Verizon is that it is a recent entrant into the relatively crowded market of healthcare fraud management solutions. A number of vendors offer fraud and abuse solutions for the healthcare industry. However, these solutions tend to mirror the current industry practice of performing a retrospective analysis to identify fraudulent activity. A comparatively new offering, Verizon's Fraud Management for Healthcare Solution is a customized version of the Fraud Management Software Platform that Verizon has used internally with success. Verizon can point to this success and also to the fact that the healthcare solution will scale because it supports Verizon's global fraud operations. Conclusion Predictive modeling for fraud detection is an essential weapon in a healthcare organization's arsenal to combat fraud and abuse. The current practice of "pay, chase, and recover" allows fraudulent activity to flourish undetected for longer periods of time, allowing losses to grow. The U.S. healthcare system cannot afford to withstand these substantial losses. Funds used for improper payments could be used to provide services for legitimate beneficiaries, fund innovation, or stem rising premiums. As a result, the healthcare industry needs a new approach to fraud management that is less retrospective in nature and that utilizes data reduction and predictive modeling technologies. If Verizon can address the challenges outlined in this paper, IDC believes the company can succeed in the important market for healthcare fraud solutions. A B O U T T H I S P U B L I C A T I ON This publication was produced by IDC Health Insights Go-to-Market Services. The opinion, analysis, and research results presented herein are drawn from more detailed research and analysis independently conducted and published by IDC Health Insights, unless specific vendor sponsorship is noted. IDC Health Insights Go-to-Market Services makes IDC Health Insights content available in a wide range of formats for distribution by various companies. A license to distribute IDC Health Insights content does not imply endorsement of or opinion about the licensee IDC 5
6 C O P Y R I G H T A N D R E S T R I C T I O N S Any IDC Health Insights information or reference to IDC Health Insights that is to be used in advertising, press releases, or promotional materials requires prior written approval from IDC Health Insights. For permission requests, contact the GMS information line at or gms@idc.com. Translation and/or localization of this document requires an additional license from IDC Health Insights. For more information on IDC Health Insights, an IDC company, visit For more information on IDC, visit For more information on GMS, visit Global Headquarters: 5 Speen Street Framingham, MA USA P F IDC
Stopping the Flow of Health Care Fraud with Technology, Data and Analytics
White Paper and New Ways to Fight It Stopping the Flow of Health Care Fraud with Technology, Data and Analytics January 2014 Health care costs are rising and everyone is being affected, including patients,
More informationPreventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations
Preventing Healthcare Fraud through Predictive Modeling Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services Project initiated: July 2012 Project
More informationPreventing Health Care Fraud
Preventing Health Care Fraud Project: Predictive Modeling for Fraud Detection at MassHealth Category: Improving State Operations Commonwealth of Massachusetts Executive Office of Health and Human Services
More informationThe Predictive Fraud and Abuse Analytic and Risk Management System
The Predictive Fraud and Abuse Analytic and Risk Management System Empowering healthcare payers and stakeholders in preventing and recovering fraudulent healthcare payments IkaIntegrity : Your real-time
More informationMedical Fraud Detection Through Data Mining Megaputer Case Study www.megaputer.com Megaputer Intelligence, Inc. 120 West Seventh Street, Suite 310 Bloomington, IN 47404, USA +1 812-330-0110 Medical Fraud
More informationAn Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection
An Innocent Mistake or Intentional Deceit? How ICD-10 is blurring the line in Healthcare Fraud Detection October 2012 Whitepaper Series Issue No. 7 Copyright 2012 Jvion LLC All Rights Reserved 1 that are
More informationI D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
More informationResearch Brief: Insurers Efforts to Prevent Health Care Fraud
Research Brief: Insurers Efforts to Prevent Health Care Fraud January 2011 The issue of fraud prevention has emerged with a new sense of urgency among administrators of public health insurance programs.
More informationPrevention is Better than Cure: Protect Your Medical Identity
Prevention is Better than Cure: Protect Your Medical Identity Center for Program Integrity Centers for Medicare & Medicaid Services Shantanu Agrawal, MD, MPhil Medical Director Washington State Medical
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T E n t r y- L e ve l S olutions for Priva t e C l o u d Au t o m a t i o n D e l i ve r R a p i d R e t u r n s May 2012 Adapted from Worldwide Cloud Systems
More informationI D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N David Tapper Vice President, Outsourcing and Managed Services T h e B u s i n e ss Value of Managed Servi c e s i n Optimizing Productivi t y, D r i vi n g D ow
More informationI D C V E N D O R S P O T L I G H T. S t o r a g e Ar c h i t e c t u r e t o Better Manage B i g D a t a C hallenges
I D C V E N D O R S P O T L I G H T S t o r a g e Ar c h i t e c t u r e t o Better Manage B i g D a t a C hallenges September 2012 Adapted from Worldwide File-Based Storage 2011 2015 Forecast: Foundation
More informationTaming IT Management Chaos
I D C T E C H N O L O G Y S P O T L I G H T Taming IT Management Chaos January 2009 Adapted from Datacenter Automation: Accelerating Market Maturity Through Investment in IT by Tim Grieser, IDC #213868
More informationSAS Fraud Framework for Health Care Evolution and Learnings
SAS Fraud Framework for Health Care Evolution and Learnings Julie Malida, Principal for Health Care Fraud, SAS Jay King, Manager, Advanced Analytics Lab, SAS Copyright 2009, SAS Institute Inc. All rights
More informationWorkload Automation Challenges and Opportunities
I D C E X E C U T I V E B R I E F Workload Automation Challenges and Opportunities May 2011 Sponsored by BMC Executive Summary Enterprise IT workload environments are becoming more complex, dynamic, and
More informationOn-Demand vs. On-Premise Customer Relationship Management: A New Hybrid Emerges
I D C I - V I E W Mary Wardley Vice President, Enterprise Applications and CRM Software On-Demand vs. On-Premise Customer Relationship Management: A New Hybrid Emerges September 2007 Adapted from Worldwide
More informationI D C V E N D O R S P O T L I G H T. H yb r i d C l o u d Solutions for ERP
I D C V E N D O R S P O T L I G H T H yb r i d C l o u d Solutions for ERP November 2014 Adapted from Worldwide Enterprise Applications 2014 2018 Forecast and 2013 Vendor Shares by Christine Dover Sponsored
More informationI D C V E N D O R S P O T L I G H T. F l a s h, C l o u d, a nd Softw ar e - D e f i n e d Storage:
I D C V E N D O R S P O T L I G H T F l a s h, C l o u d, a nd Softw ar e - D e f i n e d Storage: N ew T rends Impacting Enterprise Datacenters March 2014 Adapted from IDC Worldwide Storage Predictions
More informationData Management: Foundational Technologies for Health Insurance Exchange Success
INDUSTRY BRIEF Data Management: Foundational Technologies for Health Insurance Exchange Success Sponsored by: Informatica Janice W. Young November 2013 IN THIS INDUSTRY BRIEF U.S. health plans have been
More informationSelf-Service Big Data Analytics for Line of Business
I D C A N A L Y S T C O N N E C T I O N Dan Vesset Program Vice President, Business Analytics and Big Data Self-Service Big Data Analytics for Line of Business March 2015 Big data, in all its forms, is
More informationI D C E V E N T P R O C E E D I N G S
I D C E V E N T P R O C E E D I N G S As i a / P a c i f i c Perspecti ve s : N a vi g a t i n g t h e D a t a c e n t e r Security I m p e r a t i ve September 2014 By Chuang Shyne-Song; Program Director,
More informationPerspective: Cloud Solutions and Deployment for Healthcare Payers in 2014
Perspective Perspective: Cloud Solutions and Deployment for Healthcare Payers in 2014 Lynne A. Dunbrack Judy Hanover IN THIS PERSPECTIVE This IDC Health Insights Perspective examines the current status
More informationI D C M A R K E T S P O T L I G H T. P r i va t e a n d H yb r i d C l o u d s E n a b l e New L e ve l s o f B u s i n e s s and IT Collaboration
I D C M A R K E T S P O T L I G H T P r i va t e a n d H yb r i d C l o u d s E n a b l e New L e ve l s o f B u s i n e s s and IT Collaboration September 2013 Adapted from IDC Maturity Model: Cloud A
More informationI D C M A R K E T S P O T L I G H T
I D C M A R K E T S P O T L I G H T M a naging the Data Ar c h i ve : Ar e I T a n d L i n e s o f B u siness at Odds w i t h Legal and C o m p l i a n c e? June 2015 By Laura DuBois and Sean Pike Sponsored
More informationC l o u d - B a s e d S u p p l y C h a i n s : T r a n s f o rming M a n u f a c t u r ing Performance
M A R K E T S P O T L I G H T C l o u d - B a s e d S u p p l y C h a i n s : T r a n s f o rming M a n u f a c t u r ing Performance October 2012 Adapted from Business Strategy: Supply Chain in the Cloud
More informationI D C M A R K E T S P O T L I G H T
I D C M A R K E T S P O T L I G H T E n t r y- L e ve l E n t e r p r ise Storage: Stepping Up t o B i g C h a l lenges October 2012 Adapted from The Appliance-ization of the Datacenter and Its Impact
More informationEMDEON PAYMENT INTEGRITY SERVICES
EMDEON PAYMENT INTEGRITY SERVICES Emdeon Fraud Prevention Services Emdeon Fraud Investigative Services Emdeon Clinical Integrity for Claims Emdeon Third-Party Liability Analysis Simplifying the Business
More informationCombating Fraud, Waste, and Abuse in Healthcare
Combating Fraud, Waste, and Abuse in Healthcare ABSTRACT This paper discusses how real time analytics and event intelligence technologies can be used to analyze, detect, and prevent fraud, waste, and abuse
More informationSTAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES HEALTH CARE REFORM A POTENTIAL PLAYGROUND FOR FRAUD
STAYING AHEAD OF THE PACK: EMERGING TRENDS & ISSUES HEALTH CARE REFORM A POTENTIAL PLAYGROUND FOR FRAUD With the upcoming Health Care Reform Act, health care fraudsters will be using new tactics to defraud
More informationNetwork Management Services: A Cost-Effective Approach to Complexity
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com I D C E X E C U T I V E B R I E F Network Management Services: A Cost-Effective Approach to Complexity
More informationFrom Chase to Prevention. Stopping Healthcare Fraud Before it Happens
From Chase to Prevention Stopping Healthcare Fraud Before it Happens Healthcare fraud, waste, and abuse cost taxpayers tens of billions of dollars per year, with Medicare and Medicaid fraud alone estimated
More informationOptimizing Information Management in the Cloud
I D C E X E C U T I V E B R I E F Optimizing Information Management in the Cloud June 2011 Adapted from Cloud Storage Impacted by Datacenter Transformations and the Changing Role of IT by Laura DuBois,
More informationI D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s
I D C S P O T L I G H T Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s March 2012 Adapted from Worldwide Cloud Security 2011 2015 Forecast: A Comprehensive
More informationI D C T E C H N O L O G Y S P O T L I G H T. E n a b l i n g Quality I n n o va t i o n w i t h Servi c e
I D C T E C H N O L O G Y S P O T L I G H T E n a b l i n g Quality I n n o va t i o n w i t h Servi c e V i r t u a lization a nd Netw or k Virtualization December 2014 Adapted from Worldwide Automated
More informationME DIC BENEFIT INTEGRITY ACTIVITIES IN MEDICARE PARTS C AND D
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL ME DIC BENEFIT INTEGRITY ACTIVITIES IN MEDICARE PARTS C AND D Daniel R. Levinson Inspector General January 2013 OEI-03-11-00310 EXECUTIVE
More informationBig Data Tips the Power Balance Between IT and Business Users
I D C A N A L Y S T C O N N E C T I O N Carla Arend Programme Director, European Software IDC EMEA Big Data Tips the Power Balance Between IT and Business Users Sponsored by: Computacenter November 2012
More informationVirtualization in Healthcare: Less Can Be More
HEALTH INDUSTRY INSIGHTS EXECUTIVE BRIEF Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.935.4445 F.508.988.7881 www.healthindustry-insights.com Virtualization in Healthcare: Less Can
More informationPREVENTING FRAUD, ABUSE, & WASTE: A Primer for Physical Therapists
PREVENTING FRAUD, ABUSE, & WASTE: A Primer for Physical Therapists Available at: http://www.apta.org/integrity 2014 American Physical Therapy Association. All rights reserved. All reproduction or redistribution
More informationI D C A N A L Y S T C O N N E C T I O N. I m p r o vi n g C o m m u n i c a t i o n s w i t h Au t o m a t e d T r a n s l a t i o n
I D C A N A L Y S T C O N N E C T I O N David Schubmehl Research Manager, Search, Content Analytics, and Discovery Sue Feldman Research Vice President, Search and Discovery Technologies I m p r o vi n
More informationBenefits fraud: Shrink the risk Gain group plan sustainability
Benefits fraud: Shrink the risk Gain group plan sustainability Life s brighter under the sun Fraud: A real threat to group plan sustainability Fraud in group benefits has always existed, but never has
More informationAchieving Real Program Integrity 2011 NAMD Annual Conference
Achieving Real Program Integrity 2011 NAMD Annual Conference Center for Program Integrity Centers for Medicare & Medicaid Services Angela Brice-Smith Director, Medicaid Integrity Group November 9, 2011
More informationHow Big Data Transforms Data Protection and Storage
I D C E X E C U T I V E B R I E F How Big Data Transforms Data Protection and Storage August 2012 Written by Carla Arend Sponsored by CommVault Introduction: How Big Data Transforms Storage Omøgade 8 P.O.Box
More informationMedicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011
Medicare Fraud, Waste, and Abuse Training for Healthcare Professionals 2010-2011 Y0067_H2816_H6169_WEB_UAMC IA 11/22/2010 Last Updated: 11/22/2010 Medicare Requirements The Centers for Medicare and Medicaid
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T AP M S a a S and An a l yt i c s S t e p U p t o Meet the N e e d s o f M odern Ap p l i c a t i o n s, M o b i le Users, a n d H yb r i d C l o ud Ar c h i
More informationFEHB Program Carrier Letter
FEHB Program Carrier Letter All Carriers U.S. Office of Personnel Management Healthcare and Insurance Letter No. 2014-29 Date: December 19, 2014 Fee-for-service [ 25 ] Experience-rated HMO [ 25 ] Community-rated
More informationUsing Analytics to detect and prevent Healthcare fraud. Copyright 2010 SAS Institute Inc. All rights reserved.
Using Analytics to detect and prevent Healthcare fraud Copyright 2010 SAS Institute Inc. All rights reserved. Agenda Introductions International Fraud Trends Overview of the use of Analytics in Healthcare
More informationFraud and Improve Provider and Member Management?
Using IdentityManagement andpredictiveanalyticsto to Prevent Fraud and Improve Provider and Member Management? Kathy Mosbaugh, Director, Health Care February 6, 2013 LexisNexis leverages data about people,
More informationFRAUD AND ABUSE (SECTION-BY-SECTION ANALYSIS)
FRAUD AND ABUSE (SECTION-BY-SECTION ANALYSIS) (Information compiled from the Democratic Policy Committee (DPC) Report on The Patient Protection and Affordable Care Act and the Health Care and Education
More informationI D C V E N D O R S P O T L I G H T. W o r k l o a d Management Enables Big Data B u s i n e s s Process Optimization
I D C V E N D O R S P O T L I G H T W o r k l o a d Management Enables Big Data B u s i n e s s Process Optimization November 2015 Adapted from Worldwide Workload Management Software Market Shares, 2014:
More informationThe State of Insurance Fraud Technology. A study of insurer use, strategies and plans for anti-fraud technology
The State of Insurance Fraud Technology A study of insurer use, strategies and plans for anti-fraud technology September 2014 The State of Insurance Fraud Technology A study of insurer use, strategies
More informationMedicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010
Medicare Advantage and Part D Fraud, Waste, and Abuse Training October 2010 Introduction 2008: United States spent $2.3 trillion on health care. Federal fiscal year 2010: Medicare expected to cover an
More informationStrengthening Medicare: Better Health, Better Care, Lower Costs Efforts Will Save Nearly $120 Billion for Medicare Over Five Years.
Strengthening Medicare: Better Health, Better Care, Lower Costs Efforts Will Save Nearly $120 Billion for Medicare Over Five Years Introduction The Centers for Medicare and Medicaid Services (CMS) and
More informationI D C M A R K E T S P O T L I G H T. S M B s Embrace Business Televi s i o n :
I D C M A R K E T S P O T L I G H T S M B s Embrace Business Televi s i o n : N ew Options in a Visual World December 2013 Adapted from 2012 SMB Emerging Services Survey Results: U.S. SMB Television Market
More informationI N D U S T R Y S P O T L I G H T. T h e Grow i n g Appeal of Ad va n c e d a n d P r e d i c ti ve Analytics f o r the Utility I n d u s t r y
(% of respondents) I N D U S T R Y S P O T L I G H T T h e Grow i n g Appeal of Ad va n c e d a n d P r e d i c ti ve Analytics f o r the Utility I n d u s t r y October 2014 Sponsored by SAP Advanced
More informationBuilding a Web Security Ecosystem to Combat Emerging Internet Threats
I D C V E N D O R S P O T L I G H T Building a Web Security Ecosystem to Combat Emerging Internet Threats September 2005 Adapted from: Worldwide Secure Content Management 2005 2009 Forecast Update and
More informationI D C A N A L Y S T C O N N E C T I O N. C o g n i t i ve C o m m e r c e i n B2B M a rketing a n d S a l e s
I D C A N A L Y S T C O N N E C T I O N Dave Schubmehl Research Director, Cognitive Systems and Content Analytics Greg Girard Program Director, Omni-Channel Retail Analytics Strategies C o g n i t i ve
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Advanced Analytics Dan Vesset September 2003 INTRODUCTION In the previous sections of this series
More informationGot Files? Get Cloud!
I D C V E N D O R S P O T L I G H T Got Files? Get Cloud! November 2010 Adapted from State of File-Based Storage Use in Organizations by Richard Villars, IDC #221138 Sponsored by F5 Networks The explosion
More informationI D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T S u p p o r t i n g Softw a re Business Transformation w ith Sys t e m s D e s i g n e d for the Task November 2014 Adapted from Managing Business Model Transitions
More informationI D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!
I D C T E C H N O L O G Y S P O T L I G H T S e r ve r S e c u rity: N o t W h a t It U s e d t o Be! December 2014 Adapted from Worldwide Endpoint Security 2013 2017 Forecast and 2012 Vendor Shares by
More informationI D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T S t o r a g e T rends: Delive r i n g M a n a g e m ent and I n t e l l i g e n c e T h r o u g h C l o u d S e r vi c es April 2013 Adapted from IDC's Worldwide Storage
More information2015 Fraud, Waste & Abuse Prevention
Quality Independent Physicians, LLC Awareness Training 2015 Fraud, Waste & Abuse Prevention Fraud, Waste and Abuse (FWA) Training Objectives After completing this training you should be able to: Recognize
More informationWhat Can Software as a Service Do for Your Business?
I D C E X E C U T I V E B R I E F What Can Software as a Service Do for Your Business? November 2010 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
More informationI D C A N A L Y S T C O N N E C T I O N. T h e C r i t i cal Role of I/O in Public Cloud S e r vi c e P r o vi d e r E n vi r o n m e n t s
($B) I D C A N A L Y S T C O N N E C T I O N Rick Villars Vice President, Information and Cloud T h e C r i t i cal Role of I/O in Public Cloud S e r vi c e P r o vi d e r E n vi r o n m e n t s August
More informationImplementing a New Technology: FPS Successes, Challenges, and Best Practices
Implementing a New Technology: FPS Successes, Challenges, and Best Practices Centers for Medicare & Medicaid Services Raymond Wedgeworth Director, Data Analytics and Control Group Center for Program Integrity
More informationHelping Enterprises Succeed: Responsible Corporate Strategy and Intelligent Business Insights
I D C E X E C U T I V E I N S I G H T S Helping Enterprises Succeed: Responsible Corporate Strategy and Intelligent Business Insights May 2009 By Albert Pang, Research Director, Enterprise Applications
More informationSummary of Anti-Fraud Provisions in the Affordable Care Act
Summary of Anti-Fraud Provisions in the Affordable Care Act Michael F. Ruggio Shareholder Patrick J. Hurd Senior Counsel Sarah Reimers McIntee Associate Before we begin... Reminder that phone lines are
More informationMaintaining Business Continuity with Disk-Based Backup and Recovery Solutions
I D C V E N D O R S P O T L I G H T Maintaining Business Continuity with Disk-Based Backup and Recovery Solutions March 2008 Adapted from Worldwide Data Protection and Recovery Software 2007 2011 Forecast:
More informationMedicare Compliance and Fraud, Waste, and Abuse Training
Medicare Compliance and Fraud, Waste, and Abuse Training Objectives Recognize laws and concepts affecting compliance and fraud, waste, and abuse (FWA) Increase awareness of FWA Use identification techniques
More informationAn Integrated Approach to Digital Marketing through Web Analytics
I D C V E N D O R S P O T L I G H T An Integrated Approach to Digital Marketing through Web Analytics June 2005 Adapted from Worldwide Web Analytics Software Applications 2005-2008 Forecast and Analysis:
More informationFraud and abuse overview
Fraud and abuse overview The National Insurance Association of America (NIAA) and the National Health Care Anti-Fraud Association (NHCAA) estimate that the financial losses due to health care fraud are
More informationMedicaid Fraud Prevention & Detection
Medicaid Fraud Prevention & Detection Best practices for combating fraud, waste, and abuse 2012 Dun & Bradstreet Executive Summary Medicaid fraud, waste and abuse cost taxpayers up to $160 billion annually
More informationFraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper
Fraudulent accounts in collections: improve detection and reduce collector workload An Experian briefing paper September 2010 1. The inter-relationship of fraud and collections The fraud and collections
More informationFWA Program. Program Description. Issued by: Regulatory Compliance Department
FWA Program Program Description Issued by: Regulatory Compliance Department July 2016 2016 FWA Program Description Page 1 of 16 Table of Contents Introduction Introduction..3 Definitions 4 Examples..6
More informationThe Next Phase of Datacenter Network Resource Management and Automation March 2011
I D C T E C H N O L O G Y S P O T L I G H T The Next Phase of Datacenter Network Resource Management and Automation March 2011 Adapted from Worldwide Datacenter Network 2010 2015 Forecast and Analysis
More informationI D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T R e c o ve r y i n t h e C l o u d July 2011 Adapted from The State of Business Continuity in End-User Environments in 2011 by Laura DuBois, Jean S. Bozman, and Eric
More informationI D C M A R K E T S P O T L I G H T
I D C M A R K E T S P O T L I G H T B u yi n g I n t o t h e C l o u d April 2015 By Marilyn Carr Sponsored by Ingram Micro and Microsoft This paper is part of a series developed by IDC to educate organizations
More informationFraud Solution for Financial Services
Fraud Solution for Financial Services Transforming Fraud Detection and Prevention in Banks and Financial Services In the digital age, the implications of financial crime against banks and other financial
More informationU s i n g S D N - and NFV-based Servi c e s to M a x i m iz e C SP Reve n u e s a n d I n c r e ase
I D C T E C H N O L O G Y S P O T L I G H T U s i n g S D N - and NFV-based Servi c e s to M a x i m iz e C SP Reve n u e s a n d I n c r e ase Operational Efficiency March 2013 Adapted from Will New SDN
More informationInvesting in an Internet of Things (IoT) Solution: Asking the Right Questions to Minimize TCO
I D C W O R K B O O K Investing in an Internet of Things (IoT) Solution: Asking the Right Questions to Minimize TCO January 2014 Adapted from IDC's Worldwide Internet of Things Taxonomy, IDC #243397 Sponsored
More informationFraud, Waste and Abuse Training. Protecting the Health Care Investment. Section Three
Fraud, Waste and Abuse Training Protecting the Health Care Investment Section Three Section 1.2: Purpose According to the National Health Care Anti-Fraud Association, the United States spends more than
More informationI D C T E C H N O L O G Y S P O T L I G H T. I m p r o ve I T E f ficiency, S t o p S e r ve r S p r aw l
I D C T E C H N O L O G Y S P O T L I G H T Optimizing Blade Ser ve r s f o r V irtualization: I m p r o ve I T E f ficiency, S t o p S e r ve r S p r aw l August 2011 Adapted from IDC Blade Market Survey:
More informationSmarter Analytics Leadership Summit Content Review
Smarter Analytics Leadership Summit Content Review Agenda Fraud Point of View IBM Claims Fraud Solution Overview Infinity Insurance: Combating Fraud with IBM Claims Fraud Solution Building the Business
More informationI D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T I n t e g r a t i n g Mobile Business Workflow s: T h e E vo l u t i o n f r o m D e vi c e s t o E n t erprise S o l u t i o n s August 2012 Adapted from The State
More informationMedicare 101. Presented by Area Agency on Aging 1-A
Medicare 101 Presented by Area Agency on Aging 1-A What is Medicare? n Federal Health Insurance for: n People 65 years of age or older n Some persons with disabilities, after a 24 month waiting period
More informationUpdate on Anthem Cyber Attack General Information for Clients and Brokers
Update on Anthem Cyber Attack General Information for Clients and Brokers February 20, 2015 What happened? Anthem, Inc. was the victim of a cyber attack. Anthem discovered that one of its database warehouses
More informationSoftware as a Service: A Transformative Way to Deliver Applications
I D C E X E C U T I V E B R I E F Software as a Service: A Transformative Way to Deliver Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com October 2010
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T Capitalizing on the Future with Data Solutions December 2015 Adapted from IDC PeerScape: Practices for Ensuring a Successful Big Data and Analytics Project,
More informationI D C T E C H N O L O G Y S P O T L I G H T
I D C T E C H N O L O G Y S P O T L I G H T U n i fied Cloud Management Increases IT- as- a - S e r vi c e Ag i l i t y November 2013 Adapted from VMware Unifies Cloud Management Portfolio with a Focus
More informationMaking the Business Case for HR Investments During Economic Crisis
I D C V E N D O R S P O T L I G H T Making the Business Case for HR Investments During Economic Crisis March 2009 Adapted from Putting Performance at the Hub of the Talent Universe by Lisa Rowan, IDC #214468
More informationThe Fraud Enforcement and Recovery Act and Healthcare Reform: Implications for Compliance Initiatives and Fraud Investigations
The Fraud Enforcement and Recovery Act and Healthcare Reform: Implications for Compliance Initiatives and Fraud Investigations Presented by: Robert Threlkeld, Esq. Holly Pierson, Esq. Paul F. Danello,
More informationI D C V E N D O R S P O T L I G H T
I D C V E N D O R S P O T L I G H T L e ve r a g i n g N e x t - Generation Servi c e D e l i ve r y: T h e M o ve t o C l o ud Servi c e s November 2011 Adapted from CSC Innoventure 2011: Good Things
More informationI D C T E C H N O L O G Y S P O T L I G H T. L e ve r a g i n g N e tw o r k Virtualization for B u s i n e s s D i fferentiation
I D C T E C H N O L O G Y S P O T L I G H T L e ve r a g i n g N e tw o r k Virtualization for B u s i n e s s D i fferentiation July 2014 Adapted from The Network Virtualization Evolution in Telecom by
More informationDefinitions Statutory Requirements Implementation
AHCCCS Coordination of Benefits and Third Party Liability Definitions Coordination of Benefits/Cost Avoidance (COB) a method of avoiding payment of claims when other insurance resources are available to
More informationI D C T E C H N O L O G Y S P O T L I G H T. B i g D a t a a n d E C M : Making Smarter Decisions
I D C T E C H N O L O G Y S P O T L I G H T B i g D a t a a n d E C M : Making Smarter Decisions October 2013 Adapted from Worldwide Big Data Technology and Services 2012 2016 Forecast, Melissa Webster
More informationHealthcare Utilizing Trusted Identity Credentials
Healthcare Utilizing Trusted NextgenID - Headquarters 10226 San Pedro Ave, Suite 100 San Antonio, TX 78216 (210) 530-9991 NextgenID - Washington DC 13454 Sunrise Valley Drive, Suite 430 Herndon, VA 20171
More informationSaaS BI Tools: Better Decision Making for the Rest of Us
I D C T E C H N O L O G Y S P O T L I G H T SaaS BI Tools: Better Decision Making for the Rest of Us May 2010 Adapted from Worldwide Business Analytics Software as a Service 2009 2013 Forecast by Brian
More informationDevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified
Insight DevOps and the Cost of Downtime: Fortune 1000 Best Practice Metrics Quantified Stephen Elliot IDC OPINION Based on a research survey conducted during October and November of 2014 across multiple
More informationSmart Identity Security: The Next Generation of Identity and Access Management
I D C V E N D O R S P O T L I G H T Smart Identity Security: The Next Generation of Identity and Access Management February 2006 Adapted from Worldwide Identity and Access Management 2005-2009 Forecast
More informationTouchstone Health Training Guide: Fraud, Waste and Abuse Prevention
Touchstone Health Training Guide: Fraud, Waste and Abuse Prevention About the Training Guide Touchstone is providing this Fraud, Waste and Abuse Prevention Training Guide as a resource for meeting Centers
More information