WHY IDENTITY MANAGEMENT MATTERS TO MEDICAID. Clint Fuhrman National Director Government Healthcare



Similar documents
Using Predictive Modeling and Public Records in Fraud Detection. Clint Fuhrman National Director Government Healthcare

Fraud and Improve Provider and Member Management?

The Value of Advanced Data Integration in a Big Data Services Company. Presenter: Flavio Villanustre, VP Technology September 2014

Leveraging Big Data for the Next Generation of Health Care Ken Cunningham, VP Analytics Pam Jodock, Director Business Development

Thomson Reuters CLEAR THE SMARTER WAY TO GET YOUR INVESTIGATIVE FACTS STRAIGHT.

SCHEDULE A Accurint for Government (Per User Subscription)

clear.thomsonreuters.com DON T JUST FIND PEOPLE. FIND ANSWERS. CLEAR

Report to the Legislature. Medicaid Fraud, Waste, and Abuse Program

clear.thomsonreuters.com DON T JUST FIND PEOPLE. FIND ANSWERS. CLEAR

Medicaid Fraud Prevention & Detection

From Chase to Prevention. Stopping Healthcare Fraud Before it Happens

Price Schedule for Accurint, Social Media Monitor, Batch, Instant Verification and Instant Authentication

Key Factors for Payers in Fraud and Abuse Prevention. Protect against fraud and abuse with a multi-layered approach to claims management.

LexisNexis InstantID. Technical White Paper. Analyzing Results. For the following: LexisNexis Bridger Insight XG. Contact LexisNexis Sales:

Product. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution

UPDATED. Special Advisory Bulletin on the Effect of Exclusion from Participation in Federal Health Care Programs

A Unique Perspective into the World of Identity Fraud

Unlimited. Premier Investigative Database for Law Enforcement & Government Agencies. For A FREE TRIAL

Customer Education. LexisNexis Accurint Getting Started & Best Practices Guide. LexisNexis Risk Solutions

Smarter Analytics Leadership Summit Content Review

Prevention is Better than Cure: Protect Your Medical Identity

WELFARE FRAUD PREVENTION ACT. Section 1. Definitions. For purposes of this Act, the following definitions apply:

EMDEON PAYMENT INTEGRITY SERVICES

Target Analytics Data Enrichment Services Portfolio

Department of Health and Human Services. Centers for Medicare & Medicaid Services. Medicaid Integrity Program

SOCIAL SECURITY NUMBER VERIFICATION BEST PRACTICES

Knowledge Based Authentication [KBA] is not just for onboarding new customers

Preventing Health Care Fraud

Provider Entity Disclosure of Ownership, Controlling Interest and Management Statement

Automotive Services. Tools for dealers, lenders and industry service providers that drive profitable results in today s economy

AMERIGROUP DISCLOSURE FORM FOR A PROVIDER PERSON

one admin. one tool. Providing instant access to hundreds of industry leading verification tools.

Multi-Factor Authentication of Online Transactions

BEHAVIORAL HEALTH PROVIDER PROFILE FORM

Church Mutual Recommends First Advantage

PHYSICIAN ASSISTANT PROVIDER PROFILE FORM

WHITEPAPER. Complying with the Red Flag Rules and FACT Act Address Discrepancy Rules

How To Get A Better Price On Health Care From Your Printer (Xerox)

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

Center for Program Integrity

PROVIDER APPLICATION

Making critical connections: predictive analytics in government

Stopping the Flow of Health Care Fraud with Technology, Data and Analytics

Introduction. By Santhosh Patil, Infogix Inc.

How Real-Time Data Integration is Changing the Face of Healthcare IT

LexisNexis Provider FAQs

2nd Global Summit Healthcare Fraud: Prevention is better than cure October 2012 Beaumont Estate, Old Windsor, UK

PALANTIR HEALTH. Maximizing data assets to improve quality, risk, and compliance. 100 Hamilton Ave, Suite 300 Palo Alto, California 94301

Title: Federal Health Care Program Exclusion Screening

Fraud Solution for Financial Services

WHITEPAPER. Best Practices in Registration Data Management. Government agencies can reduce fraud and turn registrant data into a powerful asset

NATIONAL PROVIDER IDENTIFIER (NPI) APPLICATION/UPDATE FORM

SCALABLE SYSTEMS LIFE SCIENCE & HEALTHCARE PRACTICES

Service Provider Agreement

Exhibit "A" to the Customer Services Agreement Prepared for: SCUMC All Products Date: October 15, 2012

Preventing Healthcare Fraud through Predictive Modeling. Category: Improving State Operations

The Predictive Fraud and Abuse Analytic and Risk Management System

()FFICE OF INSPECTOR GENERAL

Sample Report: LexisNexis RiskView Report

The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age

LexisNexis SmartLinx Comprehensive Reports Getting Started & Search Tips Guide. LexisNexis Customer Support:

Presentation to the Senate Finance Medicaid Subcommittee: Prevention and Detection of Fraud, Waste and Abuse

MEDICAID PROGRAM INTEGRITY

FRAUD AND ABUSE (SECTION-BY-SECTION ANALYSIS)

A Business Case for Fixing Provider Data Issues

Trends in Healthcare Payments Fifth Annual Report: 2014

I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.

Insurance Solutions. 17 October Risk Solutions

The Facets of Fraud. A layered approach to fraud prevention

Business Information Services. Product overview

Click here to visit EPIC's updated website featuring our three services: Outsourcing, Consulting and Managed Services > EPIC Connections.

Provider Registries: Reduce Health System Costs, Increase Efficiencies, Improve Care

Meeting Identity Theft Red Flags Regulations with IBM Fraud, Risk & Compliance Solutions

Plugging Premium Leakage

Important Information About MetLife s Portability Option

Treasury Inspector General Tax Administration (TIGTA)

Fraud, Waste and Abuse Training. Protecting the Health Care Investment. Section Three

ADA-Sponsored Disability Income Protection Plan Application for Insurance

Deluxe Provent : Protecting against expanded threats. Providing for expanded opportunities.

Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration

Empowering Brokers to Identify and Combat Mortgage Fraud

GAO MEDICARE. Concerns About HCFA s Efforts to Prevent Fraud by Third-Party Billers. Testimony

The Informatica Solution for Improper Payments

Identity fraud demands constantly evolving prevention strategies to thwart ever-shifting criminals.

Accountable Care Organization. Medicare Shared Savings Program. Compliance Plan

I See Fraud Rings. by Dr. Stephen Coggeshall Chief Analytics and Science Officer. November 2012 WHITEPAPER

ZixCorp Lexicons. An Overview

BEYOND IDENTITY PROOFING: How EHRs Can Become More Than Just Vendors

Privacy Impact Assessment for the. E-Verify Self Check. March 4, 2011

North Carolina Government Data Analytics Center

Central Oregon Community College. Identity Theft Prevention Program

Department of Health and Human Services. Centers for Medicare & Medicaid Services. Medicaid Integrity Program

Privacy Impact Assessment for the. E-Verify Self Check. DHS/USCIS/PIA-030(b) September 06, 2013

1. Legal Name of the Primary Applicant: 3. Corporate Contact Name: 4. Corporate Contact Phone:

Identity: The Key to the Future of Healthcare

SOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule

ACCIDENT INSURANCE CLAIM

Contract Checklist for Mutual of Omaha Insurance Company

MOTLOW STATE COMMUNITY COLLEGE

Network Security and Vulnerability Assessment Solutions

Transcription:

WHY IDENTITY MANAGEMENT MATTERS TO MEDICAID Clint Fuhrman National Director Government Healthcare

Opportunities Greater focus on the individuals and entities in the program Are beneficiaries enrolling who they claim to be? Have they disclosed all assets, income, correct state of residence, etc? What are the true backgrounds of the practitioners, officers, agents, etc?

Overview of a Data Aggregation/Risk Solution Provider We assess the risks and opportunities associated with people, businesses and assets. Identity Analytics Who are you? Where are you? Who are you related to, and how? How much of a risk do you present? Health Care Background Screening Collections Financial Services Legal Government Insurance Data 34 billion public records 1 million documents added every day 36,000 legal, business, news sources Linking 250M+ unique individuals 1B unique business contacts Analytics Real time analytics Scores to support customer workflow for remote transactions Scores around individual risk/ opportunity Computing 30M transactions/hr <500 millisecond avg search response time ~34 Terabytes in use Health Care Solutions for Commercial Payers 3

Data Aggregation Through our proprietary inking technology, profiles have been built on over 500 million Through proprietary inking technology, profiles have been built on over 500 million identities. Our databases have in excess of 45,000 data sources providing these updates as identities. These databases have in excess of 45,000 data sources providing these updates frequently as each data provider allows including daily, bi weekly, weekly and monthly that as frequently as each data provider allows including daily, bi weekly, weekly and monthly include, but is not limited to: that include, but is not limited to: Tri bureau Credit Header data Traditional landline and wireless Phone data Utility Files Concealed Weapons Permits Firearms & Explosive Licenses Corporation Filings Court Records Department of Corrections data Real Property Deed & Mortgages Property Professional Licenses Tax Liens & Judgments Planes & Pilots Hunting & Fishing Licenses UCC Filings Assessment DEA Controlled Vehicle Registrations SEC Filings Foreclosures Deaths Substance Licenses Marriages and Divorce Records Education Records Various Contributory Data Sources Watercraft 4

Utilizing Advanced Technology to Establish Identity and Risk PUBLIC RECORDS PROPRIETARY DATA ENTITY RESOLUTION NEWS ARTICLE LINK ANALYSIS UNSTRUCTURED RECORDS CLUSTERING ANALYSIS STRUCTURED RECORDS COMPLEX ANALYSIS Health Care Solutions for Commercial Payers

Identity Analytics Provide Valuable Insight for Health Care In real-time, data from tens of thousands of disparate sources can be brought together to form a multifaceted view that can enable health care payers to resolve, verify, and authenticate identity with 99.9% confidence

Create a Unique ID Advanced Linking Technology assigns a unique and persistent identifier to a person Dynamic updates as new public records are available Extremely Accurate - based on multiple public record and proprietary sources 7

The Role of Identity Analytics Key Challenge: Commercial, government and non-profit organizations are seeking to provide controlled, secure access to their products, services and information 8

Member/Beneficiary Applications Identify and verify individuals Ensure accuracy of identity information for program efficiency and risk mitigation Compliance with access to online enrollment by 2014 as mandated by the Affordable Care Act (ACA) Identity verification Knowledge-Based Authentication Individual Information Death Records Primary Address Outside of State Identity Risk Out-of-State Driver s License Property Value Greater than $500,000 Ownership of 2 or More Properties More than 2 Registered Motor Vehicles New Motor Vehicles Possible Employment Business Affiliations 9

Identity Management is the Framework Identity Management is traditionally defined as the security discipline that enables the right individual to: Access the right resource At the right time For the right reason Given the right circumstance Identity Management decisions impact a company s technology, customer service, marketing, sales and privacy policies. Going forward, Identity Management must also include new methods for determining if someone IS the right individual, and whether changes in identity background alter these decisions

ASSESSMENT ENROLLMENT Knowing Who s Participating { DISCOVER { VERIFY AUTHENTICATE EVALUATE ALERT Discover the identity Undertake data capture, identity resolution and identity enrichment. Tell us who you are. Verify the identity Establish that the identity exists. Does Bob Jones exist? Authenticate the identity Determine whether an individual or business owns the identity. Are you Bob Jones? Evaluate the identity Assess against legislation, regulations and rules to determine if an individual or business meets regulatory requirements. Alert to identity changes Receive notification when an individual or business is exhibiting high-risk behavior (continuous evaluation). Copyright 2012 LexisNexis. All rights reserved.

Identity Verification Solutions Help to confirm the validity of a customer s identity and address identity protection compliance requirements. Searches billions of reliable identity records in each verification search to give up-todate results Includes comprehensive built-in logic that considers changes of address, data input errors and name changes to reduce false positives and improve verification accuracy Uses identity validation to confirm the data is real, while the verification confirms the data pieces belong together to fit the applicant Summarizes results in an easy-to-interpret 0-50 index. The higher the result the more verified the data 12

Identity Verification Solutions Use configurable verification checks designed for specific business process to help determine if an identity exists. Searches billions of reliable identity records in each verification search to give up-to-date results Users can select from a series of checks to meet their business rules, including: Name/Driver s License Number match Address occupancy and ownership SSN verification Age verification (with Instant Age Verify) Users determine the number of verification checks needed for a passing outcome Seamlessly integrates into workflow Users can access transaction-level reporting export data into their internal reporting processes 13

Authentication Solutions Knowledge-Based Authentication quiz helps to establish the ownership of the identity in real-time, greatly reducing the likelihood of fraud during higher risk transactions. Dynamic knowledge-based authentication (KBA) question and answer process Increases identity assurance during account setup and other high risk activities Allows authentication efforts to be uniform across customer contact channels Minimizes the impact to customer experience with a less invasive and more customizable approach Uses questions that are easy for consumers to answer and difficult for fraudsters to analyze Multiple configuration options and numerous question types Flexible language offerings for bilingual call center representatives 14

Examples Florida Department of Children and Families Pre-Enrollment Identify Verification and Authentication Services for Beneficiaries Prior to starting the eligibility process, individuals are verified and authenticated into the online application system. Reduces improper enrollments, increases efficiencies, and allows FL the confidence to grow the use of the system. Over 90% of applications received through the FL ACCESS system are received online. Massachusetts Health Connector Identity and residency verification for health insurance applicants Prior to starting the enrollment process, individual identities are verified and addresses are confirmed as being in Massachusetts and NOT a business. Reduces improper access to the Health Benefit Exchange and prepares the Health Connector for expansion under the Affordable Care Act.

Examples Blue Cross Blue Shield Michigan Pre-Enrollment Identify Verification and Authentication Services for Beneficiaries CVS

Did you know Over 40 million Americans change their address each year Six billion pieces of mail are returned as undeliverable as addressed each year The cost to the United States Postal Services is approximately $2 billion a year On average, organizations will experience an undeliverable rate of 3-5%. For some the rate will be as high as 30% For managed care organizations, Medicaid re-enrollment can drop as much as 30% due to incorrect member contact information. How much is your data costing you? 17

Our customers experience 5-10% of individual contact information provided by commercial carriers is incorrect. 15-20% of individual contact information provided by employers is incorrect. 25-30% of individual contact information provided by Medicare is incorrect. 40-50% of contact information provided by Medicaid is incorrect. How much is your data costing you? 18

Reducing hard costs from undeliverable mail Undeliverable mail impacts many aspects of your organization, leading to reduced contact ratios, affecting collection efforts and generating higher administrative costs. On average, health plans and disease management organizations experience a 30% undeliverable rate on outgoing U.S. mail For managed care organizations, Medicaid re-enrollment can drop as much as 30% due to incorrect member contact information How much is your data costing you? 19

Member Data Hygiene Initial Verification of Member Contact Information Will provide monthly data feed with new MCO member contact information to ensure they have the most current information before they do initial outreach, improving member experience and contact success from the very beginning Will provide monthly data feed with existing member information on monthly basis to capture changes in contact information as quickly as possible with as little inconvenience to the member as possible Member Surveys Distributing member surveys to targeted populations to identify services that may have been received in locations other than a primary care provider s office Maximizing Personnel Resources Corrected phone information reduces the amount of time required to conduct phone blast campaigns, making this a more effective outreach program than it had been in the past HEDIS/Medicare Five Star Rating Program A recent analysis of a Medicaid Managed Care plan member file produced a 35% improvement in current address information 20

Examples United examples Amerigroup examples

Population Intelligence: Analytics for Improved Program Enrollment Our data, analytics and advanced linking technologies help customers maximize participation in disease management programs by providing information that enables them to target members with a tailored approach. Customer ROI TAILORING ANALYTICS Uncover relationships among members and identify the optimal contact method for each individual to maximize likelihood of enrollment. CONTACT INFO ENHANCEMENT Improve the quality of member data with up-to-date email addresses, cell phone numbers and mailing addresses. TARGETING ANALYTICS Identify which members will be most receptive to program outreach in order to focus attention and maximize resource effectiveness. Sophistication of Analytics BY INTRODUCING DATA THAT GOES BEYOND ENROLLMENT AND CLAIMS, CUSTOMERS CAN MAKE BETTER, MORE EFFICIENT DECISIONS. 22

What about identity management more broadly?

Taxpayer Dollars Are Under Attack

Challenges Facing Health Care Enterprises Disparate data is spread across separate physical locations Scale of data. BIG Data is getting BIGGER. Adding relationships exponentially expands the size of the BIG Data analytics challenge. Companies like LexisNexis have leveraged parallel-processing computing platforms and large scale graph analytics for more than a decade. 25

Graphic Analysis and Social Network Analytics Graph Analysis - Twitter uses Graph Analysis to help the site determine who s connected to whom in the Twittersphere. - Google uses Graph Analysis to power its PageRank feature. - LexisNexis uses Graph Analysis to resolve identities and establish relationships Social Network Analysis - Graph Analysis that specifically focuses on graphs built on social relationships. 26

Trends in Social Network Analytics Addition of External Data Mixes First Party data with Public and Third Party data sources Adds fidelity to existing entities Adds new linkages into the analysis Ads new entities into the analysis Exposes ring leaders and brokers that don t directly participate 27

Trends in Social Network Analytics Reliance on Created Data Transform straw into gold Process numerous discrete data points into high-value data LexisNexis LexID (example) Resolve numerous names, addresses, phones, and other info into a Person ID Better accuracy than other resolution techniques Resilient to name, address, and other info changes (i.e. stable over time) Improves detection, simplifies processing, makes results easier to understand Copyright 2012 LexisNexis. All rights reserved 28

LexisNexis Targets Fraud Using Large Scale Graph Analytics Powered by HPCC Systems, the LexisNexis massive parallel-processing open-source computing platform. Graph \ Network 3 Billion derived public data relationships between people merged with risk indicators. Graph Analytics examine up to 20 billion data points to create variables that allows for predictive analysis incorporating relationship context and associated risk. Targets fraud across all sectors including Health Care, Financial Services and Government. Copyright 2012 LexisNexis. All rights reserved 29

Case Study: Social Network Analysis for Fraud, Waste and Abuse in Medicaid High Value Assets GSA, EPLS 127 2 Beneficiaries Providers 3,900,000 348,981 12,848

Case Study: Social Network Analysis for Fraud, Waste and Abuse in Medicaid High-end Vehicles GSA EPLS Beneficiaries 3,900,000 127 12,848 2 Providers 348,981 Mr. X Interesting Indicators 2009 Acura RL White (base price $50K) Medicaid Beneficiary Exclusions & Sanctions 02/20/2006 DHS: Debarred / Excluded 09/14/2006 OPM: Debarred / Suspended Registered Provider Numerous Medical Business Ownerships (discussed below)

Case Study: Social Network Analysis for Fraud, Waste and Abuse in Medicaid Clusters of interesting asset variables in tight social networks are often associated with coordinated activities. 3 Billion Public Data Relationships Leverage SNA Intelligence Identifying the key actors and activities Example Interesting Vehicles (2010) Red Ferrari California ($192,000), (2009) Black GMC SLT Yukon ($ 44,750), (2010) Black GMC K1500 SLT Sierra ($ 41,775), (2011) Mercedes-Benz E350 ($ 494,00), (2009) Black Mercedes-Benz AMG SL63 ($135000) (2011) White Audi 5.2 QUATTRO R8 ($161000), (2011) White BMW M3 ($ 55400) (2010) Black Mercedes-Benz S600 ($149700), (2010) Mercedes-Benz 4 MATIC GL550 ($ 82850) (2010) White Mercedes-Benz AMG CL63 ($145200) Example Interesting Residences DI IRIS D 15 [CITY] $167,000.00 F, NEYSA M 60 [CITY] $499,000.00 G YENEY 23 [CITY] $670,000.00 G, EFRAIN 76 [CITY] $550,000.00 G, LAZARO 22 [CITY] $489,000.00 G, MARLA 43 [CITY] $800,000.00 (2009) Red Audi 4.2 QUATTRO R8 ($112500) 32 32

Linkages and Associations: Example 3 Numerous close associates also operating medical business Provider Cluster Beneficiary Cluster Business Associate 1 Garcia, C Medicaid Provider, R Alma, R 38 Barry, L 40 Cole, D 79 Daniel, L 42 Medicaid Provider, R 78 Franco, R 56 Jones, L 38 Diaz, C 80 Wright, A 12 Wright, S 81 Wright, E 72 Bono, M 50 Rodriguez, I 33 GARCIA, C 40 Borrero, I 53 Ayala, I 60 Tyke, E 72 Jezza, A 18 Medicaid Provider, R is on an Exclusion list and a Beneficiary Business Associate 1 is related to beneficiaries in the Medicaid Provider s beneficiary network Copyright 2012 LexisNexis. All rights reserved. 33

Multiple Businesses Single Address Name: A Plus Medicaid Services Address: Name: A Plus Medicaid Services, Inc. Address: Name: A Plus Medical Supplies Inc. Address: Name: A Plus Pharmacy Address: Name: AAA Diagnostic Center Address: Name: A to A Mortgage Address: Name: AA Pharmacy & Discount Address: Name: A to Z Pharmacy Address: Name: Little A Pharmacy Inc Address: Name: A Plus Diagnostic Corp Address: Copyright 2012 LexisNexis. All rights reserved. 34

Thank You! Clint Fuhrman National Dir, Government Healthcare LexisNexis Risk, Inc. 202-503-6639 clint.fuhrman@lexisnexis.com Linked In Group: LexisNexis Health Care Solutions Twitter: LexisHealthCare Blog: http://blogs.lexisnexis.com/healthcare 35

Bringing Big Data & Analytics Together - Providers Identity Analytics help provide insight into the risk associated with providers. Deceased Test Criteria Fraud Risk High Medicare Exclusion List (LEIE) GSA Exclusion List (EPLS) Felony conviction State of Licensure, status High High High Medium Known Associates Excluded In a recent analysis of a Medicaid provider file: Medium Over 1% were deceased 1.7% of providers were sanctioned or excluded.5% were registered sex offenders Incarcerated individuals were active providers Undisclosed associations to excluded providers were identified

Provider Risk Screening Make intelligent information connections beyond the obvious by drawing insights from both traditional and new sources of data. Personal/Corporate Information Other names, aliases, DBA s DOB SSN (actual and associated) Current and historical addresses Landline & wireless phone # s Death records (SSA Death Master File and other sources) National criminal background Bankruptcies, liens, judgments Family members Corporate officers & owners Known associates TIN & FEIN Licensure, Sanctions, Certifications, Etc. States of licensure; status Sanctions (with detail) HHS OIG exclusion list (LEIE) GSA exclusion list (EPLS) NPI DEA number Practice address Specialty certifications Educational background; residence Hospital affiliations Group practice associations Shared address, business association Provider Screening assists payers in verifying and monitoring health care provider licensing and credentials, and detecting and preventing fraudulent or criminal provider activity.

An Approach to Comprehensive Provider Management Program Integrity begins with knowing your providers Screen all current network providers Implement robust provider screening at credentialing Assign dynamic risk scores and track provider files between credentialing periods for pertinent activity; alerts generated for changes Extend screening standards to include out of network providers 38

Bringing Big Data & Analytics Together Beneficiaries Identity Analytics reduce beneficiary fraud and ensures accuracy of identity information for program efficiency and risk mitigation Test Criteria Fraud Risk Deceased Incarcerated Identity Fraud Risk Occupancy Outside State Real Property Value and Ownership Motor Vehicle Age and Ownership High Risk Address High High High High Medium Medium Medium In a recent analysis of a Medicaid beneficiary file: over 2% of beneficiaries had a primary address in another state 0.59% were deceased 2% of adults presented with severe identity fraud risk