Leveraging Big Data to Mitigate Health Care Fraud Risk



Similar documents
Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP Copyright 2015 Edward S.

Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

Advanced Data Analytics, the Fraudsters Worst Enemy

Using Technology to Automate Fraud Detection Within Key Business Process Areas

FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE

Deloitte Forensic Fraud Risk Management

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner

Diploma in Forensic Accounting (Level 4) Course Structure & Contents

Procurement Fraud Identification & Role of Data Mining

Internal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer

Office of the Inspector General

Sharon Kurek, CPA, CFE Director of Internal Audit

ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education

by: Scott Baranowski, CIA

KEYS TO AN EFFECTIVE DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA

Fraud Awareness Training

5 Important Controls to Mitigate Employee Fraud

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses

False Claims / Federal Deficit Reduction Act Notice Help Stop Healthcare Fraud, Waste and Abuse: Report to the Firelands Corporate Compliance Officer

THE ABC S OF DATA ANALYTICS

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

Fraud Prevention: The Prevention and Detection of Fraud Begins with You

Data Mining: Unlocking the Intelligence in Your Data. Marlon B. Williams, CPA, ACDA Partner, IT Advisory Services Weaver

Employee Embezzlement and Fraud. Defending Against Insider Threats

Medicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010

USC Office of Compliance

Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you

Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE

Using Data Analytics to Detect Fraud

Forensic Audit Building a World Class Program

Fraud Prevention and Detection in a Manufacturing Environment

Fraud Prevention Checklist for Small Businesses

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2012 GLOBAL FRAUD STUDY

Fraud Triangle Analytics Anti-Fraud Research and Methodologies

FRAUD RISK ASSESSMENT

Financial Transactions and Fraud Schemes

Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA

An Auditor s Guide to Data Analytics

Centre for Corporate Governance. Sample listing of fraud schemes

Steven Boyer Vice-President, Gallagher Bassett Services Inc.

Making Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit.

ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore

Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption

Developing and Implementing a Fraud Risk Assessment. Josh Shilts CPA/CFF, CFE

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

Leveraging Your ERP System to Enhance Internal Controls

FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM

Introducing SAP Fraud Management. Jérôme Pugnet

COMPLIANCE POLICY MANUAL

Understanding Health Reform s

Forensic Audit and Automated Oversight Federal Audit Executive Council September 24, 2009

Fraud, Waste and Abuse: Compliance Program. Section 4: National Provider Network Handbook

1/17/2013 FRAUD RISK MANAGEMENT PROGRAM SESSION OBJECTIVE AND OUTLINE

Fraud Awareness and Prevention Program Report

Financial Services Group

LGMA Qld Governance and Corporate Planning Village Forum

PREVENTING FRAUD, ABUSE, & WASTE: A Primer for Physical Therapists

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE

SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY

Payments Fraud Best Practices

Contents. xiii xv. Case Studies Preface

T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud

A Roadmap for New Physicians. Avoiding Medicare and Medicaid Fraud and Abuse

716 West Ave Austin, TX USA

To: All Vendors, Agents and Contractors of Hutchinson Regional Medical Center

Fraud Detection & Data Analytics

Fighting Fraud with Data Mining & Analysis

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP

C O N F I D E N T I A L A N D P R O P R I E T A R Y. Page 1 of 7 Title: FRAUD, WASTE, AND ABUSE POLICY

Integrating Data Analytics into Internal Audit

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments

ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada

How To Handle A Fraud At Psc

ANTI-FRAUD POLICY Adopted August 13, 2015

Continuous Auditing and Monitoring Leveraging Your Data for Compliance

UPDATED. Special Advisory Bulletin on the Effect of Exclusion from Participation in Federal Health Care Programs

GENERAL PAYROLL CONTROLS Dates in scope:

The Fraud Enforcement and Recovery Act and Healthcare Reform: Implications for Compliance Initiatives and Fraud Investigations

Fraud, Waste & Abuse. UPMC Health Plan Quality Audit, Fraud, Waste & Abuse Department

Transcription:

Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services

Introduction Health Care Is Victimized by Fraud Fraud by Industry Fraud Schemes in Health Care Industry of victim organizations in the 2014 Report to the Nations: 1. Banking 2. Government 3. Manufacturing 4. Health Care 5. Education The most common fraud schemes perpetrated in the health care industry in the 2014 Report to the Nations were: 1. Corruption 2. Billing 3. Expense reimbursements 4. Skimming 5. Payroll 6. Cash on Hand Source: 2014 ACFE Report to the Nations 2

Anti-Fraud Controls in Health Care Frequency & Effectiveness Frequency of Anti-Fraud Controls Effectiveness of Anti-Fraud Controls The 2014 Report to the Nations included questions regarding the presence of 18 possible anti-fraud controls in victim organizations. Some of the controls include external audits of financial statements, internal audit departments, hotlines & others. Proactive data monitoring/analysis ranked 14th most common, with 34.8 percent of victim organizations having this control in place. To determine effectiveness, the study analyzed the impact of the anti-fraud controls on median loss & duration. Organizations not using proactive data monitoring/analysis saw a median loss of $181,000, while those with the control in place saw a median loss of $73,000. The overall reduction in median loss was 59.7 percent, higher than any other control. With regard to duration, organizations that did not have proactive data monitoring/analysis saw a median duration of 24 months, while those with the control saw a median duration of 12 months. The overall reduction was 50 percent, matching five other controls for the most effective. Source: 2014 ACFE Report to the Nations 3

proactive data monitoring and analysis appears to be the most effective at limiting the duration and cost of fraud schemes Source: 2014 ACFE Report to the Nations

Purchasing Cards Leveraging bank data to identify fraud, waste & abuse.

Background How Fraud Is Committed In addition to fraud, purchasing cards are an area where waste & abuse are common. In many cases it is possible to analyze purchasing card activity to identify potential areas for cost savings, e.g., through the use of purchasing accounts at high volume vendors. Common purchasing card fraud schemes include: Using a corporate credit card for personal purchases Using reward card points for personal benefit Paying corporate expenses with the card when expense reimbursements has also been requested section 01 6

Insights Procedures to Consider While purchasing cards are considered by many to be high risk, the data available for analysis is some of the best. Also, many organizations have strictly developed policies regarding the use of purchasing cards. Detecting fraud, improper use, waste & abuse begins with procedures designed to identify violations of organizational policy. Other common procedures include: Identify transactions outside normal business hours Identify transactions on a holiday, including Black Friday & online Cyber Monday purchases Analysis of transactions with high-risk merchants Identify use of a purchasing card while on vacation or leave Identify transactions indicative of gift card purchases Analysis of Level III detail for unusual purchased items To take your purchasing card analysis to the next level, download leave data from payroll & compare vacation dates to transaction dates to identify employees using their cards on vacation. section 01 7

Accounts Payable Using vendor & transaction based data to address misappropriation & corruption.

Background How Fraud Is Committed Many of the most common fraud schemes in accounts payable start with manipulation of the vendor file. For this reason, control over vendor setup & changes to the vendor master file is an important control. Other attributes of schemes in accounts payable relate to payment information. Common schemes include: Fictitious vendors Conflicts of interest and/or unknown related parties Payments issued outside normal business hours Theft &/or manipulation of payments Invoices for fictitious goods or services Patient refund manipulation section 02 9

Insights Procedures to Consider Vendor Specific Procedures Many investigations in accounts payable begin with an analysis of the vendor master file. This file is important, because it contains the attributes about a vendor used to verify existence. Common procedures include: Employee/vendor matching Geographic proximity analysis Identifying vendors with a mailbox service or PO box address Analysis of vendor attribute capture Assessment of dormant and/or inactive vendors Identification of potential duplicate vendors Transaction Specific Procedures In addition to analysis of vendor attributes, the transactions used to issue payments to vendors are also important. These transactions contain key information regarding trends & patterns of activity. Some of the more common procedures used include: Benford s Law analysis Trend analysis of vendor activity Analysis of payment issuance patterns Identification of potential duplicate invoices Assess of payment sequences for anomalies section 02 10

Payroll Analyzing data to identify potential fraud & gain operational insights on personnel utilization.

Background How Fraud Is Committed Payroll schemes can take many different forms. Manipulation of the employee master file, deductions/withdrawal records, pay rates, time clock information or other hours based information are all ways in which payroll schemes can be perpetrated. Common payroll schemes include: Ghost employees Falsification of hours Tax fraud Earnings manipulation Time-clock manipulation section 03 12

Insights Procedures to Consider Employee Master File Procedures The first line of defense against payroll fraud schemes is control over the employee master file. Procedures designed to identify potential ghost employees include: Identification of potential duplicate employees Analysis of shared employee attributes, e.g., bank accounts, addresses, etc. Identification of employees with mailbox service addresses Analysis of employees without voluntary deductions or tax withholdings on file Payroll Detail File Procedures To identify falsification of hours, earnings manipulation & pay rate manipulation schemes, it is key to analyze payroll transactions. These transactions can also be used to identify potential ghost employees. Procedures include: Trend analysis of pay rates over time to identify unusual fluctuations Analysis of excessive hours by type Identification of payroll transactions issued off-cycle Analysis of hours compared to organizational policies section 03 13

Refunds of Overpayments Leveraging patient accounting data to address compliance with everchanging & complex regulations.

Background Key Regulations for Refunds Liability under the False Claims Act ( FCA ) 1 Section 3729(a)(1)(G) of the statute defines a reverse false claim. Essentially, this section provides liability where one acts improperly to avoid having to pay money to the government. Liability under the Fraud Enforcement Recovery Act of 2009 ( FERA ) FERA expanded the liability provided by FCA by eliminating the requirement of using a false statement or record to avoid payment to the government. Impact of Patient Protection and Affordable Care Act of 2010 ( PPACA ) 3 Combined with the application of FCA & FERA provisions, PPACA results in a requirement that health care organizations return overpayments to the government within 60 days of overpayment identification. The challenge in this regulation is the lack of definition for the term identified. While a definition has not been provided by statute or the courts, organizations need to be aware of this requirement & diligent in their return of overpayments. 1 http://www.justice.gov/civil/docs_forms/c-frauds_fca_primer.pdf 2 http://www.gpo.gov/fdsys/pkg/plaw-111publ21/pdf/plaw-111publ21.pdf section 04 3 Journal of Health Care Compliance, Volume 13, Number 4, July-August 2011, pages 39-41, Stark Provisions, McClain E. Bryant 15

Insights Procedures to Consider Data Elements to Obtain In analyzing activity for compliance with refund requirements stipulated by FCA, FERA & PPACA, health care organizations should incorporate all relevant data elements. These include: Patient visit information, including applicable payer information Account charge level detail, including date of service & charge post dates Account adjustment detail, including post date & related payer information Account payment detail, including date of payment, post date & resulting account balance Patient account billing & collection notes Utilizing all available data fields will provide the most comprehensive picture of the account activity & timing. Analysis to Perform Using the available data sets, organizations have the ability to analyze accounts where refunds were issued & those where refunds may need to be issued. Both account types are important for compliance with all applicable regulations. Some of the key time metrics include: Number of days from initial credit balance to refund Number of days from refund due note posting to refund Number of days an account has had a credit balance Number of days from payment date to payment posting date Number of days since last payment on account Using these metrics, organizations will be in a better position to assess compliance with regulations governing overpayments. section 04 16

Exclusion Testing Using both internal & external data sources to learn more about those with which your organization is doing business.

Background How Violations Occur Organizations receiving federal funds are subject to restrictions regarding the individual & entities with which they do business. Depending on the type of federal funding, the type of exclusion & applicable excluding entity may differ. Three federal lists containing individuals & entities excluded from federal funds include: List of Excluded Individuals & Entities (LEIE) Excluded Parties List System (EPLS) Specifically Designated Nationals list (SDN) In addition to the federal lists, many state funded programs have exclusion lists for their specific programs. Check the website of any government funding sources for potential requirements to comply with these restrictions. section 05 18

Insights Procedures to Assess Compliance At the federal level, there are three main sources of information related to excluded entities & individuals. These are: Office of Inspector General - LEIE (http://oig.hhs.gov/exclusions/index.asp) System for Award Management - EPLS (https://www.sam.gov/portal/sam/#1) U.S. Department of the Treasury - SDN (http://www.treasury.gov/resource-center/sanctions/sdn- List/Pages/default.aspx) Each of these sources of exclusion information contain two options: 1. Searchable lists 2. Downloadable lists Using the downloadable list option, organizations have the ability to compare their employees, vendors, providers & other entities/individuals with which they do business to the list of exclusions. This comparison should use available attributes such as name, address, national provider identifier & others. If a match is found, review the appropriate website to determine next steps. section 05 19

Resources Documents, websites & links to provide you with what you need to start getting the most out of your data.

Information Resources to Consider IIA Global Technology Audit Guides Continuous Auditing Fraud Prevention and Detection in an Automated World Data Analysis Company Sites http://www.acl.com http://www.audimation.com http://www.tableausoftware.com ISACA White Paper Data Analytics A Practical Approach Health Care Specific http://www.healthdata.gov https://www.data.gov/health section 06 21

Speaker Bio Jeremy Clopton, CPA, CFE, ACDA Jeremy is a senior managing consultant in BKD s Forensics & Valuation Services division and specializes in providing fraud investigation and forensic data mining services. Jeremy has experience in using ACL, IDEA and Tableau software for forensic data mining and continuous auditing. His forensic data mining experiences include all major industries in both investigation and prevention projects, and has designed and implemented continuous auditing solutions for organizations in a variety of industries, including Fortune 500 companies and health care institutions. He was a speaker at the 2013 ACL Connections Global User Conference and currently contributes to Fraud Magazine s Fraud EDge column on the intersection of data analytics and digital forensics. Contact Information Phone: 417.865.8701 Email: jclopton@bkd.com Social Media Blog: http://bkdforensics.com Twitter: @j313 LinkedIn: http://www.linkedin.com/in/jeremyclopton/ section 06 22