Identity and Fraud Focus

Protecting Data Privacy

marketing efficiency

Theft of consumer financial and identity information is rising, and the subsequent use of those stolen identities to attempt breaches of other sites compounds the problem. So far this year there have been more than 100 data breaches caused by hacking or similar reasons according to the Privacy Rights Clearinghouse, with more than 200 breaches from all reasons. [Read More...]

HSPD-12 – Ten Years On

white-house

Homeland Security Presidential Directive 12 (HSPD-12), signed by President Bush on August 27, 2004, was originally enacted to address the wide variety and differing security levels of identification credentials used to access secure facilities. The directive established standards for verifying an individual’s identity and issuing a tamper-proof credential that could be rapidly authenticated electronically. The [Read More...]

MESC: Streamlining the Applicant Eligibility Experience with Program Integrity

Health Care Reform ACA

Rich Huffman, Sr Director – Identity Product Management, recently presented at MESC  on how to improve program integrity by understanding applicant eligibility early in the process. Public health and welfare outcomes are enhanced when members smoothly access the correct programs. States, exchanges, and human services programs need to balance the applicant experience with the need for integrity [Read More...]

Identity Proofing Essentials for Effective Government Operations

socialServices_940x255

Who are you and how can you prove it? Seems like an easy question, yet in the digital environments where we work and live, this is no longer such a straightforward matter. Each individual is identified not only by a name, authoritative source (such as a Social Security Number, Passport, or Driver’s License), address, phone number, [Read More...]

Detecting Fraud and Abuse in Healthcare

docs-smiling

Dr. Michael Nelson, Equifax VP of Healthcare Strategy and Business Development, recently participated at the AHIMA CDI Summit in a panel discussion on “Leveraging Data and Analytics to Detect Fraud and Abuse in Healthcare.”  The panel was moderated by Jennifer Covich Bordenick, CEO for the eHealth Initiative. In a white paper published last year, the eHealth Initiative stated: [Read More...]

Sharing Cyber Threat Info to Improve Security

Cyber-security Sharing Bill

Last month the Senate Intelligence Committee approved a bill that would protect firms from any legal liability for sharing cyber threats with the government. This bill would set up a web portal in the Department of Homeland Security where private firms can confidentially share threat information without legal liability. The counterbalance to this sharing of information [Read More...]

Lifecycle Managment Part 1: Attracting the Underbanked Sector

Local and national banks can use data to acquire customers.

More than ever before, banks are saving while also driving revenue growth by properly utilizing big data in their customer lifecycle management.

Remote Access — Do You Know Who Is In Your Data?

remote user

Just over 80 percent of HR managers in a recent survey gave their agencies a grade of B or C for progress in meeting the Telework Enhancement Act’s goals of using telework to achieve greater flexibility in workforce management Letting workers access sensitive systems and data from off-site locations and, potentially, using uncontrolled devices raises a [Read More...]

Protecting Employee Data During “Verification Season”

Employment Verification Seasons

A current TV ad for home security systems uses the phrase “vacation season is break-in season,” reminding homeowners of the increase in burglaries that occur when families embark on summer vacations.  In the world of information security, data thieves don’t necessarily have a season, but they can capitalize on lax process security during peak points [Read More...]