Healthcare Insights

WEBINAR: ACA Look-Back Periods & Reporting for Employers

Health Care Reform ACA

The final ACA regulations are here. Are you prepared? For most large employers, the final ACA regulations provide more clarity around determining eligibility for different types of employees such as variable-hour, temporary, part-time, and seasonal workers. It also provides guidelines around IRS reporting under sections 6055 and 6056. While more guidance has been issued around [Read More...]

ACA IRS Reporting: 6055 & 6056 Final Regulations Released

shutterstock_143536342

The U.S. Department of the Treasury and the Internal Revenue Service (IRS) released final rules to implement the information reporting provisions for insurers and certain employers under the ACA that take effect in 2015.  The ACA IRS reporting is intended to promote transparency with respect to health plan coverage and costs. It will also provide [Read More...]

ACA and Look-Back Periods: Why, Who, What, How?

shutterstock_54498

The final ACA regulations are here. Are you prepared? The final ACA regulations have been issued, but what does this mean for large employers? It means more clarity around determining eligibility for different types of employees such as variable-hour, temporary, part-time, and seasonal workers. While more guidance has been provided around which hours count towards [Read More...]

Another Day, Another ACA Delay…Or Is It?

ACA Delay

The Department of the Treasury and the Internal Revenue Service announced yesterday that the Affordable Care Act (ACA) Employer Mandate will be delayed once again… but not so fast, these updates only apply to about 4% of U.S. employers. Before assuming your business can wait yet another year to comply with the ACA Employer Mandate, [Read More...]

The Most Important Countdown to an Employer’s Bottom Line: Are you prepared for ACA?

ACA Compliance

The  clock is ticking on the amount of time employers have to figure out their ACA game plan. Many employers gave a sigh of relief as they thought the pressure to deal with the complicated regulations surrounding their workforce strategy was lifted from their shoulders when the Employer Mandate was delayed by one year, now [Read More...]

Looking forward to seeing you at HiMSS14!

shutterstock_71177302

Healthcare fraud is estimated at $60-70 billion a year and medical identity theft and subsequent fraud rose by 20 percent in 2013. Most cybersecurity experts agree that secure identity proofing of patients and care givers is an essential first step towards protecting the security and privacy of sensitive data and mitigating fraud. As the leader [Read More...]

Patient Identification and Record Matching – WEDI 2013 Report

shutterstock_73881016

The Workgroup for Electronic Data Interchange (WEDI) just released its 2013 Report documenting a new road map for the industry to get “the right information to the right place at the right time.”  The report addresses accelerating innovation with new technologies and solving the challenges of achieving greater efficiencies at a lower cost. As such, [Read More...]

Data for KBA Questions Matters

laptop2

News about data breaches seems to be never-ending over the past few years. One of the latest is the major customer identities hack of Adobe Software and news that 38 million customer accounts were exposed.  Along with other high profile breaches, the exposure of so much data that can be used to impersonate someone invites [Read More...]

Third-Factor Authentication Cannot be Lost, Stolen, or Forgotten

shutterstock_39789646

Do you have a list of passwords written down and hiding in a desk drawer? Have you ever lost your cell phone or the hard security token that is usually dropped in the bottom of your briefcase?  Have you struggled to answer the “challenge questions” presented at login? First-factor and second-factor secure authentication methods have [Read More...]

Preventing Real-Time Fraud – Combining Device Information and Risk-Based Authentication

dreamstime_1936549-1

Recently, after purchasing a new iPad, I decided to configure it to access my mobile banking account.  After loading the mobile banking application and logging in using my standard credentials, I realized no further authentication was required. So why didn’t I get challenged when I used the new device?  I am set up to receive [Read More...]