THE PROBLEM Identity theft occurs when someone’s Personal Identifying Information (Social Security number, date of birth, driver’s license information,

Slides:



Advertisements
Similar presentations
By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.
Advertisements

1 Identity Theft Program Procedures Viewing RED FLAGS in the MEDITECH System.
Employee Self Service August 2010 InSITE Self Service Employee Self Service Presentation This presentation is approximately 15 minutes in length. This.
NCPTS End User Training Enforced Collections August 26-27, 2013.
Identity Theft Presented by Christina Williams and Lazaro Juarez Orange County’s Credit Union.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Office of Personnel Management (OPM) Data Breach A briefing for use by DON commanders and supervisory staff
Travel Advance and Expense Reimbursement Forms
Department of Management Services People First Working together to put People First! People First How to Verify Your People First Personal and Work Information.
G1 © Family Economics & Financial Education – Revised November 2004 – Paychecks and Taxes Unit – Understanding Your Paycheck and Tax Forms Funded.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Louisiana UI Integrity Task Force October 24, 2011.
Major Case Unit John Dormin Michelle Martone Executive Director Associate Investigator Office of Special investigations Office of Special Investigations.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Chapter 9-Section 1 Resolving Credit Problems. Disputing Charges—Credit Card Statement  Disputing Charges—the process of informing a credit card company.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Authentication Training Guide 1 The Red Flag Ruling requires automotive dealerships to detect red flags that are applicable to their operation. After.
The Best Identity Protection
3a. Create Login ID for First Time User How to Create an Online Application – Student Quick Reference Guide This quick reference guide contains step by.
State Presentation: OCTOBER 24,2011. Overpayments by Cause* 2010 Review Description$ AmountPercentage of Total Unreported Earnings $ 27,104, %
NATIONAL DIRECTORY OF NEW HIRES Office of Child Support Enforcement Administration for Children and Families Department of Health and Human Services.
Amber Johnson U.S. Department of Education WVASFAA Fall 2015 Conference October 29, 2015 FSA ID: The FSA PIN Replacement.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
2 Table of Contents  Personal Identification Information  Trade Lines or Payment Records  Public Record and Collection Items  Inquiries  Consumer.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
THIS TRAINING IS REQUIRED IN ORDER TO OBTAIN SECURITY TO INITIATE HIRING PACKETS FOR NEW EMPLOYEES. Hire Xpress User’s Training NAU’s Automated Hiring.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
ABC-MAP Act 191 of 2014 September 16, 2016 Pennsylvania’s Prescription Drug Monitoring Program (PA PDMP)
IDENTITY THEFT.
Pub 4491 Pub 4012 TaxSlayer Manual
How Can NRCS Clients Use the Conservation Client Gateway
KARES Demonstration.
Primo Payroll 6 Quick Learning Steps
Customer Log-In One-Stop Service Tracking (OSST) System
Gift Card Risk Mitigation – Presentation A
How to Protect Yourself from ID Theft and Social Engineering
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Robert Leonard Information Security Manager Hamilton
Consolidated Inquiry.
2017 Features Released Marsha Sapino AAP, BSACS
Internet Ordering Change.
Protecting Yourself from Fraud including Identity Theft
Identity Theft Prevention Program Training
Card Data Fraud.
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
Protecting Your Credit Identity
Hands-On: FSA Assessments For Foreign Schools
Protecting Yourself from Fraud including Identity Theft
Is someone pretending to be you?
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Identity Theft and Credit Safety
Presentation transcript:

Fraud Initiative Rating and Rules Engine Reemployment Assistance Program October 2016

THE PROBLEM Identity theft occurs when someone’s Personal Identifying Information (Social Security number, date of birth, driver’s license information, wage information, medical information, etc.) is accessed/used without his or her knowledge/permission, usually for financial gain. Personal Identifying Information (Social Security number, date of birth, and driver’s license information, etc.) is being secured through hacking, theft, data breaches, or by other means such as the dark web. 2

ID Theft is at crisis levels PREVALENCE ID Theft is at crisis levels U.S. Population: 320,000,000 Records Breached since 2013: 3,600,000,000 A sampling of populations hit by identity theft in recent years: Court Ventures: 200,000,000 Target: 70,000,000 EBay: 145,000,000 Home Depot: 56,000,000 Heartland: 130,000,000 U.S. OPM: 21,500,000 TJ Maxx: 94,000,000 Experian: 15,000,000 AOL: 92,000,000 Excellus BCBS: 10,000,000 Anthem: 80,000,000 Virginia DOH: 8,200,000 Sony: 77,000,000 Georgia SOS: 6,000,000 JP Morgan: 76,000,000 Scottrade: 4,600,000 3

Why so much fraud? Ease of stealing IDs (information is everywhere and unprotected) Automation and use of internet as the primary benefit delivery system Mandates for fast payment vs. fraud detection A safe and profitable crime One claim in all 52 UI programs = $21,000 per week Cheap and accessible PII data for sale (Dark Web). 4

FLORIDA UI EXAMPLE 2013: Identified about 9,600 fraudulent claims through complaints, etc. 2014: deployed in-house data analytics program and found nearly 70,000 fraudulent claims From 2013-2016: identified over 122,000 fraudulent claims The potential value of fraudulent claims = $470 million Note: UI is small in scope (60K to 90k unique active claimants at any given time during 2015) compared to other benefits (3.2 Million SNAP beneficiaries) 5

OUR SUCCESS The State Excellence Award for Leadership (SEAL) Award in 2015 Estimated cost savings was almost $143 million in 2015 At the current rate, the program is on track to prevent over $500 million in fraudulent claims from being paid over 5 years Millions in cost avoidance from downstream business impacts of fraudulent claims Provided specific data sets to U.S. Department of Labor (OIG) and law enforcement that aids in prosecution 6

How FIRRE works with our system 7

Case Management System FIRRE Case Management System How do employees retrieve their work assignments?

Individual claimant details for selected claim Investigator’s IC queue Verifier’s IC queue All employees work out of the FIRRE queues (IC, CC, MT) on the “cases” page. Claims in the FIRRE queues have tripped one of FIRRE’s business rules. Investigators determine if a claim is to be locked, cleared, or verified. ID theft claims which trip high value rules are auto locked by the system or locked after investigator review. Legitimate claims flagged by lower value rules are cleared by investigators. Suspicious claims are sent to their respective verification que. A verifier will attempt to contact the putative claimant.

FIRRE Investigation Tools Additional information to make a decision

‘FIRRE Report’ section displays FIRRE rules “tripped.” Claim Details Screen “Claim Stats” section displays the number of times IP, email, and bank have been entered into the system over time. ‘FIRRE Report’ section displays FIRRE rules “tripped.” Ability to search within individual claim Additional claimant details Ability to flag claim for verification, investigation, lock/clear. Employment Details

Additional Categories (e.g. Address, Employer, etc.–50+) The Search Screen provides investigators the ability to search by specific criteria. Additional Categories (e.g. Address, Employer, etc.–50+) Ability to sort/facet into classification(s) for all categories

Advanced search allows investigators to search by any of the fields below

FIRRE IP Details Using IP information for an investigation

Neustar Provides data/scores relating to both their confidence in the information provided, as well as the likelihood that the IP in question is a real user, or a bot. Additionally, Neustar indicates when it detects a proxy being used.

FIRRE displays historical claims data relating to the IP, as well as a list of all claims associated with the IP in question.

Selecting a claim and clicking “Map View” displays google map results for the IP, as well as the claimant’s residential address.

Claimant’s Residential/Mailing Address IP address used to file the claim The Heat Map function displays the areas with the highest volume of locked claims within FIRRE.

Heat Map Overlay displays the areas with the highest volume of locked claims within FIRRE

QUESTIONS

CONTACT Thank You. If you have questions or comments about this presentation or schedule a demonstration; please contact our office. Reemployment Assistance Program Magnus Hines Main Line: 850-599-0301 Email: Mangus.Hines@deo.myflorida.com