How insurance can protect allied health professionals from physicians and nurse practitioners to dietitians and occupational therapists.
https://alliedhealth.insureon.com/resources/publications/business-health
Data Protection & Privacy in Malaysian Total Hospital Information SystemQuotient Consulting
shares the recent presentation at the University of Oxford Centre for Health, Law and Emerging Technologies (HeLEX) on 10th August 2011. He was the academic visitor during the summer of 2011 (1st August 2011 - 19th August 2011). The works and research is under progress.
How insurance can protect allied health professionals from physicians and nurse practitioners to dietitians and occupational therapists.
https://alliedhealth.insureon.com/resources/publications/business-health
Data Protection & Privacy in Malaysian Total Hospital Information SystemQuotient Consulting
shares the recent presentation at the University of Oxford Centre for Health, Law and Emerging Technologies (HeLEX) on 10th August 2011. He was the academic visitor during the summer of 2011 (1st August 2011 - 19th August 2011). The works and research is under progress.
[Medi]Caring About Delayed Retirement: A Closer Look at Medicare Strategybenefitexpress
With questions about millennials dominating our conversations about benefits, it’s easy to forget that the work force is growing from both ends. Baby boomers are delaying retirement while millennials (and even Gen Z) start their careers. As boomers become Medicare eligible, many remain on their employer’s coverage, whether or not that’s the best choice for them. Get the tools you need to:
- Navigate paying claims
- Understand how Medicare interacts with COBRA and other healthcare
- Lead eligible employees through their options
- Craft a compliant notification strategy
All information, data, and material contained, presented, or provided on is for educational purposes only.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners.
It is not to be construed or intended as providing legal advice.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only. 17 U.S. Code § 107 - Limitations on exclusive rights: Fair use Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
Types of Health Insurance in India - There are three types of health insurance in India. Health Insurance plays a very important role to every ones life. Get to know more about health insurance
The benefits of revenue cycle and compliance collaborationBESLER
This presentation highlights the importance of the working relationship between hospital Revenue Cycle and Compliance teams. This complimentary partnership can become seamless by utilizing the data analytics obtained from 835 and 837 data sets, Return to Provider (RTP), CERTs, Readmissions, ZPICs, HACs, RACs and Transfer DRGs. The combination of this data can assist in quickly identifying and resolving issues prior to provider submission, reducing days in AR and improving cash in the door.
CPA experts from the PICPA share information about important health insurance deadlines for 2016, understanding health care spending account choices, managing health insurance after job loss, changing eligibility requirements that may impact small businesses, and more.
HIPAA Lockdown: One-Hour Guide to PHI Best Practicebenefitexpress
If your business provides health benefits, you handle Protected Health Information. Last year, the HHS stepped up its HIPAA privacy audits, expanding the scope beyond health care providers to any business that handles PHI – that means you.
Audits aren’t slowing down, so get the one-hour guide to:
- Proper handling of protected information
- Permitted disclosures of PHI
- Current EDI standards and compliance strategies
- Best practices before and during a HIPAA audit
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
To do effective data governance, analysts should preview the amount of data their organization is collecting and consider if it is all necessary information to run the business or just “nice to have” data. Today companies are collecting a variety of Personally identifiable information (PII), combining it with location information, and using it to both personalize their own services and to sell to advertisers for behavioral marketing. Data brokers are tracking cell phone applications and insurance companies are installing devices to monitor driving habits. At the same time, however, hackers are embedding malicious software in company computers, opening a virtual door for criminals to rifle through an organization’s valuable personal and financial information.
This presentation explores:
•What company data should be tagged as “sensitive” data?
•Who within the company has access to personal data?
•Is the company breaking any privacy laws by storing PII data?
•Is the data secure from both internal and external hackers?
•What happens if there is an external data breech?
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
The Data Protection Act 2019, was enacted on November 8th, 2019, ushering a new era of accountability and responsibility with regard to processing of personal data and information. Naturally, there has been a resurrection of the chatter around data protection in increasingly data-driven social and economic settings. The question on everyone’s mind being what does this mean for me?
[Medi]Caring About Delayed Retirement: A Closer Look at Medicare Strategybenefitexpress
With questions about millennials dominating our conversations about benefits, it’s easy to forget that the work force is growing from both ends. Baby boomers are delaying retirement while millennials (and even Gen Z) start their careers. As boomers become Medicare eligible, many remain on their employer’s coverage, whether or not that’s the best choice for them. Get the tools you need to:
- Navigate paying claims
- Understand how Medicare interacts with COBRA and other healthcare
- Lead eligible employees through their options
- Craft a compliant notification strategy
All information, data, and material contained, presented, or provided on is for educational purposes only.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners.
It is not to be construed or intended as providing legal advice.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only. 17 U.S. Code § 107 - Limitations on exclusive rights: Fair use Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
Types of Health Insurance in India - There are three types of health insurance in India. Health Insurance plays a very important role to every ones life. Get to know more about health insurance
The benefits of revenue cycle and compliance collaborationBESLER
This presentation highlights the importance of the working relationship between hospital Revenue Cycle and Compliance teams. This complimentary partnership can become seamless by utilizing the data analytics obtained from 835 and 837 data sets, Return to Provider (RTP), CERTs, Readmissions, ZPICs, HACs, RACs and Transfer DRGs. The combination of this data can assist in quickly identifying and resolving issues prior to provider submission, reducing days in AR and improving cash in the door.
CPA experts from the PICPA share information about important health insurance deadlines for 2016, understanding health care spending account choices, managing health insurance after job loss, changing eligibility requirements that may impact small businesses, and more.
HIPAA Lockdown: One-Hour Guide to PHI Best Practicebenefitexpress
If your business provides health benefits, you handle Protected Health Information. Last year, the HHS stepped up its HIPAA privacy audits, expanding the scope beyond health care providers to any business that handles PHI – that means you.
Audits aren’t slowing down, so get the one-hour guide to:
- Proper handling of protected information
- Permitted disclosures of PHI
- Current EDI standards and compliance strategies
- Best practices before and during a HIPAA audit
DAMA Webinar: The Data Governance of Personal (PII) DataDATAVERSITY
To do effective data governance, analysts should preview the amount of data their organization is collecting and consider if it is all necessary information to run the business or just “nice to have” data. Today companies are collecting a variety of Personally identifiable information (PII), combining it with location information, and using it to both personalize their own services and to sell to advertisers for behavioral marketing. Data brokers are tracking cell phone applications and insurance companies are installing devices to monitor driving habits. At the same time, however, hackers are embedding malicious software in company computers, opening a virtual door for criminals to rifle through an organization’s valuable personal and financial information.
This presentation explores:
•What company data should be tagged as “sensitive” data?
•Who within the company has access to personal data?
•Is the company breaking any privacy laws by storing PII data?
•Is the data secure from both internal and external hackers?
•What happens if there is an external data breech?
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
The Data Protection Act 2019, was enacted on November 8th, 2019, ushering a new era of accountability and responsibility with regard to processing of personal data and information. Naturally, there has been a resurrection of the chatter around data protection in increasingly data-driven social and economic settings. The question on everyone’s mind being what does this mean for me?
When it comes to simplifying the medical credentialing process and optimizing relationships with insurance networks, healthcare providers can benefit greatly from the services of a trusted and experienced credentialing service provider like Instapay Healthcare Services.
GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Direct...Harrison Clark Rickerbys
Slideshow from GDPR Breakfast Briefing - For Business Owners, HR Directors, Marketing Directors, IT Directors & Ops Directors, on 7th March 2018 at Hilton Puckrup Hall
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Round table discussion of vector databases, unstructured data, ai, big data, real-time, robots and Milvus.
A lively discussion with NJ Gen AI Meetup Lead, Prasad and Procure.FYI's Co-Found
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfGetInData
Recently we have observed the rise of open-source Large Language Models (LLMs) that are community-driven or developed by the AI market leaders, such as Meta (Llama3), Databricks (DBRX) and Snowflake (Arctic). On the other hand, there is a growth in interest in specialized, carefully fine-tuned yet relatively small models that can efficiently assist programmers in day-to-day tasks. Finally, Retrieval-Augmented Generation (RAG) architectures have gained a lot of traction as the preferred approach for LLMs context and prompt augmentation for building conversational SQL data copilots, code copilots and chatbots.
In this presentation, we will show how we built upon these three concepts a robust Data Copilot that can help to democratize access to company data assets and boost performance of everyone working with data platforms.
Why do we need yet another (open-source ) Copilot?
How can we build one?
Architecture and evaluation
The Building Blocks of QuestDB, a Time Series Databasejavier ramirez
Talk Delivered at Valencia Codes Meetup 2024-06.
Traditionally, databases have treated timestamps just as another data type. However, when performing real-time analytics, timestamps should be first class citizens and we need rich time semantics to get the most out of our data. We also need to deal with ever growing datasets while keeping performant, which is as fun as it sounds.
It is no wonder time-series databases are now more popular than ever before. Join me in this session to learn about the internal architecture and building blocks of QuestDB, an open source time-series database designed for speed. We will also review a history of some of the changes we have gone over the past two years to deal with late and unordered data, non-blocking writes, read-replicas, or faster batch ingestion.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Learn SQL from basic queries to Advance queriesmanishkhaire30
Dive into the world of data analysis with our comprehensive guide on mastering SQL! This presentation offers a practical approach to learning SQL, focusing on real-world applications and hands-on practice. Whether you're a beginner or looking to sharpen your skills, this guide provides the tools you need to extract, analyze, and interpret data effectively.
Key Highlights:
Foundations of SQL: Understand the basics of SQL, including data retrieval, filtering, and aggregation.
Advanced Queries: Learn to craft complex queries to uncover deep insights from your data.
Data Trends and Patterns: Discover how to identify and interpret trends and patterns in your datasets.
Practical Examples: Follow step-by-step examples to apply SQL techniques in real-world scenarios.
Actionable Insights: Gain the skills to derive actionable insights that drive informed decision-making.
Join us on this journey to enhance your data analysis capabilities and unlock the full potential of SQL. Perfect for data enthusiasts, analysts, and anyone eager to harness the power of data!
#DataAnalysis #SQL #LearningSQL #DataInsights #DataScience #Analytics
【社内勉強会資料_Octo: An Open-Source Generalist Robot Policy】
Data Ethics: Legal and ethical obligations to Insurance company
1. THE LEGAL AND ETHICAL
OBLIGATIONS OF LIFE
INSURANCE COMPANIES
K.Bhargav
Student at University of Hyderabad
2. Insurance
• An entity which provides insurance is known as an
Insurer or Undertaker
• A person or entity who buys insurance is known as
an insured or as a policyholder
Insurance provides protection
against a predictable event
that arises unexpectedly. Those
who are likely to suffer from
such loss buy insurance by
paying premiums, which are
used to pay losses that may
arise.
3. Types of Insurance
• Whole Life Insurance
• Endowment Policy
• Money back Policy
• Unit Linked Insurance
scheme
• Child Plan
• Pension Plan
Life Insurance
• Travel Insurance
• Health Insurance
• Property Insurance
• Auto Insurance
General Insurance
4. General Insurance
A general insurance is a contract that offers
financial compensation on any loss other than
death. It insures everything apart from life.
Travel Insurance
A travel insurance compensates financial liabilities arising out of
medical and non-medical emergencies during travel abroad or within
the country
Health Insurance
Reimburse the insured for expenses incurred from illness or injury,
or pay the care provider directly
Property Insurance
Protects the physical property and equipment of a business against
loss from theft, fire or other perils with its coverage
Auto Insurance
Protects you against financial loss in the event of an accident or
theft of your vehicle
4
5. Life Insurance
Life insurance is a contract that offers financial
compensation in case of death
Whole Life Policy
It covers you for a lifetime, family member receives a certain sum of
money after death of policy holder
Pension Policy
It is valid for a certain period, a lump sum amount will be paid to
family member in the event of your death
Endowment Policy
This helps to build retirement fund. Policy holder can get a regular
pension amount after retirement
Money Back Policy
Percentage of the sum assured will be paid periodically throughout
the term. After the expiry of the term, balance amount as maturity.
Sum assured in case of death
Child Plan
This ensures your child’s financial security. In the event of death of
policy holder, child gets a lump-sum amount.
A part of your premium goes towards your insurance cover.
The remaining amount is invested in Debt and Equity. Lump sum
amount in the event of your death
Unit Linked Insurance
6. Why do you need Insurance?
Insurance is a way of managing risks.
When you buy insurance, you transfer the
cost of a potential loss to the insurance
company in exchange for a fee, known as
the premium. Insurance companies invest
the funds securely, so it can grow, and pay
out when there’s a claim
8. OUR PROCESS
1 2 3 4 5
Data in Motion Data at Rest
Data at Source Data in Use Data at Destruction
Prescribed by IRDA
9. Types of Data involved in Insurance
Business
Non Critical Data or Personal
Information
Critical Data or Sensitive Personal
data
Data Source
10. Personal Data
Any information that relates to a natural person
either directly or indirectly and other information
available to Insurance company which is capable of
identifying such person
• There are no specific rules that govern the processing
of personal data according to Insurance regulators
• If Personal data is processing for a specific purpose,
adequate notice of the processing should be provided
to the individual and data can be stored only as long as
reasonably necessary to satisfy the purpose for which
it is processed
11. Sensitive Personal Data
Sensitive personal data or information include
information that is not freely available or accessible
in the public domain
• Customer Id and Passwords
• financial information such as bank account or credit card or debit
card or other payment instrument details
• physical, physiological and mental health condition
• sexual orientation
• medical records and history
• Insurance details of the customer like claim amount, Nomination
12. Key rules on collection of Sensitive personal Data
1. it is necessary to obtain the consent of the
provider of information prior to the collection
and such consent should be in writing
2. sensitive personal data or information can only
be collected where necessary for a lawful
purpose that is connected with a function or
activity of the Insurance company
3. the disclosure of sensitive personal data or
information to any third party requires the prior
permission of the customer. The third party that
receives such sensitive personal data or
information shall not disclose it further and must
be based in a country offering the same levels of
data protection as India.
Key rules on handling of Sensitive personal Data
1. The Insurance company must comply with general
requirements such as not keeping sensitive
personal data or information for longer than is
required and ensuring it is kept secure or applying
reasonable security practices and procedures.
2. The stringent requirements with respect to the
processing of sensitive personal data and
information including requiring explicit consent,
imposing additional conditions for cross-border
transfers and requiring a copy to be stored in India.
3. The Insurance company is allowed to share
information with government agencies mandated
under the law to obtain information
Collection and Processing of Sensitive Personal Data
13. Data Controls and Analysis
Organizations define and implement procedures to ensure the
confidentiality, integrity, availability and consistency of all data in a
more robust manner.
Processing of personal data must comply with seven principles
● only personal data necessary for the purpose should be
collected
● it should be for a specific purpose
● processing of personal data has to be fair and reasonable
● it should be lawful
● adequate notice of the processing should be provided to the
individual
● personal data processed should be complete, accurate and not
misleading
● personal data can be stored only as long as reasonably
necessary to satisfy the purpose for which it is processed
Surveyors and loss assessors are prohibited from using any confidential
information to their personal advantage or to the advantage of a third party
14. Data Storage
Insurers are required to maintain total confidentiality of policyholder
information, unless it is legally necessary to disclose the same to
statutory authorities.
A privacy policy is required even when no sensitive personal data or
information is being stored and processed
Insurance companies must take a number of measures to ensure
transparency and accountability, implementing appropriate security
safeguards and implementing procedures and mechanisms to address
grievance of data principals
Adopting ‘privacy by design’, maintaining transparency regarding its
general practices on processing of personal data
Insurance companies are required to have its security practices and
procedures certified and audited by an independent auditor who is
approved by the central government at least once every year
15. Data Transfer
● Sensitive personal data could be transferred
outside India only with the express consent of
the individual and in compliance with standard
contractual clauses.
● Critical personal data could be transferred only
to a person or entity providing emergency
health services if such transfer is necessary for
prompt action
● Transfer of critical personal data should be
notified to the Authority within a prescribed
time
16. Data Protection Officer
Appointment of Data Protection Officer
Insurance company are required to designate a
grievance officer
Data protection officer has a number of
responsibilities including providing information
and advice to the data fiduciary, monitoring data
processing activities, advising on data
protection impact assessments, providing
assistance to the Authority and acting as the
point of contact for the data principals.
17. Destruction of Data
Sensitive Information need to be
disposed safely are
• Payroll
• Personal customer information
• Medical records and claims
• Healthcare provider and payment
reports
• Income statements, Balance sheet
• Accident claims
• Tax filings and internal audits
• Medicaid/ACA information
• Development plans and forecast
reports
• Information breaches happen
not just because of inferior
firewalls, weak passwords,
malicious hacks or cyber
attacks but because
of employee error, negligence
or poor judgement
• Insurance company need to
ensure employees know how to
identify, handle and securely
dispose of confidential
information whether that
information is digital or in
paper form.
18. Use of data for Marketing
• The biggest problem for any life insurance company is mis-selling of policies to the
customers resulting in high lapsation of policies and high agent turnover
• Personal information and data collected by insurance companies and intermediaries, can
be utilized to personalize products, develop targeted marketing initiatives and effectively
reduce fraudulent claims
• adequate internal mechanisms for reviewing, monitoring
and evaluating its controls, systems, procedures and
safeguards so as to ensure
(i) the integrity of the automatic data processing systems
(ii) privacy of data is maintained at all times. These internal mechanisms
are to be reviewed annually by specified persons
19. Consequences
● Fine of up to INR 500,000 when there is
disclosure of personal information in breach
of a lawful contract or without consent
● Imprisonment of up to three years when
there is disclosure of personal information
in breach of a lawful contract or without
consent
● Liable to pay damages as compensation to
affected persons if they are negligent in
implementing and maintaining reasonable
security practices and procedures to protect
sensitive personal data or information
20. Use of Analytics in Insurance sector
● Efficient fraud detection reduces annual claims payouts
● Spot more fraud cases along with anticipating new type of frauds which
might occur in future
● Reduced false positive rate, boosts employee productivity, minimizes loss
adjustment expenses and avoids customer ire and legal interventions
● Predictive Analytics takes the big data collected by insurers and uses it to
most accurately and precisely calculate
● Pricing and risk selection
● Claims triage, Emerging trends
● Pricing strategies, Promotional content
● Claims processing
IoT insurance data will be used to improve, among many things:
● Risk assessment
● Marketing campaigns
● Claims processing
● Claims leakage
● Product pricing
21. Officially, Ajith Singh died in a road accident 8km from his village in Haryana’s Rohtak district at 7am
on April 1, 2018. It’s what his wife, Satwanti, who claimed to be present on the spot, reported at the
Hisar Sardar police station.
The unidentified driver was charged under Sections 279 (rash driving) and 304-A (death by
negligence) of the Indian Penal Code .
Five people known to the deceased identified his body at the mortuary, including his wife, older
brother, and nephew.
At least 150,000 people are killed in road accidents in India every year. Ajith happened to be just
another one — an ordinary end to an ordinary life.
Days before he was killed, Ajith had signed up for personal accident insurance policy with at least
four companies, at an average premium of ₹5,000.
An “accidental death” would entitle his nominee to at least ₹25 lakh from one.
Sometime between 2017 and 2018, many insurance agencies operating in Haryana began
to suspect a trend.
Case Study
22. Observations
• During that period, Bharti AXA General Insurance received a stream of Personal Accidental Claims from
Haryana. There was a strange commonality to them.
• The nominee’s bank account was opened just one or two months prior to buying Bharti AXA General
Insurance policies. The PAN (Permanent Account Number) card of nominees was also issued just a couple of
months before
• As per medical documents, the observations were that all insured died due to head injuries and they were
brought dead to the hospital. While scrutinizing these cases, three common mobile numbers were found.
• Similar concerns were coming up at Bajaj Allianz. The following points were noticed:
• Executives such claims received by the company in 2017-18 “the deceased were insured for ₹10 lakh each,
neither for a higher value, nor for a lower value;
• Mysteriously, in all the four cases, the victim was riding pillion on a motorbike whose driver lost balance
because of the sudden emergence of an animal in front of the vehicle
• The road accidents killing their clients were being reported at the same police stations in Sonepat, Jhajjar,
Hisar and Panipat.
23. Observations
• The Insurance Companies reached out to the families, neighbors, doctors and police officers in each of these
cases. No one was willing to talk, but they picked up some information.
• In 2018, he reported back to the insurance companies saying he had “concrete doubt” that these deaths
weren’t caused by road accidents.
• These farmers had died of cancer. On April 5, 2019, Bharti AXA filed a complaint with the director general of
police in Panchkula, after a year of internal investigations, alleging that a gang of conmen had defrauded the
company of crores of rupees.
• On April 20, after two weeks of investigation, STF arrested the mastermind of the scam and his two close
aides from Sonepat.
• Everything about the scam sounds strangely unreal. The Haryana-based gang allegedly identified terminal
cancer patients from rural, low-income backgrounds, got them to insure themselves with multiple
companies by hiding their condition, waited for them to die, and then put their dead bodies through
“accidents”.
24. Cost to customers
● A growing number of frauds also calls for tighter
controls and underwriting that leads to delays in
policy issuance as well as claim settlements.
● Frauds can dent a customer’s confidence and act
as a hindrance for the sector in its attempt to
offer improved and simplified protection
products.
● At times, certain facilities are denied given the
high risk of frauds. There is unnecessary
harassment caused to genuine policyholders, if
their application is flagged as a potential fraud
requiring additional due diligence.
Effects of the Frauds
Reputational damage to the insurer
● Fraudulent claims cause great reputational
damage to the insurer and hence can lead to a
higher rejection rate of claims too. The company’s
ability to manage claims is questioned and
customers often lose trust in the process.
● The fear of fraudulent claims has made insurers
develop extensive underwriting methods that
require investments across talent, time and
technology. Investigation of claims is carried out
for all claims above a certain threshold.
● This further drives up the cost of the cover to the
whole group
25. Most insurance companies try to eradicate possible frauds at the issuance stage itself as
legal and compliance issues come up at the time of rejecting a claim. Also, claims
repudiation brings with it, a reputational risk.
Several companies in the industry have updated their underwriting process to
help them detect more frauds. Some of the methods include:
• Restrictions in geographies with a history of frauds: There may be a chance
that if a resident of these areas, applies for a policy, conditions may be placed on the
agent or the branch sourcing that policy.
• Predictive modelling: Statistical methods such as predictive modelling are also
being applied to the underwriting process. These are particularly helpful in eliminating
the subjectivity when assessing a policy for potential fraud. Although given their
efficiency, a significant amount of effort is put on additional due diligence and
investigations on the basis of model results.
• Repository of fraud claims within the insurance industry: The use of a
common database and analytics tools such as credit scoring firm
Measures can be taken