Carriers who are behind the times can be easily identified by their dependence on non-metaphorical red flags and manually intensive desktop cheat sheets. But what characterizes a state-of-the-art, fraud-fighting insurance carrier? The following is a list of key anti-fraud technologies:

|
  • Granular Data Capture — The ability to capture key data as discrete data elements.
  • Database Comparisons — These highlight any previous investigations or link data to previously reported claims (e.g. finding a surname match). They externally match prior claims with people and objects (e.g. same VIN number used to report a total loss).
  • Data Linking — The ability to link certain parties and objects across claims and detect rings where people/objects re-occur in different roles.
  • Event-Based Processing — The need to re-run checks each time a relevant data element value is changed or added.
  • Task-Based Processing — When events or patterns match, the system needs to have the ability to send tasks to the adjuster or to refer the file to SIU.

Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader

Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:

  • Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
  • Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
  • Educational webcasts, white papers, and ebooks from industry thought leaders
  • Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.