Carriers who are behind the times can be easily identified by their dependence on non-metaphorical red flags and manually intensive desktop cheat sheets. But what characterizes a state-of-the-art, fraud-fighting insurance carrier? The following is a list of key anti-fraud technologies:
|- Granular Data Capture — The ability to capture key data as discrete data elements.
- Database Comparisons — These highlight any previous investigations or link data to previously reported claims (e.g. finding a surname match). They externally match prior claims with people and objects (e.g. same VIN number used to report a total loss).
- Data Linking — The ability to link certain parties and objects across claims and detect rings where people/objects re-occur in different roles.
- Event-Based Processing — The need to re-run checks each time a relevant data element value is changed or added.
- Task-Based Processing — When events or patterns match, the system needs to have the ability to send tasks to the adjuster or to refer the file to SIU.
Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader
Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
- Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
Already have an account? Sign In Now
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.