Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Download
29547 views
1
2
3
4
5
United States General Accounting Office
6
Executive Guide
7
GAO
8
9
October 2001
10
STRATEGIES TO MANAGE IMPROPER PAYMENTS
11
12
13
14
Learning From Public and Private Sector Organizations
15
a
16
17
GAO-02-69G
18
Preface
19
The federal government of the United States-the largest and most
20
complex organization in the world-expended approximately $1.8
21
trillion dollars in fiscal year 2000. As the steward of taxpayer
22
dollars, it is accountable for how its agencies and grantees spend
23
those funds, and is responsible for safeguarding against improper
24
payments-payments that should not have been made or that were made
25
for incorrect amounts.
26
Despite the amount of funds involved and the impact improper
27
payments can have on a program's ability to achieve its intended
28
outcome, most agencies have not yet estimated the magnitude of
29
improper payments in their programs. Without a systematic
30
measurement of the extent of the problem, agency management cannot
31
determine (1) if the problem is significant enough to require
32
corrective action, (2) how much to costeffectively invest in
33
internal control systems to correct the problem, or
34
(3) the impact of the actions already taken to reduce improper
35
payments or additional corrective actions needed.
36
This executive guide is intended to identify effective practices
37
and provide case illustrations and other information for federal
38
agencies' consideration when developing strategies and planning and
39
implementing actions to manage improper payments in their programs.
40
It was prepared at the request of Senator Joseph I. Lieberman,
41
Chairman, Senate Committee on Governmental Affairs. This is one in
42
a series of projects we are undertaking for the Senate Committee on
43
Governmental Affairs and the House Committee on Government Reform
44
concerning the issue of improper payments involving federal
45
programs.
46
In producing this guide, we contacted a number of private and
47
public sector organizations, which we identified primarily through
48
extensive research on financial management practices, and obtained
49
information on actions that they took and considered effective in
50
reducing improper payments.
51
1The participants were the Department of Health and
52
Human Services' Health Care Financing Administration;
53
2the Social Security Administration; the Department of
54
Veterans Affairs; the states of Illinois, Texas, and Kentucky; the
55
governments of Australia, New Zealand, and the United Kingdom; and
56
three private sector corporations.
57
3We thank them for their willingness to participate
58
and for the valuable information and insights they provided.
59
1
60
For a more detailed discussion of our objectives, scope, and
61
methodology, see appendix I.
62
2
63
In July 2001, the Health Care Financing Administration was
64
renamed the Centers for Medicare and Medicaid Services (CMS).
65
3
66
For a description of each of these entities, see appendix
67
II.
68
69
Page 1 GAO-02-69G Improper Payments
70
This executive guide was prepared under the direction of Linda
71
Calbom, Director, Financial Management and Assurance. Other GAO
72
contacts and key contributors are listed in appendix IV. Questions
73
can be directed to Ms. Calbom at (202) 512-9508,
74
[email protected],or Tom Broderick, Assistant Director,
75
by phone, e-mail, or regular mail at the following:
76
Phone: (202) 512-8705
77
E-mail:
78
[email protected]
79
Mail: Tom Broderick, Assistant Director
80
U.S. General Accounting Office 441 G Street, NW Washington, DC
81
20548
82
83
Jeffrey C. Steinhoff Managing Director Financial Management and
84
Assurance
85
Contents
86
Preface
87
Introduction
88
89
Observations
90
91
Abbreviations
92
93
94
95
96
97
Introduction
98
Improper payments are a widespread and significant problem
99
receiving increased attention not only in the federal government
100
but also among states, foreign governments, and private sector
101
companies. Improper payments include inadvertent errors, such as
102
duplicate payments and miscalculations; payments for unsupported or
103
inadequately supported claims; payments for services not rendered;
104
payments to ineligible beneficiaries; and payments resulting from
105
outright fraud and abuse by program participants and/or federal
106
employees. In the federal government, for example, they occur in a
107
variety of programs and activities, including those related to
108
contractors and contract management; health care programs, such as
109
Medicare and Medicaid; financial assistance benefits, such as Food
110
Stamps and housing subsidies; and tax refunds.
111
While in the private sector improper payments most often present
112
an internal problem that threatens profitability, in the public
113
sector they can translate into serving fewer recipients or
114
represent wasteful spending or a higher relative tax burden that
115
prompts questions and criticism from the Congress, the media, and
116
the taxpayers. For federal programs with legislative or regulatory
117
eligibility criteria, improper payments indicate that agencies are
118
spending more than necessary to meet program goals. Conversely, for
119
programs with fixed funds, any waste of federal funds translates
120
into serving fewer recipients or accomplishing less
121
programmatically than could be expected.
122
Despite a climate of increased scrutiny, most improper payments
123
associated with federal programs continue to go unidentified as
124
they drain taxpayer resources away from the missions and goals of
125
our government. They occur for many reasons including insufficient
126
oversight or monitoring, inadequate eligibility controls, and
127
automated system deficiencies. However, one point is clear based on
128
our study-the basic or root causes of improper payments can
129
typically be traced to a lack of or breakdown in internal control.
130
Collectively, internal controls are an integral component of an
131
organization's management that provides reasonable assurance that
132
the organization achieves its objectives of
133
134
135
(1)
136
effective and efficient operations, (2) reliable
137
financial reporting, and
138
139
140
(3)
141
compliance with laws and regulations. Internal controls
142
are not one event, but a series of actions and activities that
143
occur throughout an entity's operations and on an ongoing basis.
144
People make internal controls work, and responsibility for good
145
internal controls rests with all managers.
146
147
148
The risk of improper payments increases in programs with (1)
149
complex criteria for computing payments, (2) a significant volume
150
of transactions, or (3) emphasis on expediting payments. Since
151
these factors apply to a number of government programs that
152
collectively disburse billions of dollars, there is clearly a need
153
for federal agencies to be ever more vigilant in the design,
154
implementation, and maintenance of proper controls for safeguarding
155
assets and preventing and detecting fraud and errors.
156
The risk of improper payments and the government's ability to
157
prevent them will continue to be of concern in the future. Under
158
current federal budget policies, as the baby boom generation leaves
159
the workforce, spending pressures will grow rapidly due to
160
increased costs of programs such as Medicare, Medicaid, and Social
161
Security. Other federal expenditures are also likely to increase.
162
The increased size of federal programs, spending pressures,
163
implementation of new programs, and changes in existing programs
164
all but guarantee that, absent improvements in internal controls
165
and other proactive actions, the potential for additional or larger
166
volumes of improper payments will be present. Figure 1 illustrates
167
the reported and projected trends in certain federal expenditures,
168
excluding interest on the public debt, for fiscal years 1980
169
through 2006.
170
Figure 1: Trends in Certain Actual and Projected Federal
171
Expenditures: Fiscal Years 1980 Through 2006
172
173
174
1980 1982 1984 1986 1988 1990 1992 1994 1996 1998 2000 2002
175
2004 2006 Fiscal year
176
177
Other Social Security
178
Defense Medicare Medicaid
179
Source: Actual and projected amounts are from the Budget of the
180
United States Government, Fiscal Year 2002, Historical Tables.
181
The President's Management Agenda, Fiscal Year 2002, includes a
182
governmentwide initiative for improved financial performance. Under
183
this initiative, the administration will establish a baseline of
184
the extent of erroneous payments and require agencies to include,
185
in their fiscal year 2003 budget submissions, information on
186
erroneous payment rates, including actual and target rates, where
187
available, for benefit and assistance programs over $2 billion.
188
Using this information, the Office of Management and Budget will
189
work with agencies to establish goals to reduce erroneous payments
190
for each program.
191
Few would argue that the goal of reducing improper payments is
192
not a worthy one. But attacking the problem requires a strategy
193
appropriate to the organization involved and its particular risks,
194
including a consideration of the legal requirements surrounding
195
security and privacy issues. The organizations that participated in
196
our study have taken actions that they consider to be effective in
197
reducing potential as well as actual improper payments.
198
All of these actions shared a common focus of improving the
199
internal control systems over the problem area. This focus on
200
internal controls does not necessarily mean that the programs
201
lacked controls but that the existing controls needed to be updated
202
or policies and procedures added to strengthen the overall control
203
system.
204
In this executive guide, we highlight many of the strategic
205
actions taken by the study participants
206
4to reduce improper payments. We categorize these
207
actions into the five components of internal control-control
208
environment, risk assessment, control activities, information and
209
communications, and monitoring-outlined in the Comptroller
210
General's Standards for Internal Control in the Federal Government
211
(GAO-AIMD-00-21.3.1, November 1999).
212
5For purposes of this study, we define these
213
components as follows.
214
215
216
217
Control environment-creating a culture of accountability
218
by establishing a positive and supportive attitude toward
219
improvement and the achievement of established program
220
outcomes.
221
222
223
224
Risk assessment-performing comprehensive reviews and
225
analyses of program operations to determine if risks exist and the
226
nature and extent of the risks identified.
227
228
229
230
Control activities-taking actions to address identified
231
risk areas and help ensure that management's decisions and plans
232
are carried out and program objectives are met.
233
234
235
236
Information and communications-using and sharing
237
relevant, reliable, and timely financial and nonfinancial
238
information in managing improper payment related
239
activities.
240
241
242
4
243
The examples we have included from these organizations are meant
244
only to illustrate the range and variety of internal controls that
245
may be useful to federal agency managers. They are not
246
all-inclusive and may not include the specific controls that a
247
particular agency may need.
248
5
249
The Federal Managers' Financial Integrity Act of 1982 required
250
that we issue standards for internal control in the federal
251
government.
252
● Monitoring-tracking improvement initiatives, over time, and
253
identifying additional actions needed to further improve program
254
efficiency and effectiveness.
255
Although these internal control components are applicable to the
256
entirety of an organization's operations,
257
6this executive guide focuses on internal controls as
258
they relate to reducing improper payments. The following graphic
259
represents the interrelationship between the components and efforts
260
to manage improper payments.
261
Figure 2: Managing Improper Payments Through Internal
262
Controls
263
264
While this guide discusses each of these control areas
265
separately, actions to manage improper payments would typically
266
require a continual interaction between these areas. As depicted in
267
the figure, the control environment surrounds and reinforces the
268
other components, but all components work in concert toward a
269
central objective, which, in this case, is managing improper
270
payments.
271
We conclude our discussion of the actions taken to address
272
improper payments with observations about key factors necessary for
273
success. We have included descriptions of the entities we visited
274
in appendix II. Also, appendix III identifies other sources of
275
information that may be useful to federal agencies in their efforts
276
to address improper payments in their programs.
277
6See also Internal Control Management and Evaluation Tool
278
(GAO-01-1008G, August 2001). The purpose of this tool is to assist
279
agencies in maintaining or implementing effective internal control
280
and, as needed, to help determine what, where, and how improvements
281
can be implemented.
282
283
284
285
Control Environment: Instilling a Culture
286
of Accountability
287
-Changes madein Texas might not have happened if the legislature
288
hadn't become involved. Regulations should not be seen as
289
roadblocks, but as support orbacking to achieve the agencies'
290
mission."
291
Ken Holcomb, Director of Systems Resources, Office of
292
Investigations and Enforcement, Texas Health and Human Services
293
Commission
294
Of the elements that are critical to the identification,
295
development, and implementation of activities to reduce improper
296
payments, perhaps the most significant is the control environment.
297
By focusing their attention on and communicating their intent to
298
reduce improper payments throughout an organization and to all
299
affected organizational units and individuals, top-level
300
officials-whether in the government or within private sector
301
companies-and legislative bodies set the stage for change. They
302
instill a culture of accountability by adopting a positive and
303
supportive attitude toward improvement and the achievement of
304
established program outcomes. They also establish a transparent
305
environment in which their expectations for program improvement are
306
clearly defined and accountability for achieving these improvements
307
is set. The actions of the entities in our study in areas including
308
passing legislation, setting and maintaining the ethical tone,
309
delegating roles and responsibilities, and implementing human
310
capital initiatives clearly communicated the need for change.
311
312
We were told by many of the officials we met in the course of
313
our work that, without the clearly established expectations and
314
demands for improvement by top management and legislative
315
officials, little would have happened to effectively reduce fraud
316
and errors in their programs. However, it is important to note
317
that, while top management sets the tone for cultural change,
318
everyone from program managers to staff performing day-to-day
319
operational activities must buy into this change and work to
320
achieve its overall goals. The cultural change fostered by an
321
effective control environment stresses the importance of
322
improvement and efficient and effective program operations, while
323
maintaining a balance with concerns raised regarding privacy and
324
information security in a world where computers and electronic data
325
are indispensable for making payments. In the legislative arena, it
326
involved passing laws requiring certain actions by agency or
327
program management, the use of various prevention and/or detection
328
methodologies, and periodic agency reporting on the status of
329
improvement efforts. At the agency or program level, it included
330
management's public commitment to reduce fraud and errors, as
331
-There are two ways to stop fraud-one is to lock up
332
everythingaround you, andthe other is to surround yourself with
333
ethical people."
334
Chris Linton, Certified Fraud Examiner, National Advisor, Fraud
335
Prevention and Investigation, New Zealand's Inland Revenue
336
Department
337
well as annual performance reporting and follow-up actions based
338
on performance results.
339
Top-level interest in the amount of improper payments at the
340
organizations that participated in our study often resulted from
341
program, audit, and/or media reports of misspent funds or
342
fraudulent activities. As the magnitude of these improper payments
343
became known, pressures increased on government officials and
344
legislative bodies to reduce them.
345
In Texas, the legislature was instrumental in effecting changes
346
to the state's benefit programs through provisions in several
347
pieces of legislation. The legislature's involvement was
348
precipitated in 1996 by the reported amounts of improper payments
349
in Texas' Medicaid program (estimated to range from $365 million to
350
$730 million, or 4 to 8 percent of total expenditures) and
351
Temporary Assistance for Needy Families (TANF) and Food Stamp
352
programs (estimated at a total of $222.4 million, or about 8
353
percent of total expenditures for the two programs). Texas
354
lawmakers sought to reduce improper payments by mandating specific
355
actions by responsible agencies, including the use of computer
356
technology to identify and deter fraud and abuse in the Texas
357
Medicaid program. In addition, the lawmakers called for publicizing
358
successful fraud prosecutions and fraud prevention programs to
359
deter benefit fraud.
360
Australia and New Zealand prepared and adopted a joint standard
361
7on "risk management," to provide a cultural framework
362
for managing risk. Risk management is the term applied to a logical
363
and systematic method of managing risks associated with any
364
activity, function, or process in a way that will enable
365
organizations to minimize losses and maximize opportunities. The
366
philosophy makes risk management a part of its organizational
367
culture and integrates risk management into its day-to-day
368
practices and business activities. When this is achieved, risk
369
management becomes the business of everyone in the
370
organization.
371
People are what make internal controls work, and the integrity
372
and ethical values maintained and demonstrated by management play a
373
key role in the entire organization's ethical tone. After the
374
identification of significant internal fraud, New Zealand's Inland
375
Revenue Department (IRD) created the position of National Advisor,
376
Fraud Prevention and Investigation, and adopted a fraud control
377
strategy. The primary aim of the strategy is to enable responsible
378
conduct, where the need to obey the law and to behave ethically is
379
part of the organization's ethos. Accordingly, IRD has adopted a
380
code of conduct applicable to all employees that explains the
381
standards of integrity and behavior expected.
382
In the experience of IRD's National Advisor, Fraud Prevention
383
and Investigation, employees are often provided a copy of the code
384
of conduct
385
7
386
Joint Australian/New Zealand Standard 4360:1999 was prepared by
387
the Joint Technical Committee OB/7-Risk Management. It was approved
388
on behalf of the Council of Standards Australia on April 2, 1999,
389
and on behalf of the Council of Standards New Zealand on March 22,
390
1999. It was published on April 12, 1999. Referenced material is
391
from pages iii and 1 of the standard.
392
-Good customer service is accurate customer service. While
393
timeliness is important, quality and accuracy aremore important and
394
will ultimately improve timeliness anyway."
395
Sue Vardon, Chief Executive Officer, Centrelink
396
on their first day of work, along with a large volume of other
397
paperwork, and never actually read the code unless the code is
398
breached. To heighten employee awareness, IRD holds roundtable
399
discussions with new and seasoned employees, which bring the code
400
to life in terms of everyday business activity.
401
While many organizations have programs to deter and detect
402
fraudulent payments, improper payments resulting from
403
miscalculation and other errors often receive inadequate attention.
404
Centrelink, a "one-stop shop" that pays a variety of Australian
405
government benefits, has recently made it its business to improve
406
payment accuracy. Centrelink was established in 1997 with a strong
407
focus on customer service and the goal of paying beneficiaries
408
promptly. However, in recent years, internal and external audit
409
reports showed that Centrelink had, to some extent, traded quality
410
for timeliness. Centrelink's own internal review showed that up to
411
30 percent of all work was rework because it was not done correctly
412
the first time. The organization's management responded by
413
implementing a "Getting it Right" strategy in 2000, which
414
established a tone for change by setting out
415
416
417
418
the roles and responsibilities of managers and team
419
leaders, including setting clear and measurable goals in line with
420
Centrelink's strategic framework and meeting performance measures,
421
and
422
423
424
425
minimum standards to be applied by all staff in
426
establishing proof of identity of customers, managing records,
427
keeping technical knowledge and skills current, recording reasons
428
for payment decisions, and checking work
429
comprehensively.
430
431
432
Centrelink has distributed posters and mouse pads to reinforce
433
the "Getting it Right" message and has provided resources to staff
434
on how to reach minimum standards. Through implementation of the
435
"Getting it Right" strategy, the Centrelink Chief Executive Officer
436
has stated that she expects a reduction in improper payments as
437
well as continued timeliness in payments to beneficiaries.
438
Activities that must be undertaken for each program, to ensure the
439
quality of assessment and services provided, are being developed. A
440
number have already been released for implementation in
441
Centrelink's Customer Service Centre network.
442
443
8
444
In June 2001 the Department of Social Security was renamed the
445
Department for Work and Pensions (DWP).
446
9
447
Amounts included in this report have been converted to U.S.
448
dollars using the following exchange rates, effective April 16,
449
2001, for one U.S. dollar: 0.697064 British pounds, 1.95665
450
Australian dollars, and 2.43533 New Zealand dollars.
451
452
453
454
Putting it Right-detecting when payments go wrong and
455
taking prompt action to correct them with appropriate penalties to
456
prevent recurrence, and
457
458
459
460
Making Sure Our Strategy Works-monitoring progress,
461
evaluating the strength of controls, and making adjustments where
462
needed.
463
464
465
DWP's strategy also established performance measures for the
466
reduction of the amount of losses from fraud and error in the
467
Income Support and Jobseeker's Allowance benefit programs.
468
To kick off its new program, DWP launched a publicity campaign
469
against "benefit cheats" to shift public attitude and promote
470
intolerance toward those who defraud the benefit system.
471
Additionally, television commercials, billboards, newspaper
472
articles, and an antifraud Web site (
473
www.targetingfraud.gov.uk)communicated the
474
government's message to the public that fraud and abuse of the
475
benefits system would not be tolerated.
476
Parliament has also stayed actively involved in benefit payment
477
reform and improper payment reductions. For example, it enacted
478
legislation authorizing data sharing activities within and between
479
government agencies and departments. Also the Treasury requires
480
departments to disclose instances of irregular expenditures arising
481
from erroneous benefit awards and fraud by claimants. Further, the
482
Comptroller and Auditor General has qualified his opinion on DWP's
483
fiscal year 1995 through fiscal year 2000 financial statements
484
because of the level of fraud and error identified in the benefit
485
programs. This served to reinforce the message that high levels of
486
improper payments are unacceptable in the United Kingdom.
487
Among the organizations we studied, the pressures applied by
488
oversight entities and top management were instrumental as change
489
agents. They not only defined and communicated a need for improved
490
program operations but, most important, they redefined the
491
organizational culture. Further, by being transparent in redefining
492
the culture, oversight entities and top management set expectations
493
and obtained buy-in on the need for and importance of change from
494
individuals throughout the organizations. This was critical for
495
success since these individuals managed the day-to-day program
496
activities. Further, a culture of accountability was essential to
497
begin the critical next step in managing improper payments, the
498
risk assessment process.
499
500
Strategies to Consider-Control Environment
501
To create a control environment that instills a culture of
502
accountability over improper payments, the following strategies
503
should be considered:
504
505
506
507
provide leadership in setting and maintaining the
508
agency's ethical code of conduct and in ensuring proper behavior
509
under the code;
510
511
512
513
provide a cultural framework for managing risk by
514
engaging everyone in the organization in the risk management
515
process;
516
517
518
519
increase accountability by establishing goals for
520
reducing improper payments for major programs; and
521
522
523
524
foster an atmosphere that regards improper payments as
525
unacceptable.
526
527
528
529
530
531
Risk Assessment: Determining the Nature
532
and Extent of the Problem
533
-One of the worst problems an organization confronts is the
534
problem of institutional denial. An organization should not simply
535
say, "We know we have a problem, but we don't want to know how big
536
it is.'"
537
Aurora LeBrun, Associate Commissioner, Office of Investigations
538
and Enforcement, Texas Health and Human Services Commission
539
Strong systems of internal control provide reasonable assurance
540
that programs are operating as intended and are achieving expected
541
outcomes. A key step in the process of gaining this assurance is
542
conducting a risk assessment, an activity that entails a
543
comprehensive review and analysis of program operations to
544
determine where risks exist and what those risks are, and then
545
measuring the potential or actual impact of those risks on program
546
operations. In performing a risk assessment, management should
547
consider all significant interactions between the entity and other
548
parties, as well as all internal factors at both the
549
organizationwide and program levels. Once risk areas are
550
identified, their potential impact on programs and activities
551
should be measured and additional controls should be considered. As
552
risks are addressed and controls are changed, they should
553
occasionally be revisited to determine where the risks have
554
decreased and where new areas of risk may exist. As such, the risk
555
assessment process should be iterative.
556
557
The information developed during a risk assessment forms the
558
foundation or basis upon which management can determine the nature
559
and type of corrective actions needed, and it gives management
560
baseline information for measuring progress in reducing improper
561
payments. The specific risk analysis methodology used can vary by
562
organization because of differences in missions and the difficulty
563
in qualitatively and quantitatively assigning risk levels. In
564
addition, because governmental, economic, industry, regulatory, and
565
operating conditions continually change, risk assessments should be
566
periodically updated to identify and deal with any special risks
567
prompted by such changes.
568
The organizations that participated in our study found that
569
conducting risk assessments, to determine the nature and extent of
570
their improper payments, was an essential step in helping them
571
focus on the most significant problem areas and determine what
572
needed to be done to address the identified risks in those
573
areas.
574
Many federal agencies, even those with recognized weaknesses
575
that result in improper payments, do not perform risk assessments
576
to identify and estimate the magnitude of improper payments within
577
their programs.
578
However, some agencies do perform risk assessments. For example,
579
the Department of Health and Human Services (HHS) began reporting
580
an annual estimate of improper payments in the Medicare
581
Fee-for-Service program in 1996. In fiscal year 2000, it reported
582
estimated improper Medicare Fee-for-Service payments of $11.9
583
billion, or about 7 percent of such benefits. HHS' reporting and
584
analysis of improper Medicare payments has helped lead to the
585
implementation of several initiatives to identify and reduce such
586
payments. These initiatives include working with providers to
587
ensure that medical records support billed services.
588
A thorough risk assessment also allows entities to target
589
high-risk areas and, therefore, to focus often limited resources
590
where the greatest exposure exists. For example, the Illinois
591
Department of Public Aid (IDPA) conducted a 1998 comparison of
592
Medicaid payments made with information and documentation
593
associated with the claims to determine if the payments were
594
accurate. From this information, the IDPA calculated that the
595
state's payment accuracy rate was about 95 percent. The review
596
identified errors and their causes and provided IDPA with
597
information that allowed it to focus attention on the 5 percent of
598
inaccurate payments and target strategies to improve the accuracy
599
of these payments. For example, of the $37.2 million spent for
600
nonemergency transportation services included in the study, $11.55
601
million (31 percent) were estimated to be in error. The payment
602
accuracy review and three other studies led to a series of actions
603
that included assuring that transportation providers actually
604
existed and were providing services, assuring that providers billed
605
Medicaid correctly, and sending notices to let providers know what
606
is expected of them.
607
Texas has performed two reviews of the accuracy of its health
608
care payments-one in December 1998 and a second in January 2001.
609
Both reviews of the Medicaid program were designed to measure the
610
incidence of potential overpayments that could be due to fraud and
611
abuse. The 2001 study used three different types of analyses-client
612
telephone interviews, data analysis (identifying billing trends
613
that are known to result in overpayments), and medical record
614
review. Documentation errors, clerical errors, and potential fraud
615
and abuse were identified. Texas used the results to improve its
616
fraud and abuse detection process by considering certain high-risk
617
areas in the development of data analysis techniques in its
618
Medicaid Fraud and Abuse Detection System (MFADS). For example, it
619
recommended an increase in analyses targeted at medical supplies
620
and durable medical equipment and at providers who bill higher cost
621
procedure codes to maximize their reimbursement.
622
Both Texas and Illinois found the first-time payment accuracy
623
review to be expensive-$250,000 and $400,000 in direct costs,
624
respectively. However, both states recognized that the cost of risk
625
assessments would decrease after the baseline measurement had been
626
determined, and found them to be cost-beneficial in light of the
627
ability to focus on high-risk areas. Resources are maximized when
628
strategically aimed at the areas that need the most improvement.
629
Thus, they regarded the payment accuracy review as an effective and
630
cost-beneficial way to combat improper payments.
631
Government agencies in other countries also use payment accuracy
632
reviews to identify risk areas. For example, the Department of
633
Social Security in the United Kingdom uses the results of a rolling
634
program of reviews to determine the levels of fraud and error in
635
its Income Support and Jobseeker's Allowance benefit programs.
636
Specifically, these reviews quantify the amount of fraud, customer
637
error, and official error (error by government employees) affecting
638
benefit claims. The government uses the October 1997 through
639
September 1998 review results as a baseline against which the
640
results of subsequent reviews are measured. Further, DWP in the
641
United Kingdom plans to use this information to target areas for
642
prevention and detection in the benefit programs, to identify
643
customers who are at risk for higher levels of error in their
644
claims, and to facilitate case interventions.
645
646
647
"Control activities will not be fully effective until everyone,
648
from the person on the counter through to the head of the agency,
649
takes responsibility for managing risk from the perspective of
650
their respective positions."
651
Ralph Watzlaff, General Manager, Professional Review Division,
652
Australian Health Insurance Commission
653
In our study of activities to reduce improper payments, risk
654
assessments identified problem areas and resulted in estimates of
655
monetary values associated with the problems. Thus, the process of
656
doing risk assessments was essential for evaluating the feasibility
657
and cost-effectiveness of the various corrective actions
658
considered. The organizations viewed risk assessments as
659
opportunity, and identified risk areas were communicated throughout
660
the organization.
661
Assessing its risks allows an organization to set goals and
662
target its efforts to reduce improper payments. Having developed
663
such a framework, an organization is well positioned to determine
664
which control activities to implement to reduce risks and
665
ultimately reduce fraud and errors.
666
667
Strategies to Consider-Risk Assessment
668
To assess risk by determining the nature and extent of improper
669
payments, the following strategies should be considered:
670
671
672
673
institute a systematic process to estimate the level of
674
improper payments being made by the organization;
675
676
677
678
based on this process, determine where risks exist, what
679
those risks are, and the potential or actual impact of those risks
680
on program operations;
681
682
683
684
use risk assessment results to target high-risk areas and
685
focus resources where the greatest exposure exists; and
686
687
688
689
reassess risks on a recurring basis to evaluate the
690
impact of changing conditions, both external and internal, on
691
program operations.
692
693
694
695
696
697
Control Activities: Taking Action to
698
Address Identified Risk Areas
699
-There are no brownie points for just talking about the
700
problem."
701
Joan McQuay, National Benefit Control and Debt Manager, Work and
702
Income New Zealand
703
Once an organization has identified areas of its operations that
704
are at risk and quantified the possible extent of the risk, and its
705
management and other key officials are committed to and have set a
706
goal for reducing the risk, the organization must take action to
707
achieve that goal. Control activities are the policies, procedures,
708
techniques, and mechanisms that are designed to help ensure that
709
management's decisions and plans are carried out. They include
710
activities designed to address risks that lead to fraud and error.
711
They are an integral part of an organization's actions in planning,
712
implementing, reviewing, and achieving effective results.
713
714
The control activities used by an organization to address
715
improper payments vary according to the specific threats faced and
716
risks incurred; differences in objectives; managerial judgment;
717
size and complexity of the organization; operational environment;
718
sensitivity and value of data; and requirements for system
719
reliability, availability, and performance. Additionally, they must
720
comply with all relevant laws and help strike a balance between the
721
sometimes competing goals of privacy and program integrity. Control
722
activities can include both prepayment and postpayment mechanisms
723
to manage improper payments. Given the large volume and complexity
724
of federal payments and historically low recovery rates for certain
725
programs, it is generally most efficient to pay bills and provide
726
benefits properly in the first place. Aside from minimizing
727
overpayments, proactively preventing improper payments increases
728
public confidence in the administration of benefit programs and
729
avoids the difficulties associated with the "pay and chase"
730
10aspects of recovering improper payments. However,
731
recognizing that some overpayments are inevitable, agencies also
732
need to adopt effective detection techniques to quickly identify
733
and recover them. Detection activities play a significant role not
734
only in identifying improper payments, but also in providing
735
data
736
10"Pay and chase" refers to the labor-intensive and
737
time-consuming practice of trying to recover overpayments once they
738
have already been made rather than preventing improper payments in
739
the first place.
740
on why these payments were made and, in turn, highlighting areas
741
that need strengthened prevention controls.
742
The organizations in our study used many different prevention
743
and detection control activities to manage improper payments. The
744
nature of these activities ranged from sophisticated computer
745
analyses of beneficiary and program participant data to postaward
746
contract audits. The kinds of activities pursued were dictated by
747
the types of payment activities each entity had identified as
748
presenting the most significant risk of improper payments as well
749
as the kind of data and other resources that were available to the
750
entity in this effort. This guide discusses the following six kinds
751
of control activities:
752
753
754
755
data sharing,
756
757
758
759
data mining,
760
761
762
763
neural networking,
764
765
766
767
recovery auditing,
768
769
770
771
contract audits, and
772
773
774
775
prepayment investigations.
776
777
778
The data sharing, data mining, and neural networking techniques
779
discussed in this guide are powerful internal control tools that
780
provide more useful and timely access to information. The use of
781
these techniques can achieve potentially significant savings by
782
identifying client-related reporting errors and misinformation
783
during the eligibility determination process-before payments are
784
made-or by detecting improper payments that have been made.
785
However, the more extensive use of personal information in an
786
evolving technological environment raises new questions about
787
privacy and how it should be protected. In the federal arena, such
788
activities must be implemented consistent with all protections of
789
the Privacy Act of 1974, as amended by the Computer Matching and
790
Privacy Protection Act of 1988, and other privacy statutes.
791
792
Data sharing allows entities that make payments-to
793
contractors, vendors, or participants in benefit programs-to
794
compare information from different sources to help ensure that
795
payments are appropriate. For government agencies, data sharing can
796
be particularly useful in confirming initial or continuing
797
eligibility of participants in benefit programs and in identifying
798
improper payments that have already been made.
799
11
800
A form of data sharing that Texas has found to be effective for
801
determining the initial eligibility of individuals for Food Stamp
802
benefits puts information from several state and local agencies
803
in
804
11See also Benefit and Loan Programs: Improved Data Sharing
805
Could Enhance Program Integrity (GAO/HEHS-00-119, September 13,
806
2000).
807
the hands of state caseworkers by means of a vendor-provided
808
software program. The vendor maintains public information, such as
809
that recorded by local department of motor vehicles or municipal
810
courts, where it can be easily searched by caseworkers to evaluate
811
information provided by individuals applying for benefits. Using
812
the software, caseworkers can target questions to applicants when
813
there are discrepancies between information provided by the clients
814
and that recorded elsewhere. Caseworkers can search the database
815
for data such as driver's license information, records showing the
816
number of individuals or vehicles at the clients' reported
817
addresses, telephone numbers, vehicle values, boat and motor files,
818
criminal convictions, marriage/divorce records, and consumer credit
819
reports. Then, for example, if the data search shows two cars at an
820
applicant's address when the benefit applicant has reported only
821
one, the caseworker can, at the time of the benefit application,
822
question the applicant concerning this discrepancy. Generally, this
823
query information is treated only as a "case clue" and must be
824
verified. The database contains reporting options that allow
825
supervisors to monitor employees' use of the system to ensure that
826
all queries are appropriate-in addition, the state's internal
827
auditor monitors the staff's use of the database.
828
Beyond determining initial eligibility of participants in
829
benefit programs, data sharing can also be used to identify
830
improper payments that have already been made. Data sharing allows
831
a flow of information in two directions, which is particularly
832
helpful to some organizations in managing improper payments. For
833
example, the Social Security Administration (SSA) obtains death
834
records from states to determine if deceased individuals are
835
receiving benefit checks. At the same time, SSA provides data to
836
states and other agencies. Among the data it shares is notification
837
of whether there is a valid social security number to confirm the
838
eligibility of an applicant for various state or federal benefit
839
programs. The exchange of information allows data matches to take
840
place, a process in which information from one source is compared
841
with information from another to identify any inconsistencies. Data
842
matches of social security numbers and other data can help
843
determine whether beneficiaries are receiving payments
844
inappropriately or under more than one name or address.
845
SSA performs over 20 data matches with over 10 federal agencies
846
and more than 3,500 state and local entities using incoming
847
information. Additionally, SSA shares outgoing information with
848
federal agencies through more than 15 matches. For example, SSA
849
shares data with the Department of Housing and Urban Development
850
(HUD) so it can perform a match to verify the identity of
851
recipients of housing benefits and identify potentially fraudulent
852
claims. SSA uses data matches to prevent and detect improper
853
payments in its programs. It estimates that it saves $350 million
854
annually for Old Age and Survivors Insurance and Disability
855
Insurance, and $325 million annually for Supplemental Security
856
Income through the use of data matching. Further, the savings are
857
not limited to
858
SSA data matches save $1.5 billion for other governmentagencies
859
each year.
860
those realized by SSA. According to SSA, its matches save
861
approximately $1.5 billion each year for other agencies.
862
12
863
Data matches to identify improper payments can be performed
864
periodically (i.e., daily, monthly, or yearly) or on an ad hoc
865
basis, using various sources of data to reconfirm eligibility of
866
beneficiaries and accuracy of payments. Texas conducts both
867
periodic and ad hoc matches using data including
868
869
870
871
prisoner information obtained from the Texas Department
872
of Criminal Justice and SSA's Prisoner Verification System (to
873
determine whether prisoners are receiving benefits to which they
874
are not entitled),
875
876
877
878
deceased individuals lists obtained from the Texas
879
Department of Health Bureau of Vital Statistics (to determine
880
whether benefits are being paid to such individuals),
881
and
882
883
884
885
income information obtained from the Texas Employees
886
Retirement System (to check retiree income for amounts that affect
887
the level of benefit eligibility).
888
889
890
Texas also shares data with three of its bordering states to
891
determine duplicity of benefits, which, for the four states, has
892
resulted in an average of 337 potential duplicates per state per
893
quarter. In fiscal year 2000, after researching potential duplicate
894
payments, Texas denied or decreased benefits in 656 cases,
895
resulting in approximately $578,000 in benefits saved.
896
Kentucky performs data matches to determine eligibility for Food
897
Stamps, TANF, and Medicaid benefits using an integrated automated
898
system that lets caseworkers determine eligibility for the three
899
programs simultaneously. At the time the application is entered
900
into the system, the system performs several matches to obtain
901
additional information on the applicant and prevent duplicate
902
participation. These matches are made through its income
903
eligibility and verification system using the applicant's social
904
security number, name, date of birth, any previous disqualification
905
record from assistance programs, and income. In addition, on a
906
monthly basis, other matches are conducted. The state matches data
907
with the National Crime Information Center to check for fleeing
908
felons, with SSA to determine if any clients are in prison or have
909
died, and with assistance programs in other states to check for
910
client disqualification. In addition, matches with unemployment and
911
state wages records are done monthly. When these matches result in
912
information that could require changes in benefits, the matches
913
appear on the daily case status reports, alerting caseworkers to
914
potential changes in benefits.
915
The United Kingdom formalized data matching between government
916
organizations in 1995, and it reported that, through March 2000, it
917
had realized benefit savings of about $450 million. From April 1999
918
through
919
12
920
SSA calculates the annual savings based on a compilation of
921
cost-benefit analyses performed by the matching agencies under the
922
terms of their matching agreements with SSA.
923
March 2000, matches identified about
924
217,000 inconsistencies for further investigation, and resulted in
925
an overall benefit saving of about $53 million. Additionally,
926
legislation has now been passed to enable the government to obtain
927
financial information from the private sector in certain
928
circumstances.
929
The prevalence of data sharing is evidence of the value provided
930
to agencies when they can obtain and use data from sources external
931
to an individual program's systems. Having the two streams of data
932
allows for matches to occur and inconsistencies or anomalies to be
933
flagged for further research. Federal entities contemplating data
934
matching must do so in accordance with the provisions of the
935
Computer Matching and Privacy Protection Act, which requires that
936
(1) the privacy of data used in computer matches be protected, (2)
937
agencies complete cost-benefit analyses on all computer matches and
938
report annually on their findings, unless the matches are exempted
939
by law, and (3) data integrity boards be established to approve and
940
review the data matches.
941
942
While data sharing gives an organization the means to
943
compare data from different sources, data mining offers a tool to
944
review and analyze diverse data. Data mining analyzes data for
945
relationships that have not previously been discovered. For
946
example, the incidence of improper payments among Medicaid claims
947
might, if sufficiently analyzed and related to other Medicaid data,
948
reveal a correlation with a certain health care provider or
949
providers.
950
The central repository of data commonly used to perform data
951
mining is called a data warehouse. Data warehouses store historical
952
and current data and consist of tables of information that are
953
logically grouped together. The warehouse allows program and
954
financial data from different nonintegrated systems throughout an
955
organization to be captured and placed in a single database where
956
users can query the system for information. The information can
957
then be "mined" or searched according to specific criteria to
958
identify associations, sequences, patterns, and clusters between
959
different pieces of information-relationships that are often hidden
960
in separated databases.
961
As a tool in managing improper payments, applying data mining to
962
a data warehouse allows an organization to efficiently query the
963
system to identify questionable activities, such as multiple
964
payments for an individual invoice or to an individual recipient on
965
a certain date. This technique allows personnel who are not
966
computer specialists, but who may have useful program or financial
967
expertise, to directly access data, target queries, and analyze
968
results. Queries can also be made through data mining software,
969
which includes prepared queries that can be used in the system on a
970
regular basis.
971
IDPA began data mining in an effort to improve a system that was
972
too slow to provide the timely information needed for a wide range
973
of agency functions, including the prevention and detection of
974
overpayments. As of December 2000, the state had spent $29 million
975
to create a data warehouse to supplement the Medicaid Management
976
Information System (MMIS), which maintains data on Medicaid
977
providers and beneficiaries as well as claims and payments. The
978
data warehouse includes over 2,000 different fields/elements. The
979
results of data queries are particularly useful because the data
980
warehouse is able to store more current data than MMIS. At present,
981
there is a 1-month lag in current information, compared to the 3-
982
to 6-month lag that existed before IDPA began using data mining. In
983
addition, the data warehouse can now store up to 5 years of data,
984
and IDPA is currently weighing the costs and benefits of increasing
985
this to 10 years of data.
986
IDPA officials noted that using data mining allows them to
987
analyze large amounts of data. Because the large number of
988
transactions in the system precludes manually examining each
989
transaction for associations and patterns with other transactions,
990
data mining is an effective and efficient alternative. The IDPA
991
Office of Inspector General (OIG) also uses data mining to quickly
992
respond to requests for information for ongoing investigations from
993
the Federal Bureau of Investigation and the Illinois State
994
Police.
995
The IDPA OIG created the Fraud Science Team (FST), an
996
interdisciplinary team that includes an economist, program and
997
policy experts, and information specialists. FST maximizes the
998
value of the data warehouse by performing data mining activities
999
and providing a research-based approach to fraud prevention and
1000
detection. FST has produced documentation on over 800 fraud
1001
schemes, which it has categorized into 19 different types, such as
1002
billing for services not rendered and kickback schemes. The
1003
information on these schemes is used in the development and
1004
implementation of targeted analyses that are run against the data
1005
warehouse information to identify data relationships and anomalies,
1006
which are often signs of fraud. This information can also be used
1007
to implement specific controls in the system intended to prevent
1008
the identified types of fraud.
1009
During our visit, the IDPA OIG staff ran several queries and
1010
analyses. For example, one risk area identified was health care
1011
providers that were billing for services provided in excess of 24
1012
hours in a single day. With the capabilities of the data warehouse,
1013
OIG staff developed an analysis that identified 18 providers that
1014
had billed over 24 hours for at least 1 day during the 6 months
1015
ended December 31, 1999. A number of the identified providers were
1016
already under investigation for other program violations. As a
1017
result of this analysis, the OIG plans to refer serious cases to
1018
appropriate law enforcement agencies and take administrative action
1019
against the less serious violators.
1020
An early effort at using data mining software in Illinois has
1021
identified $1.7 million in potential overpayments.
1022
Before the data warehouse was available, obtaining responses to
1023
queries of this kind would have required obtaining separate reports
1024
from different systems and could have taken up to 2 months.
1025
However, during our visit querying the warehouse took from several
1026
seconds to a few minutes per query.
1027
New initiatives that Illinois expects will further improve data
1028
mining at IDPA are the development of a 3-day training course to
1029
help users properly structure queries and the use of data mining
1030
software. In an early effort using data mining software, IDPA OIG,
1031
as part of a partnership audit with HHS OIG, identified 232
1032
hospital transfers that are believed to have been miscoded as
1033
discharges, creating a potential overpayment of $1.7 million.
1034
The large number of computerized claims processed by Medicare
1035
also lends itself to the application of data mining techniques.
1036
Claims administration contractors at HHS' Centers for Medicare and
1037
Medicaid Services (formerly the Health Care Financing
1038
Administration) use data mining and statistical analysis as part of
1039
their postpayment review activities. Since 1993, CMS also has
1040
contracted with a specialized statistical analysis contractor to
1041
perform large-scale analysis of durable medical equipment claims.
1042
Data mining can identify many potentially inappropriate payments,
1043
but determining which ones are actual overpayments takes additional
1044
investigation. Currently, the contractors only have the resources
1045
to investigate situations in which the data indicate potential
1046
large-scale abusive practices.
1047
1048
Neural networking is a technique for extracting and
1049
analyzing data. In this case, the system analyzes associations and
1050
patterns among data elements, which allows it to find relationships
1051
that can result in new queries.
1052
A neural network is intended to simulate the way in which a
1053
brain processes information, learns, and remembers. A neural
1054
network is initially "trained" or fed large amounts of data and
1055
rules about data relationships (for example, "a person's
1056
grandfather is older than that person's father"). Neural networks
1057
"learn" by comparing new data with historical data and can be used
1058
to detect patterns that are difficult, and sometimes impossible, to
1059
detect without computer intervention in large volumes of data. The
1060
more data a neural network processes the better it performs (i.e.,
1061
the better it identifies the characteristics of potentially
1062
fraudulent payments). Based upon this knowledge, neural networks
1063
automatically alter their analytical processes to produce more
1064
accurate detection results.
1065
In 1997, the Texas legislature mandated the use of neural
1066
networks in the Medicaid program. After examining the results of a
1067
pilot test
1068
Texas' Medicaid Fraud and Abuse Detection System used neural
1069
networking to recover $3.4 million in fiscal year 2000.
1070
of neural networks conducted by the Comptroller's Office, Texas'
1071
Health and Human Services Commission (HHSC) responded to the
1072
legislation and implemented MFADS. The MFADS project was
1073
operational in January 1998 and combines both data mining and
1074
neural network capabilities.
1075
In Texas, models used with the neural network technology
1076
identify fraudulent patterns from large volumes of medical claims
1077
and patient and provider history data. For example, they can help
1078
identify perpetrators of both known and unknown fraud schemes
1079
through the analysis of utilization trends, patterns, and complex
1080
interrelationships in the data. The state currently has models for
1081
physician and dental providers and plans to initiate a model for
1082
pharmaceutical providers.
1083
HHSC awarded a contract for the development and operational
1084
support of MFADS. Annual contract costs range from $2.6 million to
1085
$3.1 million for contractor operations that include the development
1086
and ongoing support of the models. The Texas models are composed of
1087
500 to 600 variables and generate an annual report that identifies
1088
the potential unscrupulous providers and ranks the providers
1089
according to how questionable their billing patterns appear to be.
1090
The models detail the variances through graphs that compare amounts
1091
billed and services rendered (among others items) by the identified
1092
provider with the average of the other providers. For example, one
1093
dental provider was ranked third on a dental model listing due to
1094
unusual activity in areas such as multisurface restoration and root
1095
canal activities. An investigator, using MFADS, was able to run
1096
detailed reports on the provider's activity in the identified
1097
high-risk areas and determined that the combination of services
1098
provided, volume of services provided, and the recurring pattern of
1099
the services provided were indeed suspicious. Additionally, a
1100
dental consultant reviewed 100 of the provider's dental charts and
1101
determined that many of the services claimed were unnecessary. As a
1102
result, the provider agreed to a settlement and has repaid the
1103
identified overpayments of $162,000 plus other penalties.
1104
Additionally, the provider was excluded from the Medicaid program
1105
for 15 years.
1106
The results from both the data mining activities and the neural
1107
network reports are reviewed and possibly investigated to determine
1108
if the claims are fraudulent or the providers are unscrupulous.
1109
According to Texas officials, medical judgment is important when
1110
considering the accuracy of claims, and, as such, medical
1111
professionals assist in reviewing medical claims.
1112
Texas' HHSC prepares quarterly reports for the legislature's
1113
review. The Second Quarter Fiscal Year 2001 Contract Performance
1114
Report for the Medicaid Fraud and Abuse Detection System reported
1115
that it had identified 2,567 cases (representing over $6 million)
1116
for investigation in fiscal year 2000. As a result of investigating
1117
these cases, approximately $3.4 million has been recovered. These
1118
reports also show how HHSC is performing in relation to its
1119
performance measures. In fiscal year 2000, one of the performance
1120
measures was that total dollars identified for recoveries equal or
1121
exceed 139 percent ($3.7 million) of the fiscal year contract cost
1122
amount. HHSC exceeded its goal by identifying $6.1 million for
1123
recovery.
1124
1125
Recovery auditing is the practice of identifying and
1126
recovering overpayments that examines payment file information to
1127
identify possible duplicate or erroneous payments. For instance,
1128
vendors make pricing errors on their invoices, forget to include
1129
discounts that have been publicized to the general public, neglect
1130
to offer allowances and rebates, miscalculate freight charges, and
1131
so forth. In addition, the same invoices, or portions thereof,
1132
could be paid more than once. These mistakes, when not caught,
1133
result in overpayments. Recovery auditing can incorporate data
1134
mining techniques.
1135
While traditionally used as a technique to identify improper
1136
payments already made, organizations have also experienced success
1137
in using recovery auditing to analyze records prior to payment.
1138
Because it helps to prevent improper payments before they occur,
1139
this use of recovery auditing eliminates the costs associated with
1140
obtaining reimbursements for the erroneous payments or taking other
1141
actions needed to offset future payments by the amount of the
1142
improper payment.
1143
Recovery auditing started about 30 years ago, and it is used in
1144
several industries, including the automobile, retail store, and
1145
food service industries, and, to some extent, within the federal
1146
government. Some entities use their employees to analyze their
1147
payment records while others contract with recovery audit firms for
1148
the work. Contract firms often perform this work on a contingency
1149
fee basis, that is, they only receive compensation if they identify
1150
and recover amounts determined to be improper payments. As
1151
discussed below, recovery auditing, which has a long-standing track
1152
record in the private sector, offers an opportunity to identify
1153
improper payments before they occur and to identify and recover
1154
overpayments if they do occur.
1155
● One private sector company contracted, on a contingency fee
1156
basis, with a recovery audit firm for a review of its accounts
1157
payable files- files in which its systems' controls had not found
1158
errors. The review resulted in the recovery of $8 million in
1159
improper payments. The company recently began using recovery
1160
auditing techniques on accounts payable information to prevent
1161
improper payments before they occurred. It expected that this
1162
activity would identify possible duplicate payments, and the test
1163
verified the company's expectations. For example, during our visit,
1164
it identified and avoided a duplicate payment of $136,000 from the
1165
reports generated by the recovery audit
1166
A private sector companyrecovered $8 million in improper
1167
payments as a result of a recovery audit.
1168
software. In addition, as a result of using recovery auditing
1169
before payments are made, the company identified and stopped the
1170
processing of $41 million in wire payments that had already been
1171
processed. Another advantage of the recovery audit services used by
1172
the company is that the software identifies the employees who are
1173
making processing errors so that the company can take appropriate
1174
counseling and training action.
1175
● Another private sector company contracted with a recovery
1176
audit firm, on a contingency fee basis, to perform two separate
1177
reviews of its disbursements-the first review was for disbursements
1178
made from 1992 through 1995, and the second for disbursements made
1179
from 1996 through 1998. Both reviews identified duplicate payments
1180
and resulted in recovery actions and in changes to the payment
1181
system to help reduce future overpayments. For example, from 1996
1182
through 1998, the company processed about 9 million invoices. The
1183
recovery audit review of these invoices identified about $5 million
1184
in potential overpayments and resulted in actions to recover these
1185
funds, where appropriate. Further, based on an analysis of the
1186
overpayments identified, the company has implemented procedures
1187
that have reduced its dollar error rate per one million dollars of
1188
transactions from a reported $65 in 1992 through 1995 to a reported
1189
$34 dollars in 1996 through 1998. In addition, the company is now
1190
preparing to enter an agreement with the recovery audit contractor
1191
under which the recovery auditing software will be installed in the
1192
company's system, allowing its staff to perform the recovery audit
1193
function-even as part of the prepayment process.
1194
Recovery auditing is also being used to some extent in the
1195
federal government. For example, the Department of Veterans
1196
Affairs' (VA) Financial Services Center (FSC) in Austin, Texas, had
1197
contracted with recovery audit firms in the past, but now performs
1198
recovery auditing in-house using about three full-time employees to
1199
administer the program and one employee for software development.
1200
If a duplicate payment is identified, VA takes one of several
1201
actions, including canceling the transaction prior to payment,
1202
notifying Treasury to stop issuance of a check, or issuing a bill
1203
of collection. For example, FSC has identified over $2 million in
1204
overpayments and has collected, by either offsetting future
1205
payments or cash collection, nearly $300,000 for the first 6 months
1206
of fiscal year 2001. A FSC official noted that recovery auditing
1207
could be beneficial to almost any organization that makes
1208
payments.
1209
1210
Postaward audits of contracts are another technique that can
1211
help to combat improper payments and are used, to some degree,
1212
within the federal government. These audits verify that
1213
VA reported recoveries of $119 million from contract audits.
1214
payments are being made in accordance with contract terms and
1215
applicable regulations. They can detect improper payments that have
1216
been made, help avoid future payments of the same kind, and provide
1217
oversight of companies conducting business with the government. For
1218
example, in fiscal year 1993, the VA Office of Acquisition and
1219
Materiel Management partnered with the VA OIG and the VA Office of
1220
General Counsel to establish the VA Procurement Working Group
1221
(PWG). As a result, a Contract Review and Evaluation Division was
1222
established to provide audit and advisory services related to
1223
contracts awarded by contracting officers in VA's Office of
1224
Acquisition and Materiel Management. From 1993 through September
1225
2000, PWG reported recoveries resulting from postaward audits of
1226
contracts totaling about $119 million. This represents a reported
1227
return of $18 for every dollar spent in support of these audits.
1228
PWG attributes its success to the establishment of a knowledgeable
1229
and professional group of contract auditors in the pharmaceutical
1230
and medical/surgical supply industries. As a result of the audits
1231
and PWG's efforts, many contractors have voluntarily elected to
1232
perform internal reviews and have submitted 65 voluntary
1233
disclosures and refund offers to VA. Prior to 1993, VA received
1234
almost no voluntary disclosures. Some contractors have also
1235
developed and implemented corporate responsibility plans to ensure
1236
compliance with acquisition regulations and statutes.
1237
Illinois reports saving $12 for every dollar spent on fraud
1238
prevention investigations.
1239
1240
In 1996, IDPA established a Fraud Prevention Investigations
1241
Program (FPI) to prevent ineligible persons from receiving Food
1242
Stamps, TANF, and Medicaid. Under this program, case managers in
1243
the Illinois Department of Human Services (IDHS) refer applications
1244
that contain suspicious or conflicting information to IDPA's Bureau
1245
of Investigations (BOI) for action before benefit payments begin.
1246
Case managers use certain referral criteria, such as applications
1247
that contain contradictory information about household composition
1248
or employment, to identify these applications. BOI submits referred
1249
cases to a private investigation firm, under contract with the IDPA
1250
OIG, which investigates the information on the application. This
1251
investigation may consist of interviews; contacts with employers,
1252
landlords, or neighbors; or a visit to the applicant's home. The
1253
results are reported to BOI within 8 business days (5 business days
1254
for food stamps) and then to the local IDHS office for appropriate
1255
action- approval, denial, or reduction of benefits.
1256
The program was piloted in 1995 and was implemented in 1996,
1257
with five Cook County (Chicago) IDHS offices participating.
1258
Currently, all 23 IDHS local offices in Cook County participate in
1259
the program. FPI reports total savings, since program inception, of
1260
about $12 for every dollar spent.
1261
Specifically, in fiscal year 2000, FPI prevented $9.5 million in
1262
improper payments from being issued at a cost of $823,000. Savings
1263
are calculated based on the administrative and contract costs of
1264
the program as a percentage of gross savings and cost avoidance for
1265
cases that resulted in denied or reduced benefits.
1266
The preceding examples of control activities are meant to
1267
illustrate a sample of the type of activities that may be useful to
1268
agency managers. An agency's internal control activities should be
1269
flexible, weighing costs and benefits, to allow agencies to tailor
1270
control activities to fit their special needs. Once control
1271
activities are in place, the internal control cycle continues with
1272
the prompt communication of information that managers need to help
1273
them carry out these activities and run their operations
1274
efficiently and effectively.
1275
1276
Strategies to Consider-Control Activities
1277
In taking action to address identified risks, the following
1278
strategies should be considered:
1279
1280
1281
1282
based on an analysis of the specific risks facing the
1283
organization, and taking into consideration the nature of the
1284
organization and the environment in which it operates, determine
1285
which types of control activities would be most effective in
1286
addressing the identified risks;
1287
1288
1289
1290
where in-house expertise is not available, investigate
1291
the possibility of contracting activities out to firms that
1292
specialize in specific areas, such as recovery auditing and neural
1293
networking;
1294
1295
1296
1297
perform cost-benefit analyses of potential control
1298
activities before implementation to help ensure that the cost of
1299
those activities to the organization is not greater than the
1300
potential benefit control;
1301
1302
1303
1304
ensure that personnel involved in developing,
1305
maintaining, and implementing control activities have the requisite
1306
skills and knowledge, recognizing that staff expertise needs to be
1307
frequently updated in evolving areas such as information technology
1308
and fraud investigation; and
1309
1310
1311
1312
recognize and consider the importance of privacy and
1313
information security issues when developing and implementing
1314
control activities.
1315
1316
1317
1318
1319
1320
Information and Communications: Using and Sharing Knowledge to
1321
Manage Improper Payments
1322
Top-level agency officials, program managers, and others
1323
responsible for managing and controlling program operations need
1324
relevant, reliable, and timely financial and nonfinancial
1325
information to make operating decisions, monitor performance, and
1326
allocate resources. This information can be obtained from a variety
1327
of sources using a wide range of data collection methodologies. The
1328
organizations that participated in our study used internal and
1329
external sources to obtain needed information. Further, these
1330
sources varied widely, from information contained in multiple
1331
computer databases to periodic meetings of individuals to share
1332
information on emerging issues and other areas relevant to
1333
effective program operations.
1334
1335
The need for information and communication extends beyond
1336
organizational boundaries. Many of the governmental programs with
1337
improper payments are benefit programs that involve recipients and
1338
providers of services. Organizations in our study developed
1339
educational programs to assist these participants in understanding
1340
eligibility and other requirements and, for service providers,
1341
information on issues including common claim filing errors.
1342
Having information available to provide feedback to management
1343
on initiatives is necessary to adequately evaluate performance. At
1344
Centrelink in Australia, information showing achievement against
1345
key performance indicators (KPI) for compliance activity is
1346
provided to managers monthly, within 9 days of the end of the
1347
month. Information is provided about the number of compliance
1348
reviews (cases identified as high risk for incorrect payment)
1349
completed, savings, incorrect payments identified for recovery, and
1350
the level of incorrect payment. Information is also provided on
1351
prosecution activity. In addition, comparative information is made
1352
available so that the managers see how they are doing compared to
1353
other managers. While these reports are available within 9 days of
1354
the end of the reporting period, a database containing review
1355
information can be accessed within 48 hours. This enables managers
1356
to produce detailed, flexible, reports on-line. As a result
1357
"We are always working to achieve balance between program
1358
integrity and access to health care for recipients."
1359
Robb Miller, Inspector General, Illinois Department of Public
1360
Aid
1361
of having this timely information, managers can more effectively
1362
manage the resources available to them.
1363
Minimizing improper payments often requires the exchange of
1364
relevant, reliable, and timely information between individuals and
1365
units within an organization and with external entities with
1366
oversight and monitoring responsibilities. This can be achieved by
1367
establishing working groups. For example, in 1997 Illinois
1368
established its Medicaid Fraud Prevention Executive Workgroup. The
1369
purpose of the workgroup is to develop reasonable and prudent
1370
measures consistent with the provision of quality health care to
1371
combat fraud and abuse in the Medical Assistance Program.
1372
The workgroup has approximately 15 members from both the program
1373
and integrity sides of IDPA, including members from claims
1374
processing, technical support, budget and analysis, fraud research,
1375
investigations, information technology, and information systems.
1376
The cooperation between the program and the integrity divisions is
1377
the vehicle by which emerging issues are addressed. The group meets
1378
monthly to discuss the status of previously discussed and/or
1379
implemented initiatives and to propose and discuss current problems
1380
and potential initiatives. Topics discussed have resulted in
1381
ongoing changes to computer edits and policies, reflecting the
1382
dynamic nature of fraud.
1383
While timely, accurate, and reliable information is necessary
1384
for internal use, the organizations we visited stressed that
1385
communication with the public, benefit providers, and beneficiaries
1386
was also necessary. Educating the parties involved in the
1387
transaction reduces the risk of potential errors and strengthens
1388
joint responsibility and accountability of those involved.
1389
Texas considers the various forms of education to be
1390
costbeneficial in its Medicaid program. For example, in 1997 it
1391
implemented several initiatives to educate new providers before
1392
they enroll in the Texas Medicaid program. First, each new Medicaid
1393
provider receives a "Success with Medicaid" package containing
1394
information on claim filing, including helpful tips, and
1395
instructions on how to use the automated phone system for
1396
inquiries. This "welcome" package is hand delivered during a site
1397
visit by one of Texas' 19 Medicaid field representatives. Three
1398
months after enrollment, the field representatives evaluate a
1399
sample of each new provider's claims to see if there are any issues
1400
that should be discussed. Then, the same representative who made
1401
the initial visit revisits the new provider to answer questions and
1402
discuss any problems noted in the claims sample. In addition,
1403
program personnel conduct various workshops for and make
1404
educational materials available to new providers.
1405
In another example, Australia's Health Insurance Commission
1406
(HIC) implemented a feedback program to provide medical
1407
practitioners with regular information about their own benefit
1408
authorization, age and gender patient demographics, and comparative
1409
statistical information showing the number of services rendered and
1410
dollar value of benefits paid. All 32,000 practitioners receive
1411
correspondence once a year from HIC. The program's educational
1412
feedback encourages compliance and can act as a deterrent to future
1413
wrongdoing, as practitioners are aware that HIC tracks what is
1414
claimed for reimbursement on an annual basis. While, at first, most
1415
practitioners did not realize that HIC was able to accumulate and
1416
analyze this information, the program has now become both an
1417
effective deterrent and a desired source of information for the
1418
practitioners. For example, some practitioners have asked for
1419
additional information or statistics prior to the annual feedback
1420
report. In October 1999, the HIC Internet Feedback Reporting
1421
Facility was established to provide on-line feedback and statistics
1422
to general practitioners. About 2,100 general practitioners
1423
accessed their feedback reports on-line during 1999, and HIC
1424
implemented further enhancements to include feedback to other
1425
medical practitioners.
1426
Also in Australia, Centrelink has determined that 65 percent of
1427
its preventable incorrect payments
1428
13relate to incorrect declaration of income by the
1429
customer or beneficiary. Based on this risk assessment, Centrelink
1430
developed a range of specific prevention strategies aimed at
1431
educating beneficiaries and employers on income reporting
1432
requirements.
1433
These include
1434
● educating the beneficiaries on the correct way to declare
1435
earnings and reminding them of the consequences of failing to
1436
correctly declare earnings and
1437
● outreaching employers in industries whose employees are
1438
traditionally more likely to receive improper payments, such as
1439
those with seasonal or part-time employees.
1440
In the latter case, Centrelink provides these employers with
1441
materials to distribute to existing and new employees who are
1442
receiving benefits from Centrelink. For example, to encourage
1443
accurate income reporting, the employers distribute "payslips"
1444
envelopes to employees for their use in storing their wage
1445
records.
1446
In addition to working groups, coordination and cooperation with
1447
local law enforcement and other sources external to an agency can
1448
establish an infrastructure conducive to preventing and detecting
1449
fraud. Our case illustration shows the value of such an
1450
Centrelink defines all incorrect payments as preventable unless
1451
the payment is unavoidable, such as legislated advance payments.
1452
Furthermore, Centrelink categorizes preventable payments into three
1453
areas: preventable by the customer, preventable by staff, and
1454
preventable by the system. Centrelink reports $410 million to $460
1455
million in incorrect payments a year, of which 70 percent is
1456
classified as preventable payments.
1457
infrastructure in preventing large-scale Medicaid fraud
1458
perpetrators from receiving payment for fraudulent claims.
1459
1460
Effective communications should occur in a broad sense with
1461
information flowing down, across, and up the organization. In
1462
addition to internal communications, management should ensure there
1463
are adequate means of communicating with, and obtaining information
1464
from, external stakeholders that may have a significant impact on
1465
the agency achieving its goals. Moreover, effective information
1466
technology management is critical to achieving useful, reliable,
1467
and continual recording and communication of information. Program
1468
managers need operational and financial data to monitor whether
1469
they are meeting their agencies' strategic and annual performance
1470
plans and meeting their goals for accountability and effective use
1471
of resources. Monitoring strategies are discussed in the next
1472
section.
1473
1474
Strategies to Consider-Information and Communications
1475
To effectively use and share knowledge to manage improper
1476
payments, the following strategies should be considered:
1477
1478
1479
1480
determine what information is needed by managers to meet
1481
and support initiatives aimed at reducing improper
1482
payments;
1483
1484
1485
1486
ensure that needed information is provided to managers in
1487
an accurate and timely manner;
1488
1489
1490
1491
provide managers with timely feedback on applicable
1492
performance measures so they can use the information to effectively
1493
manage their programs;
1494
1495
1496
1497
develop educational programs to assist program
1498
participants in understanding program requirements;
1499
1500
1501
1502
ensure that there are adequate means of communicating
1503
with, and obtaining information from, external stakeholders that
1504
may have a significant impact on improper payment initiatives, such
1505
as periodic meetings with oversight bodies; and
1506
1507
1508
1509
develop working relationships with other organizations to
1510
share information and pursue potential instances of fraud or other
1511
wrongdoing.
1512
1513
1514
1515
1516
1517
Monitoring: Tracking the Success of
1518
Improvement Initiatives
1519
-We will want to know what action is being taken and what more
1520
could be done to get a grip on the burgeoning levels of fraud and
1521
inaccuracy in benefit claims."
1522
David Davis, Chairman of the Parliamentary Committee of Public
1523
Accounts, United Kingdom
1524
Monitoring performance, over time, is critical to program
1525
management and oversight. Evaluation of an organization's programs
1526
and its successes in meeting its established goals and in
1527
identifying additional actions is an integral element of
1528
performance measurement and continued improvement in operations.
1529
Monitoring focuses on the assessment of the quality of performance
1530
over time and on the prompt resolution of problems identified
1531
either through separate program evaluations or audits. Once an
1532
organization has identified its risks related to improper payments
1533
and undertaken activities to reduce such risks by upgrading its
1534
control activities, monitoring performance allows the organization
1535
to gauge how well its efforts are working.
1536
1537
In the United Kingdom, the Department for Work and Pensions
1538
(DWP) annually reviews its Income Support and Jobseeker's Allowance
1539
programs to estimate the level of fraud and error in the programs,
1540
measure progress toward meeting established performance goals, and
1541
report performance results to Parliament. As a result of the
1542
program monitoring and evaluation activities these reviews permit,
1543
the government has set new, more challenging targets for future
1544
performance.
1545
In addition, the National Audit Office (NAO) in the United
1546
Kingdom uses the review results in its annual audits of DWP's
1547
financial statements. NAO reviews DWP's sampling methodology and
1548
sample results, reviews some of the cases DWP examined, and selects
1549
its own sample to verify the accuracy of the reviews. The auditing
1550
standards issued by the United Kingdom's Audit Practices Board
1551
require NAO to plan and perform its audits to provide for
1552
reasonable assurance that the financial statements are "free from
1553
material misstatement, whether caused by error, or by fraud or
1554
other irregularity." Further, Her Majesty's Treasury requires
1555
disclosure in the notes to the financial statements on a cash basis
1556
of all instances of significant irregular expenditures arising from
1557
erroneous benefit awards and fraud by claimants. After considering
1558
the results of DWP's review and its evaluation of those results,
1559
NAO qualified its fiscal year 1995 through fiscal year 2000
1560
opinions on DWP's financial statements because of the amount of
1561
fraud and error in the benefit programs. NAO has also provided
1562
constructive advice on how DWP might improve its internal control
1563
and risk management procedures.
1564
-The probability of review should never be zero. Not for any
1565
provider, no matter how reputable; nor for any claim, no matter how
1566
small."
1567
Malcolm K. Sparrow, License to Steal; Why Fraud Plagues
1568
America's Health Care System, 1996
1569
Illinois assessed the risk of improper payments in its Medicaid
1570
program, and, based on the results, implemented initiatives
1571
designed to improve payment accuracy. To monitor the effects of the
1572
new initiatives, Illinois will use random claims sampling to test
1573
the accuracy of the payments by reviewing 150 randomly selected
1574
claims per month, or 1,800 per year. The goal of this project is to
1575
ensure that every paid claim faces an equal, random chance of
1576
review. The judgment of field staff, auditors, nurses, and policy
1577
experts will be used to determine if they are paid correctly. This
1578
approach not only provides periodic estimates of payment and
1579
service accuracy rates to help measure the results of existing
1580
enforcement and detection efforts, but also helps deter future
1581
erroneous and fraudulent billings.
1582
Performance measures are key to monitoring progress in
1583
addressing improper payments. New Zealand requires entities from
1584
which the government purchases a significant quantity of goods and
1585
services to include audited statements of objectives and statements
1586
of service performance with their financial statements. These
1587
statements include, where appropriate, performance measures related
1588
to improper payments. For example, performance measures relating to
1589
entitlement accuracy, services to reduce benefit crime, and debt
1590
management have been established for Work and Income New Zealand
1591
(WINZ), a government agency that provides income support and/or
1592
employment assistance to eligible people. WINZ's financial
1593
statements are the main accountability reports used by Parliament
1594
to monitor the agency's performance. In addition, Parliament uses
1595
the audited information to make informed decisions on resource
1596
allocation, and, through a Public Service Monitoring Body (the
1597
State Services Commission), to hold the entity's chief executive
1598
officer responsible if performance standards are not met. For
1599
example, the government, in its role as purchaser, can offer
1600
rewards and apply sanctions to a chief executive officer to ensure
1601
performance. In addition, the government may seek to purchase goods
1602
and services from more than one source.
1603
WINZ's monitoring of its payment accuracy is discussed further
1604
in the case illustration on the following page.
1605
1606
1607
Monitoring the activities used by an organization to address
1608
improper payments should be performed continually and should be
1609
ingrained in the entity's operations. Ongoing monitoring enables an
1610
organization to measure how well it is doing, track performance
1611
measures, and adjust control activities based on the results of
1612
monitoring activities. The monitoring process should also include
1613
policies and procedures for ensuring that the results of the
1614
reviews are communicated to the appropriate individuals within the
1615
organization so that they can be promptly resolved.
1616
1617
1618
Strategies to Consider-Monitoring
1619
1620
To track the success of improvement initiatives, the following
1621
strategies should be considered:
1622
1623
1624
1625
establish agency-specific goals and measures for reducing
1626
improper payments;
1627
1628
1629
1630
using baseline information for comparison, periodically
1631
monitor the progress in achieving the established performance
1632
measures;
1633
1634
1635
1636
make the results of performance reviews widely available
1637
to permit independent evaluations of the success of efforts to
1638
reduce improper payments;
1639
1640
1641
1642
ensure timely resolution of problems identified by audits
1643
and other reviews; and
1644
1645
1646
1647
adjust control activities, as necessary, based on the
1648
results of monitoring activities.
1649
1650
1651
1652
1653
1654
Observations
1655
Our study identified many techniques and approaches that
1656
organizations have used and found effective in reducing their
1657
levels of improper payments that could be used by federal agencies
1658
to help reduce improper payments in their programs. The techniques
1659
and approaches shared a common focus of improving the internal
1660
control systems over the problem areas and generally included
1661
actions in five areas-control environment, risk assessment, control
1662
activities, information and communications, and monitoring. Our
1663
observations on the key factors for successful actions in each of
1664
these areas follow.
1665
In the area of control environment, we found that, for improper
1666
payment initiatives to be successful, setting the tone at the top
1667
is critical. The pressures applied by top management and oversight
1668
entities are instrumental in clearly defining and communicating the
1669
need for improved program operations and, most important, in
1670
redefining the organizational culture. The goals and objectives of
1671
the initiatives being implemented must be transparent to all in the
1672
organization. Without ongoing strong support, both in spirit and in
1673
action, of top-level program officials and legislative bodies, the
1674
chances for success in implementing the changes needed to address
1675
improper payments are slim. This top-level support is especially
1676
critical given that an investment of time and money is often needed
1677
in these types of efforts.
1678
One of the biggest hurdles that many entities face in the
1679
process of managing improper payments is overcoming the propensity
1680
toward denial of the problem. It is easy to rationalize avoiding or
1681
deferring taking action to address a problem if you do not know how
1682
big the problem is. The nature and magnitude of the
1683
problem-determined through a systematic risk assessment
1684
process-needs to be determined and openly communicated to all
1685
relevant parties. When this occurs, especially in a strong control
1686
environment, denial is no longer an option, and managers have the
1687
information, as well as the incentive, to begin addressing improper
1688
payments. This risk assessment is used to determine where risks
1689
exist, what those risks are, and the potential or actual impact of
1690
those risks on program operations. As such, it helps identify the
1691
areas most in need of corrective action and helps form a basis for
1692
determining how to allocate resources, human and monetary, to the
1693
problem areas. By performing risk assessments on a recurring basis,
1694
organizations also obtain information on the status of their
1695
efforts to reduce improper payments and on areas needing further
1696
attention.
1697
In the area of control activities, we found that organizations
1698
need to tailor their actions to fit their particular needs. There
1699
is a wide range of activities that can be used to effectively
1700
address improper payments. These include the use of
1701
computer-assisted activities ranging from simple comparative
1702
analyses (e.g., comparing beneficiaries with mortality rolls) to
1703
the use of sophisticated computer models for interactive analysis
1704
of large amounts of information (e.g., using neural networking to
1705
identify suspicious patterns of payments). Regardless of the level
1706
of sophistication involved, the key to success is having the right
1707
people perform the right jobs. While these technology-based
1708
solutions can be expensive, such investments usually more than pay
1709
for themselves in terms of dollars saved. They also can be a
1710
significant deterrent and provide for a level of program integrity
1711
that could not otherwise be achieved.
1712
When obtaining, storing, and using computer-generated
1713
information, an organization must always be mindful of privacy and
1714
security issues. In the federal arena, including federal programs
1715
managed by state organizations, computer-assisted activities must
1716
be implemented consistent with all protections of the Privacy Act
1717
of 1974, as amended by the Computer Matching and Privacy Protection
1718
Act of 1988, and other privacy statutes.
1719
We also found that organizations use both computer-generated
1720
information and nontechnical methods to obtain, summarize, and
1721
communicate information needed to evaluate program performance.
1722
Whatever method is used, the flow of relevant, reliable, and timely
1723
information regarding performance should lead to improved
1724
performance, particularly if an atmosphere of healthy competition
1725
is introduced into the process.
1726
Educational activities for both beneficiaries and other program
1727
participants also serve as an effective communication approach to
1728
help reduce improper payments and strengthen program operations.
1729
The better educated agency employees, contractors, and
1730
beneficiaries are about what is expected of them and the
1731
consequences of not meeting those expectations, the greater the
1732
chances for reducing fraud and errors in the payment process.
1733
Another key point is that just putting control activities in
1734
place is not the end of the process-monitoring progress and results
1735
is essential and must include the involvement of top-level
1736
officials. In addition to monitoring day-to-day performance, it is
1737
important for an organization to track performance over time and
1738
measure it against established performance goals or indicators.
1739
This monitoring activity provides information on the effectiveness
1740
of the control activities implemented and helps oversight and
1741
top-level management officials identify areas needing further
1742
attention or a shift in focus.
1743
High levels of improper payments need not and should not be an
1744
accepted cost of running federal programs. The organizations that
1745
participated in our study found they could effectively and
1746
efficiently manage improper payments by (1) changing their
1747
organizations' control environments or cultures, (2) performing
1748
risk assessments, (3) implementing activities to reduce fraud and
1749
errors, (4) providing relevant, reliable, and timely information
1750
and communication of results to management, and
1751
(5) monitoring performance over time.
1752
In the federal government, implementation of this process will
1753
likely not be easy or quick. It will require strong support, not
1754
just in words but in actions, from the President, the Congress,
1755
top-level administration appointees, and agency management
1756
officials. Once committed to a plan of action, they must remain
1757
steadfast supporters of the end goals and their support must be
1758
transparent to all.
1759
Further, there must be a willingness to dedicate the human
1760
capital and monetary resources needed to implement the changes. In
1761
the human capital area, this could involve performing needs
1762
assessments and taking the actions necessary to hire individuals
1763
with the skills and knowledge necessary to turn the planned actions
1764
into reality. Regarding funding, many actions that proved
1765
successful to the organizations in our study involved
1766
computer-assisted analyses of data. Effectively and efficiently
1767
implementing some of these practices could require funding for
1768
computer software and hardware, additional staff, and/or
1769
training.
1770
In addition, it is important that the results of the actions
1771
taken be openly communicated or available not only to the Congress
1772
and agency management, but also to the general public. This
1773
transparency demonstrates the importance that the government places
1774
on the need for change and openly communicates performance results.
1775
It also acts as an incentive for agencies to be ever vigilant in
1776
their efforts to address the wasteful spending that results from
1777
lapses in controls that lead to improper payments.
1778
Appendix I
1779
1780
1781
Objectives, Scope, and Methodology
1782
The objectives of this study were to identify effective
1783
practices and provide case illustrations and other information for
1784
federal agencies' consideration when developing strategies and
1785
planning and implementing actions to manage improper payments. In
1786
performing this study, we conducted extensive research and
1787
identified three federal agencies, three state governments, three
1788
foreign countries, and three private sector companies that took
1789
actions that they considered effective in reducing improper
1790
payments in their programs.
1791
In general, for the organizations that participated in this
1792
study, we
1793
(1) conducted extensive Internet and literature searches to
1794
identify actions that each had taken to reduce improper payments,
1795
(2) made site visits to interview representatives involved in
1796
identifying and taking actions to reduce improper payments, and (3)
1797
obtained and reviewed organization reports and other documentation
1798
describing the actions taken, the results of those actions, and
1799
future plans in the area.
1800
As outlined below, we used several techniques to identify the
1801
study participants.
1802
1803
Federal Agencies
1804
We formed a focus group within GAO that was composed of program
1805
and financial analysts familiar with each federal agency. This
1806
group identified agencies that had implemented practices to reduce
1807
improper payments. Additionally, we contacted the inspectors
1808
general of the 24 Chief Financial Officers (CFO) Act agencies to
1809
obtain their views on agency activities, if any, designed to reduce
1810
improper payments. Once we identified potential participants, we
1811
conducted extensive Internet searches of their Web sites and
1812
reviewed entity and GAO audit reports and other documents to obtain
1813
background and other information for potential best practice
1814
efforts. We then contacted three agencies, discussed our study
1815
objectives and planned approach, and asked each if it had any
1816
programs in which actions to reduce improper payments were
1817
effective. Representatives at the three agencies (the Department of
1818
Veterans Affairs, the Social Security Administration, and the
1819
Department of Health and Human Services' Centers for Medicare and
1820
Medicaid Services (formerly the Health Care Financing
1821
Administration) identified programs in which their organizations
1822
had taken actions considered effective and agreed to
1823
participate.
1824
1825
1826
State Governments
1827
We conducted extensive Internet searches for all 50 states to
1828
identify reports and other studies that identified states that had
1829
taken actions that appeared to identify and reduce improper
1830
payments. We also coordinated with other GAO representatives to
1831
identify states that had taken actions to reduce improper payments
1832
in federal programs in which program management is a state
1833
responsibility, such as the Food Stamp program. Based on the
1834
information obtained, we asked representatives in the states of
1835
Illinois, Kentucky, and Texas if they had any activities that they
1836
believed were effective in reducing improper payments. Each
1837
identified some actions and agreed to participate in the study.
1838
1839
1840
Private Sector Organizations
1841
We contacted the Private Sector Council, a public service
1842
organization that assists in the sharing of knowledge between the
1843
private and public sectors. Through this organization, three
1844
companies volunteered to participate in our study and supplied us
1845
with information on the techniques they used and considered
1846
effective in reducing improper payments.
1847
1848
1849
Foreign Governments
1850
Our External Liaison Office contacted our counterparts in 12
1851
countries and two world organizations to explain our study
1852
objective and ask for input on activities, if any, each had taken
1853
to reduce improper payments in its programs. We also conducted
1854
extensive Internet searches to identify programs in each of these
1855
entities in which actions had been taken to reduce improper
1856
payments. Based on the responses from our initial requests for
1857
information from the countries and organizations and our Internet
1858
search results, we selected three countries (Australia, New
1859
Zealand, and the United Kingdom) as possible study participants. We
1860
contacted representatives for each, and they agreed to
1861
participate.
1862
In the course of identifying actions that possible participants
1863
in our study had taken to reduce improper payments, we identified
1864
numerous Web sites that might provide organizations with useful
1865
information that they can consider when attempting to address
1866
improper payment or other problems in their programs. Appendix III
1867
lists these resources.
1868
We conducted our fieldwork from May 2000 through March 2001. We
1869
asked officials of the various organizations highlighted in the
1870
case illustrations and throughout the report to verify the accuracy
1871
of the information presented on their activities and incorporated
1872
their comments as appropriate. We did not independently verify the
1873
accuracy of that information. In addition, we issued an exposure
1874
draft of this executive guide to obtain comments from interested
1875
parties including members of the CFO and OIG community, OMB, and
1876
selected professional organizations in the United States and
1877
abroad. We incorporated comments as appropriate.
1878
Appendix II
1879
1880
1881
1882
Entity Descriptions
1883
This appendix provides descriptions of the foreign governments'
1884
agencies and U.S. federal agencies, state governments, and private
1885
sector organizations that participated in this study. For our
1886
study, we contacted and visited various people from the listed
1887
organizations who spent many hours planning and hosting our visits,
1888
coordinating meetings, and preparing and presenting information. We
1889
thank them for their willingness to participate in our study, for
1890
the valuable information and insights they provided, and for their
1891
hospitality.
1892
1893
Foreign Governments
1894
Several agencies responsible for delivering a variety of
1895
government services in Australia, New Zealand, and the United
1896
Kingdom participated in our study. The government services provided
1897
by the agencies range from providing audit oversight and tax
1898
collection activities to benefit administration and benefit
1899
payments.
1900
1901
1902
Australia
1903
The Australian Federation has a three-tier system of government,
1904
under the provisions of a written constitution that includes the
1905
legislative, executive, and judicial branches of government at both
1906
the national and state levels. The division of powers between the
1907
federal and state parliaments broadly follows the American
1908
model-states and territories are responsible for matters not
1909
assigned to the federal government. Australia is an independent
1910
nation and retains constitutional links with Queen Elizabeth II of
1911
Great Britain who is Queen of Australia. A Minister of State is
1912
accountable to Parliament for each department's functions and
1913
activities. Under the Minister is the head of a department, usually
1914
referred to as the Secretary.
1915
Centrelink
1916
Centrelink is a "one-stop shop" that pays a variety of
1917
Australian government benefits. Centrelink is an agency not
1918
individually funded by the Treasury, but rather through business
1919
partnership agreements with government departments. The agency has
1920
agreements with 11 government departments, including the Department
1921
of Family and Community Services (FACS); the Department of
1922
Employment, Workplace Relations and Small Business; the Department
1923
of Veterans' Affairs; and the Department of Education, Training and
1924
Youth Affairs. The one-stop shop was formed by merging functions
1925
and staff from the social security and employment departments with
1926
strong support from the Department of Finance. It is in the top 100
1927
of Australian companies in terms of size and turnover. Its budget
1928
is $818 million, and it distributes $22.4 billion social security
1929
payments on behalf of FACS.
1930
14Centrelink has 6.1 million customers, pays
1931
9.2 million individual entitlements each year, and employs a
1932
staff of 22,000 in 1,000 service delivery locations across
1933
Australia.
1934
Health Insurance Commission
1935
The Health Insurance Commission (HIC) is a government agency
1936
that administers Australian health programs such as Medicare and
1937
the Pharmaceutical Benefits Scheme. In addition to administering
1938
these programs, HIC is charged with preventing and detecting fraud
1939
and abuse. Medicare is a universal health insurance scheme
1940
available to all Australian citizens. From 1999 through 2000, HIC
1941
paid over $3.5 billion in benefits, processing over 209 million
1942
claims to 11 million active enrollees in Medicare. Through the
1943
Pharmaceutical Benefits Scheme during the same year, HIC processed
1944
over 149 million claims totaling over $1.8 billion in benefits.
1945
1946
1947
New Zealand
1948
New Zealand is an independent nation within the British
1949
Commonwealth. Queen Elizabeth II of Great Britain is represented in
1950
New Zealand by the Governor-General. New Zealand has no written
1951
constitution but rather it has two documents of importance-the
1952
Treaty of Waitangi and the Bill of Rights Act. Much of the business
1953
of government is performed by ministries, government departments,
1954
and other government agencies, which are collectively known as the
1955
public sector.
1956
Inland Revenue Department
1957
The Inland Revenue Department (IRD) provides tax services as
1958
well as social policy services, including the administration of
1959
child support and family assistance programs and the collection of
1960
student loan repayments. IRD revenues include $7 billion in
1961
individual taxes, $3.76 billion in Goods and Services Tax revenue,
1962
and $1.85 billion in company tax. Total tax revenue in 1999 was
1963
$13.5 billion. During the 1999/2000 year, IRD processed 7.2 million
1964
tax returns. Additionally, IRD processed 7.3 million payments
1965
during the same year.
1966
Work and Income New Zealand
1967
The Department of Work and Income New Zealand (WINZ) is a
1968
government agency that aids job seekers, pays income support, and
1969
administers superannuation (retirement) payments and student loans
1970
and allowances. WINZ was established in 1998 by combining the
1971
income support function from the Department of Social Welfare and
1972
the employment services and local employment coordination functions
1973
from
1974
Amounts included in this report have been converted to U.S.
1975
dollars using the following exchange rates, effective April 16,
1976
2001, for one U.S. dollar: 0.697064 British pounds, 1.95665
1977
Australian dollars, and 2.43533 New Zealand dollars.
1978
the Department of Labor. Total benefits
1979
exceed $5.34 billion in transfer payments to
1980
● over 460,000 seniors for superannuation and transitional
1981
retirement
1982
benefits payments, ● over 404,000 people for income support
1983
payments,
1984
1985
1986
1987
approximately 56,000 students for student allowances,
1988
and
1989
1990
1991
1992
approximately 143,000 students for student
1993
loans.
1994
1995
1996
1997
1998
United Kingdom
1999
The United Kingdom is a constitutional monarchy and
2000
parliamentary democracy under Queen Elizabeth II and two houses of
2001
Parliament-the House of Lords and the House of Commons. The
2002
executive power rests with the Cabinet, headed by the Prime
2003
Minister.
2004
National Audit Office
2005
The National Audit Office (NAO) scrutinizes public spending on
2006
behalf of Parliament. It is an independent body that audits the
2007
accounts of all government departments and agencies, as well as a
2008
wide range of other public bodies, and reports to Parliament on the
2009
economy, efficiency, and effectiveness of government agencies.
2010
NAO is headed by the Comptroller and Auditor General, who is
2011
also an officer of the House of Commons. NAO employs 750 people in
2012
offices throughout the United Kingdom.
2013
Department for Work and Pensions
2014
The Department for Work and Pensions (formerly the Department of
2015
Social Security) administers the United Kingdom's welfare programs
2016
through four agencies-the Benefits Agency, Child Support Agency,
2017
War Pensions Agency, and Appeals Service Agency. The Benefits
2018
Agency administers programs such as Income Support and Jobseeker's
2019
Allowance Benefits. The Benefits Agency employs about 71,000 people
2020
and delivers more than 20 social security benefits, making payments
2021
in excess of $156 billion each year.
2022
Federal Agencies
2023
2024
2025
Department of Health and Human Services-Centers for Medicare
2026
and Medicaid Services
2027
The Department of Health and Human Services (HHS) is the U.S.
2028
government's principal agency for protecting the health of all
2029
Americans and providing essential human services. In addition to
2030
the Medicare and Medicaid programs, the department includes more
2031
than 300 programs, covering a wide spectrum of activity from
2032
medical research, financial assistance to low-income families, to
2033
substance abuse treatment and prevention programs.
2034
The Centers for Medicare and Medicaid
2035
Services (CMS) (formerly the Health Care Financing Administration),
2036
one of HHS' operating divisions, administers both the Medicare and
2037
Medicaid programs, which provide health care to about one in every
2038
four Americans.
2039
Medicaid
2040
Medicaid, established in 1965 by Title XIX of the Social
2041
Security Act, is a federal-state matching entitlement program that
2042
pays for medical assistance for certain vulnerable and needy
2043
individuals and families with low incomes and resources. In fiscal
2044
year 2000, it provided health care assistance to an estimated 33
2045
million persons, at a cost of about $118.6 billion to the federal
2046
government. CMS is responsible for the overall management of
2047
Medicaid; however, each state is responsible for managing its own
2048
program. Within broad federal statutory and regulatory guidelines,
2049
each state (1) establishes its own eligibility standards,
2050
(2) determines the types and ranges of services, (3) sets the
2051
rate of payment for services, and (4) administers its own
2052
program.
2053
Medicare Fee-for-Service
2054
Authorized by Title XVIII of the Social Security Act in 1965,
2055
Medicare is the nation's largest health insurance program handling
2056
more than 900 million claims per year on behalf of elderly and
2057
disabled individuals at a cost of about $214.6 billion in fiscal
2058
year 2000. Fee-for-service payments account for about $173.6
2059
billion of Medicare payments. CMS contracts with over 50 insurance
2060
companies to process fee-for-service claims; however, CMS is
2061
responsible for overseeing these contractors and for ensuring that
2062
claims are paid accurately and efficiently.
2063
2064
2065
Social Security Administration
2066
In 1935, the Social Security Act established a program to help
2067
protect aged Americans against the loss of income due to
2068
retirement. Since that time, various amendments were added,
2069
creating the programs that the Social Security Administration (SSA)
2070
administers today. Established in 1994 as an independent agency
2071
within the U.S. government, SSA is responsible for administering
2072
the Old Age and Survivors Insurance (OASI) and Disability Insurance
2073
(DI) programs as well as the Supplemental Security Income (SSI)
2074
program. SSA's organization features centralized management of the
2075
programs and a decentralized nationwide network of 10 regional
2076
offices overseeing 1,340 field offices, 138 hearings offices, 36
2077
teleservice centers, 7 processing centers, and 1 data operations
2078
center. OASI provides for the protection from loss of income for
2079
aged Americans as well as survivors of deceased workers. OASI had
2080
fiscal year 2000 outlays of about $347.9 billion, with about 39
2081
million beneficiaries. DI protects disabled workers and their
2082
dependents from loss of income, and had fiscal year 2000 outlays of
2083
$54.2 billion, serving about 6.6 million beneficiaries. Workers are
2084
considered disabled if they have severe physical or mental
2085
conditions that prevent them from engaging in substantial gainful
2086
activity.
2087
SSI had outlays of $30.8 billion in fiscal
2088
year 2000, providing cash assistance to about 6.6 million
2089
financially needy individuals who are elderly, blind, or
2090
disabled.
2091
2092
2093
Department of Veterans Affairs
2094
In 1930, the Congress consolidated and coordinated various
2095
veterans' programs with the establishment of the Veterans
2096
Administration. It became a cabinet-level position in March
2097
1989-the Department of Veterans Affairs (VA). VA administers the
2098
laws providing benefits and other services to veterans and their
2099
dependents and beneficiaries. Through 21 organizations, including
2100
the Veterans Health Administration and the Veterans Benefits
2101
Administration, VA ensures that veterans receive medical care,
2102
benefits, and social support. Major programs of VA include medical
2103
care, education, research, compensation, pension, education, and
2104
burial. In fiscal year 2000, more than 3.8 million patients used VA
2105
health care, over 2.6 million veterans and family members received
2106
monthly VA disability compensation payments, and nearly 2.4 million
2107
graves were maintained at national cemeteries.
2108
2109
2110
State Governments
2111
The state agencies that participated in our study are
2112
responsible for administering a variety of benefit programs in
2113
Illinois, Kentucky, and Texas.
2114
2115
2116
State of Illinois
2117
The Illinois Department of Human Services (IDHS) was created in
2118
1997 by consolidating three human services agencies, one of which
2119
was the Illinois Department of Public Aid (IDPA), and parts of
2120
three others. IDHS assumed the responsibility for administering
2121
cash assistance, food stamps, and Medicaid eligibility programs.
2122
However, IDPA retains most of the responsibility for administering
2123
Medicaid. IDPA has an Office of Inspector General (OIG) that helps
2124
enforce policies and investigates misconduct in the Medicaid, Food
2125
Stamp, and welfare programs administered by IDPA and IDHS. IDPA OIG
2126
includes a staff of 311 employees, and, in fiscal year 2000, it
2127
operated under a budget of $19.6 million and collected or avoided
2128
costs totaling $38.3 million. According to preliminary fiscal year
2129
2000 data, Illinois' Food Stamp program provided approximately $777
2130
million in benefits to over 779,000 recipients. In fiscal year
2131
1999, Illinois spent approximately $390 million of its Temporary
2132
Assistance for Needy Families (TANF) funds. In fiscal year 1998,
2133
Illinois spent approximately $6.2 billion for Medicaid covering
2134
over 1.3 million recipients.
2135
2136
2137
Commonwealth of Kentucky
2138
Kentucky's Cabinet for Families and Children protects and
2139
promotes the well being of Kentuckians by delivering quality human
2140
services. It administers the state's human services programs, such
2141
as Food Stamps, foster care, disability, and cash assistance.
2142
Meanwhile, the state's Cabinet for Health Services administers
2143
programs to promote mental and physical health, emphasizing
2144
education and prevention. It administers Medicaid through the
2145
Department of Medicaid Services. According to preliminary fiscal
2146
year 2000 data, Kentucky's Food Stamp program provided
2147
approximately $337 million in benefits to over 403,000 recipients.
2148
In fiscal year 1999, Kentucky spent approximately $82 million of
2149
its TANF funds. In fiscal year 1998, Kentucky spent approximately
2150
$2.4 billion for Medicaid covering over 644,000 recipients.
2151
2152
2153
State of Texas
2154
Texas has a number of departments involved in the administration
2155
of its medical and general assistance programs. Its Health and
2156
Human Services Commission (HHSC), which provides overall leadership
2157
and strategic direction to the health and human services system in
2158
Texas, oversees the work of 13 state agencies, including the Texas
2159
Department of Health (TDH) and the Texas Department of Human
2160
Services (TDHS). TDH administers more than 200 separate programs
2161
and operational units, including Medicaid. This department has more
2162
than 5,500 employees and an annual appropriation of approximately
2163
$6.5 billion. TDHS administers state and federal human services
2164
programs, including TANF and the Food Stamp program, to more than 2
2165
million needy, elderly, or disabled Texans each month. As one of
2166
the largest human services agencies in the country, TDHS employs
2167
more than 15,000 and has an annual budget of $3.5 billion.
2168
According to fiscal year 2000 data, Texas' Food Stamp program
2169
provided approximately $1.2 billion in benefits to over 1.3 million
2170
recipients. In addition, Texas spent approximately $228 million of
2171
its TANF funds in serving more than 300,000 recipients. In fiscal
2172
year 1998, Texas spent approximately $7.1 billion for Medicaid
2173
covering over 2.3 million recipients.
2174
Private Sector Companies
2175
2176
2177
Private Sector Council
2178
The Private Sector Council (PSC) is a nonprofit, nonpartisan
2179
public service organization committed to assisting the federal
2180
government in improving its efficiency, management, and
2181
productivity. Since its founding in 1983, PSC has continued to
2182
promote and further the notion that private sector "know-how" can,
2183
and should, be utilized to assist in solving public sector
2184
challenges by supplying federal managers with modern ideas,
2185
methodologies, and applications through over 300 projects. Member
2186
companies consist of prominent Fortune 500 companies from across
2187
North America, including telecommunications, defense, finance, and
2188
energy businesses. PSC assembled three volunteer companies to
2189
participate in our study. These companies included a
2190
telecommunications company with $33.6 billion in fiscal year 2000
2191
sales, a document management company with $18.6 billion in fiscal
2192
year 2000 sales, and a consulting firm with $1.95 billion in
2193
revenues.
2194
Appendix III
2195
2196
2197
2198
Other Resources
2199
We identified the following Web sites during the course of our
2200
work, which may be useful to organizations as sources of additional
2201
information.
2202
2203
Best Practice Web Sites
2204
Best Practices in the Federal Government
2205
2206
http://hydra.gsa.gov/fitec/bestprac.htm
2207
2208
The CFO Electronic Commerce Task Force has created an
2209
interagency team, the Financial Implementation Team for Electronic
2210
Commerce (FITEC), to help create integrated strategies, execution
2211
plans, and schedules for achieving the federal CFO financial
2212
community's electronic commerce goals. This site, created by FITEC,
2213
provides agencies with a resource for locating financial and/or
2214
electronic commerce practices that can be used throughout the
2215
federal government.
2216
The Cabinet Office
2217
2218
2219
www.cabinet-office.gov.uk/servicefirst/index/guidhome.htm
2220
2221
The United Kingdom's Cabinet Office works in partnership with
2222
other parts of the central government, local government, and other
2223
bodies in the public and private sectors to modernize and
2224
coordinate government in order to secure excellence in policymaking
2225
and responsive, high-quality public services. The Cabinet Office's
2226
best practices site includes a best practice database, best
2227
practice guides, best practice links, and different forums
2228
organizations can use to share information on their various
2229
initiatives.
2230
National Association of State Procurement Officials
2231
2232
www.naspo.org
2233
2234
The National Association of State Procurement Officials is a
2235
nonprofit association dedicated to strengthening the procurement
2236
community through education, research, and communication. Under its
2237
"Whitepapers" section, this site includes a "Best Practices
2238
Compendium" that lists innovative procurement practices in state
2239
government.
2240
Organisation for Economic Co-operation and Development
2241
2242
www.oecd.org/puma/focus/compend/matrixframe.htm
2243
2244
The Organisation for Economic Co-operation and Development
2245
provides a setting in which 30 member countries can discuss,
2246
develop, and perfect economic and social policy. Countries can
2247
compare experiences, seek answers to common problems, and work to
2248
coordinate domestic and international policies. This site provides
2249
examples of public management initiatives in a variety of areas,
2250
including ethics, performance management, and regulatory
2251
reform.
2252
2253
2254
Award Winners
2255
Government Technology Leadership Awards
2256
2257
www.govexec.com/tech/award
2258
2259
Government Executive magazine annually presents Government
2260
Technology Leadership Awards to recognize federal agencies and
2261
state governments for their excellent performance with information
2262
technology programs. This site includes a list of all award winners
2263
and a searchable database of Government Executive articles.
2264
National Association of State Information Resource
2265
Executives
2266
2267
www.nasire.org/awards/index.cfm
2268
2269
The National Association of State Information Resource
2270
Executives (NASIRE) represents state chief information officers
2271
(CIO) and information resource executives who share a mission to
2272
shape national information technology policy through collaborative
2273
partnerships, information sharing, and knowledge transfer. Each
2274
year, NASIRE presents Recognition Awards for Outstanding
2275
Achievement in the Field of Information Technology to those
2276
programs and systems that have created cost-effective, innovative
2277
solutions in the operation of state government. This site provides
2278
a list of award winners.
2279
2280
2281
Publications
2282
CIO Magazine
2283
2284
www.cio.com
2285
2286
CIO magazine aims to provide actionable insight and decision
2287
support for information technology and business executives so that
2288
they may use information technology to obtain a competitive
2289
advantage. This Web site includes discussion forums, research
2290
centers on topics such as leadership and management and data
2291
warehouses, and a searchable database.
2292
Federal Computer Week
2293
2294
www.fcw.com
2295
2296
Federal Computer Week (FCW) is directed toward users and buyers
2297
of federal information technology. It focuses on desktop,
2298
client/server, and enterprisewide computing. This site can be used
2299
to access previous FCW articles, which can be searched by topic or
2300
by keyword.
2301
Government Executive Magazine
2302
2303
www.govexec.com
2304
2305
Government Executive magazine provides daily news for federal
2306
managers and executives. This site provides information about the
2307
Government Performance and Results Act, as well as links to
2308
research reports and organizations. In addition, articles from past
2309
issues can be searched by keyword.
2310
Government Technology Magazine
2311
2312
www.govtech.net
2313
2314
Government Technology magazine is dedicated to providing
2315
government executives with key information they need to succeed in
2316
running modern government. This site provides a solution center
2317
containing best practices and case studies in state and local
2318
government.
2319
2320
2321
Other Bookmarks
2322
Australian National Audit Office
2323
2324
www.anao.gov.au
2325
2326
The Australian National Audit Office (ANAO) is a specialist
2327
public sector entity providing a full range of audit services to
2328
Parliament and Commonwealth public sector agencies and statutory
2329
bodies. ANAO's site includes links to its various publications,
2330
including its audit reports and better practice guides. These
2331
publications can be searched by title, theme, or date.
2332
2333
2334
2335
C.A.
2336
MacDonald & Associates
2337
2338
2339
www.camacdonald.com
2340
2341
2342
2343
C.A.
2344
MacDonald & Associates, a health and human services
2345
consulting company, was established in 1993 to assist policy
2346
developers and decisionmakers in government in achieving their
2347
program and service goals. This site allows users to read the
2348
company's public reports that relate to various fraud and error
2349
programs in both the United States and Canada.
2350
2351
2352
Center for Technology in Government
2353
2354
www.ctg.albany.edu
2355
2356
The Center for Technology in Government is an applied research
2357
center devoted to improving government and public services through
2358
policy, management, and technology innovation. The center's Web
2359
site includes information about its projects, research, and
2360
publications. Among the center's publications are a best practices
2361
starter kit, a report on data warehousing, and information on the
2362
center's project to find best practices in state and local
2363
information systems. This site also includes links to other related
2364
resources.
2365
Chief Information Officers Council
2366
2367
www.cio.gov
2368
2369
The CIO Council was established in 1996. The CIO Council serves
2370
as the principal interagency forum for improving practices in the
2371
design, modernization, use, sharing, and performance of federal
2372
agency information resources. This site contains a library of
2373
documents, a searchable database, and a discussion area.
2374
The Data Warehousing Institute
2375
2376
www.dw-institute.com
2377
2378
The Data Warehousing Institute provides education and training
2379
in the data warehousing and business intelligence industry. The
2380
institute is dedicated to educating business and information
2381
technology professionals about the strategies, techniques, and
2382
tools required to successfully design, build, and maintain data
2383
warehouses. This site lists winners of its Best Practices and
2384
Leadership in Data Warehousing Awards. In addition, it provides
2385
case studies, lessons from experts, and a forum allowing users to
2386
share information or to ask questions.
2387
Government Performance Project
2388
2389
www.maxwell.syr.edu/gpp/index.htm
2390
2391
The Government Performance Project is the joint effort of the
2392
Maxwell School of Citizenship and Public Affairs at Syracuse
2393
University and Governing magazine, which are working to rate the
2394
management capacity of local and state governments and selected
2395
federal agencies in the United States. This site includes reports
2396
on those rankings in addition to highlighted innovative
2397
practices.
2398
Illinois Department of Public Aid's Office of Inspector
2399
General
2400
2401
www.state.il.us/agency/oig/index.htm
2402
2403
IDPA's OIG's mission is to prevent, detect, and eliminate fraud,
2404
waste, abuse, and misconduct in various payment programs. This site
2405
contains research reports conducted by the OIG, including the first
2406
ever payment accuracy review performed on Medicaid. This site also
2407
contains a searchable database of sanctioned providers and barred
2408
individuals within the state of Illinois.
2409
National Medicaid Fraud and Abuse Initiative
2410
2411
www.hcfa.gov/medicaid/fraud/default.htm
2412
2413
HCFA (now the Centers for Medicare and Medicaid Services) began
2414
its National Medicaid Fraud and Abuse Initiative in June 1997. This
2415
initiative works to facilitate communication, information sharing,
2416
and a national forum for Medicaid fraud and abuse issues for the
2417
states. This Web site contains guidance and reports, including
2418
information about executive seminars conducted by Dr. Malcolm
2419
Sparrow, a leading authority in the area of health care fraud, and
2420
state Medicaid contacts.
2421
2422
2423
Related Organizations
2424
Association of Certified Fraud Examiners
2425
2426
www.cfenet.com
2427
2428
The Association of Certified Fraud Examiners consists of
2429
approximately 25,000 certified fraud examiners and associated
2430
members in 70 different countries. The association's mission is to
2431
reduce the incidence of fraud and white-collar crime through
2432
prevention and education. This site provides information about
2433
membership, events, and products and services offered by the
2434
association.
2435
Association for Federal Information Resources Management
2436
2437
www.affirm.org
2438
2439
The Association for Federal Information Resources Management
2440
(AFFIRM) is a nonprofit, professional organization whose overall
2441
purpose is to improve the management of information, and related
2442
systems and resources, within the federal government. Founded in
2443
1979, AFFIRM's members include information resource management
2444
professionals within the federal, academic, and industry sectors.
2445
This site contains information on membership, a calendar of events,
2446
and links to AFFIRM's publications.
2447
Association of Government Accountants
2448
2449
www.agacgfm.org
2450
2451
The Association of Government Accountants (AGA) serves the
2452
professional interests of financial managers from local, state, and
2453
federal governments, as well as public accounting firms responsible
2454
for effectively using billions of dollars and other monetary
2455
resources every day. AGA is recognized as a leading advocate for
2456
improving the quality and effectiveness of government fiscal
2457
administration. Its Web site includes information on membership,
2458
conferences, and its publications.
2459
Council for Excellence in Government
2460
2461
www.excelgov.org
2462
2463
The Council for Excellence in Government, whose members include
2464
former leaders in both government and the private sector, works
2465
toward practical public sector reform. This Web site provides
2466
information on the council's programs and publications.
2467
Highway 1
2468
2469
www.highway1.org
2470
2471
Highway 1 is a nonprofit organization, made up of companies such
2472
as IBM and Microsoft, whose goal is to educate the government on
2473
the potential of information technology by being a source for
2474
information and by demonstrating technologies that are shaping our
2475
society, economy, and public policy. This Web site includes a list
2476
of Highway 1's programs and an information center.
2477
Information Technology Resources Board
2478
2479
www.itrb.gov
2480
2481
The Information Technology Resources Board (ITRB) is a group of
2482
information technology, acquisition, and program managers and
2483
practitioners with significant experience in developing, acquiring,
2484
and managing information systems in the federal government. The
2485
primary focus of ITRB is to provide a review of major system
2486
initiatives at the joint request of the Office of Management and
2487
Budget and an agency and to publicize lessons learned and promising
2488
practices. This site includes a list of ITRB's members, events,
2489
publications, and related links.
2490
The Institute of Internal Auditors
2491
2492
www.theiia.org
2493
2494
2495
Established in 1941, the Institute of Internal Auditors serves
2496
as the profession's watchdog and resource on significant auditing
2497
issues around the globe. This site provides standards, guidance,
2498
and information on internal auditing best practices for its
2499
members.
2500
National Contract Management Association
2501
2502
www.ncmahq.org
2503
2504
The mission of the National Contract Management Association
2505
(NCMA) is to help contract managers best achieve their objectives
2506
to manage customer and supplier expectations and relationships,
2507
control risk and cost, and contribute to organizational
2508
profitability and success. This site contains information about
2509
NCMA's member services, event calendar, publications, and
2510
professional resources.
2511
National Health Care Anti-Fraud Association
2512
2513
www.nhcaa.org
2514
2515
Founded in 1985 by several private health insurers and
2516
federal/state law enforcement officials, the National Health Care
2517
Anti-Fraud Association is a unique, issue-based organization
2518
comprising private and public sector organizations and individuals
2519
responsible for the detection, investigation, prosecution, and
2520
prevention of health care fraud. This site includes information on
2521
upcoming education and training events.
2522
Private Sector Council
2523
2524
www.privatesectorcouncil.org
2525
2526
PSC is a nonprofit, nonpartisan public service organization
2527
committed to helping the federal government improve its efficiency,
2528
management, and productivity. This site provides information about
2529
PSC's upcoming events.
2530
Standards Australia
2531
2532
www.standards.com.au
2533
2534
Standards Australia International Limited is an organization
2535
with principal activities focused on business-to-business services
2536
based on the creation, distribution, sharing, and application of
2537
knowledge using a variety of technologies. One of the major
2538
activities of the organization is the development of technical and
2539
business standards. This site provides a means of acquiring the
2540
Australian/New Zealand Standard 4360: Risk Management.
2541
Appendix IV
2542
2543
2544
2545
GAO Contacts and Staff Acknowledgments
2546
2547
GAO Contacts
2548
Tom Broderick, (202) 512-8705 Marie Novak, (202) 512-4079
2549
2550
2551
Staff Acknowledgments
2552
In addition to those named above, the following individuals made
2553
important contributions to this report: Cheryl Driscoll, Valerie A.
2554
Freeman, Sharon Loftin, Elizabeth Martinez, Mary Merrill, Debra
2555
Sebastian, Ruth Sessions, Brooke Whittaker, and Maria
2556
Zacharias.
2557
(190032)
2558
2559
2560
2561
GAO's Mission
2562
The General Accounting Office, the investigative arm of
2563
Congress, exists to support Congress in meeting its constitutional
2564
responsibilities and to help improve the performance and
2565
accountability of the federal government for the American people.
2566
GAO examines the use of public funds; evaluates federal programs
2567
and policies; and provides analyses, recommendations, and other
2568
assistance to help Congress make informed oversight, policy, and
2569
funding decisions. GAO's commitment to good government is reflected
2570
in its core values of accountability, integrity, and
2571
reliability.
2572
2573
2574
Obtaining Copies of GAO Reports and Testimony
2575
2576
2577
Order by Mail or Phone
2578
The fastest and easiest way to obtain copies of GAO documents is
2579
through the
2580
Internet. GAO's Web site (www.gao.gov) contains abstracts and
2581
full-text files ofcurrent reports and testimony and an
2582
expanding archive of older products. The Web site features a search
2583
engine to help you locate documents using key words and phrases.
2584
You can print these documents in their entirety, including charts
2585
and other graphics.
2586
Each day, GAO issues a list of newly released reports,
2587
testimony, and correspondence. GAO posts this list, known as
2588
"Today's Reports," on its Web site daily. The list contains links
2589
to the full-text document files. To have GAO E-mail this list to
2590
you every afternoon, go to our home page and complete the
2591
easy-to-use electronic order form found under "To Order GAO
2592
Products."
2593
The first copy of each printed report is free. Additional copies
2594
are $2 each. A check or money order should be made out to the
2595
Superintendent of Documents. GAO also accepts VISA and Mastercard.
2596
Orders for 100 or more copies mailed to a single address are
2597
discounted 25 percent. Orders should be sent to:
2598
U.S. General Accounting Office
2599
P.O. Box 37050 Washington, D.C. 20013
2600
2601
2602
2603
Visit GAO's Document GAO Building
2604
Distribution Center Room 1100, 700 4th Street, NW (corner of 4th
2605
and G Streets, NW) Washington, D.C. 20013
2606
2607
2608
2609
To Report Fraud, Contact:
2610
Web site:
2611
www.gao.gov/fraudnet/fraudnet.htm,
2612
2613
2614
2615
E-mail:
2616
[email protected],or
2617
1-800-424-5454 (automated answering system).
2618
2619
2620
Federal Programs
2621
Presorted Standard Postage & Fees Paid GAO Permit No.
2622
GI00
2623
United States General Accounting Office Washington, D.C.
2624
20548-0001
2625
Official Business Penalty for Private Use $300
2626
Address Correction Requested
2627
2628
2629
2630
2631
2632