Day: February 5, 2020

Inside a system billing abuse and predatory fraud not the same problem

Introduction

In 2016 Canada spent 10.53 % of GDP on health care benefits and services. The United States spent 17.07% of GDP.  Health care spending in Canada and the United States is ten times that of national defense. You might say, it is the largest cash dispensing sector of government. Health care is critical infrastructure (CI). It is an extraordinarily complex system with a large number of sub-parts (ecosystems). These sub-parts can be broken down to even smaller units.

In Chronic Condition: What Canada’s Health Care System Needs to Be Dragged Into the 21st Century, Jeffrey Simpson explored the options with a growing problem we have to grapple with, including cuts in non-health-care spending, tax increases, various types of privatization, and finding savings within health care itself. 

Similarly, Canada’s efforts at controlling abuse and predatory fraud lag well behind contemporaries in other single payer systems in Europe and the United States. As a smaller part of the entire system explored by Simpson, the next generation of abuse and fraud controls does not have to limit itself to reductionist thinking. It will deep dive into the inter-relatedness between parts. It can learn from the lessons of the Cory Commission in Ontario to clearly separate the culture, language and practice of billing integrity and abuse controls from going after predatory fraud by enterprise criminals and gangs.

Abuse

Efficient delivery of health care systems is built on a trust that diagnosing physicians and other health services providers will do the right thing.  It is hard to imagine a system working in any other way. Within this context, controlling billing behavior is foremost a people challenge. 

A new generation of controls considers innate behavioral traits, the role of affect (emotions) in judgment and decision making, and environmental conditions inducing unwanted behaviors. We know from science that everything in nature cheats a little bit to gain competitive advantage. When people think others are cheating, their cheating goes up. When people are reminded of their morality close to the time of the temptation, cheating goes down. Outlier (egregious – above the norms) cheating must be rationalized (the making of excuses), when mostly honest are tempted to do bad things. The farther away from direct face to face exchange of cash, the easier it is for people to cheat (Ariely: Duke University). Finally, negative environmental conditions such as exhaustion, frustration, negative attitude and financial troubles can break down resistance to temptation. 

Automated billing systems are efficient. But, they are mostly designed without considering unintended consequences. In absence of hard work to maintain mutual respect, communicating trust and introducing mindful billing integrity strategies, online billing systems are the perfect storm for bad behavior.

Predatory Fraud

Predatory fraud is a horse of a different color. It requires a different approach than “inside the system” billing integrity. It is where the Rubicon is crossed to cold, calculated choices to attack health care payment systems for financial gain. These attacks are in two categories: “outside the system” and “inside the system”. They are in some cases separate, but can be inter-related.

Tough minded rhetoric and action on fraud , if not properly defined and managed, is counter-productive to building inside the system relationships and trust with physicians and other providers diagnosing and delivering health care. These are the people who witness misuse throughout the entire system, and whose cooperation is necessary – from fraudulent medical equipment invoices, to “pill mill” services and assistive devices/home oxygen, to rehabilitation services and hospitals.  Secondly, there is little evidence to support draconian enforcement measures as effective stand-alone deterrents to abuse and fraud.

A Formula for Effective Controls 

Think of your organization as a complex system, made up of many inter-related parts. A change to one part may have unintended consequences on another. Secondly, align subject matter expertise into billing integrity and internal investigations/counter-fraud groups as separate entities, both in reality and publicly perceived: 

  1. Inside the System Controls: Behavioral Insights teams nudge desired behaviors. Environmental threat risk assessment identifies conditions which provide rationalizations (excuses) for cheating when people are tempted to do bad things, and others which push away the “eyes and ears”- these trusted providers – from cooperation om reducing misuse throughout the health care system. Billing integrity employees are the nice folks. Their role is to bring clarity to the billing processes, to make things as least complicated as possible, and to help trusted billing providers stay out of trouble. In some cases it may involve civil recoveries from unwillingness to cooperate. If, in the course of meeting these responsibilities, egregious abuse is suspected, it is elevated for internal inquires by an “arms length” body within inside the system group. It is suggested that term “investigator” be limited to those who apply the extraordinary powers of search and seizure under acts and regulations.
  2. Outside the System Controls: Countering fraud on the other hand is a nasty business. Data science teams design place/time sensitive algorithms for early detection of hot spots (geographic) and patterns (situational) that point to egregious behavior. Investigation determines if concerns meet the test of civil tort and/or criminal behavior. Situational crime prevention teams identify the egregious abuse/fraud attractors contributing to hot spots and patterns. They partner with billing integrity and other stakeholders to implement egregious abuse and fraud harms controls, often with multiple interventions to reduce the activity. Prosecution is but one of interventions, combined with civil recoveries.  As a result of this experience, fraud-specific ‘red flags’ are referred back to the billing integrity group for inclusion in their monitoring algorithms.  

A final thought.  Hyperbole from attitudinal surveys about the level of egregious abuse and fraud is on wobbly legs. Decision makers used to making business decisions based on numbers ‘feel’ inauthenticity. Abuse and predatory fraud controls system should be based in quantification consistent with science, and implemented in a way that makes sound business sense, rather than for security theater.

My recommendation to get started is to put sound policy and guidelines in place and then to learn by doing – “eating the  elephant a bite at a time” – with a situational health care fraud prevention approach that documents situation specific problems, undertakes initiatives and quantifies results of projects  in a way that financially justifies resources for tackling abuse and fraud.

Note: An inaugural health care specific  Situational Problem Solving Guides and a Situational Health Care Fraud Prevention Matrix with harms reduction strategies in five categories has been developed based on best known situational crime prevention practice.  The model is a problem-solving approach for the health care sector detailed in Part 4 of Malcolm Sparrow’s book: “A License to Steal: How fraud bleeds America’s health care system” [2002]. Dr. Sparrow is a professor at  at the J.F. Kennedy School of Government, Harvard University.