recommended reading

Veterans disability claims system and customer service tool work better apart

Semisatch/Shutterstock.com

Conflicts with another application are to blame for the sluggish performance of the Veterans Affairs Department’s $491 million disability claims processing system in December, VA Chief Information Officer Roger Baker said in a call with the media Thursday.

Nextgov reported Jan. 4 that the Veterans Benefits Management System had slowed to a crawl the previous month, with slow response times impeding the ability of claims examiners to access veterans’ files.

Baker said the claims processing tool operates in a cloud infrastructure with a new customer relationship management system that handles interactions with veterans, including phone calls. The problems VA encountered with the benefits tool last month stemmed from “inefficiencies” in coordinating with the customer management system, he said. He conceded it was a mistake to roll out both at the same time.

In January, VA separated operation of the two systems, and today claims processing is “working well,” Baker said. The claims tool currently operates in 18 of 57 Veterans Benefits Administration regional offices and Baker said he planned to deploy it to an unspecified number of additional offices in February, with all 57 on the system by the end of 2013.

VA had 900,913 backlogged disability claims as of this Monday, up slightly from 900,121 at the end of 2012. The department reported that 628,566 of the claims in the backlog as of Monday, or 69.8 percent, had been pending for more than 125 days. That is up from 608,365 claims that had been lingering longer than 125 days as of the end of 2012. VA Secretary Eric Shinseki views the paperless benefits system as key to eliminating the backlog by 2015.

The department has paid the Space and Naval Warfare Systems Center Atlantic in Charleston, S.C., $105 million since 2010 to help develop the Veterans Benefits Management System, Nextgov reported Jan. 2

(Image via Semisatch/Shutterstock.com)

Correction: The orginal version of this story incorrectly identified the wrong company as the VA CRM contractor.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.