recommended reading

VA Seeks to Quadruple Funding for Paperless Claims System

bikeriderlondon/Shutterstock.com

The Veterans Affairs Department will request a discretionary budget of $63.5 billion in 2014, a four percent increase over the 2013 funding levels President Obama approved last month and $500 million below what the department originally sought  for 2013, the White House said in a preliminary release of the VA budget.

The 2014 VA budget request includes $155 million for a paperless Veterans Benefits Management System designed to eliminate the disability claims backlog by 2015, White House Chief of Staff Denis McDonough told a media briefing on Friday.

That proposal is four times higher than VBM’s final 2013 funding level of $38.5 million, which was a 40 percent cut from the $92.5 million VA had originally requested for 2013.

Over the past month veterans groups and the chairman of the House VA Committee have sharply criticized the claims  backlog, a growing problem illustrated on Friday with stinging satire by comedian Jon Stewart on the The Daily Show.  VA had 885,068 backlogged claims as of April 1, down two percent from 903,286 the week before.

The 2014 discretionary VA budget also includes a nearly $7 billion or a 7.2 percent increase over the enacted 2013 funding for mental health services, including expanded treatment for post-traumatic stress disorder and military sexual trauma.

The White House said this money would also help VA expand collaborative efforts with the Defense and Health Human Service departments to provide mental health care for veterans, as directed the President in an Aug. 31, 2012 executive order.

The White House said the proposed 2014 VA budget calls for a permanent extension to the Returning Heroes Tax Credit, which provides up to $5,600 to employers to hire unemployed veterans, and the Wounded Warrior Tax Credit, which provides up to $9,600 to hire long-term unemployed veterans with service-connected disabilities.

VA’s discretionary budget covers the department’s operations outside of mandatory benefit entitlement programs.

(Image via bikeriderlondon/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.