recommended reading

Shutdown Torpedoes VA Efforts to Cut Claims Backlog

Ioana Davies/Shutterstock.com

Before Tuesday, when agencies were forced to shut down unfunded operations or those otherwise exempt from the effects of the Congressional budget impasse, the Veterans Affairs Department had planned to continue mandatory overtime for claims processors until Nov. 16 and voluntary overtime until Dec. 31. But those plans have changed, a VA spokeswoman told Nextgov.

“As a result of Congress’ failure to act and prevent a lapse in appropriations, VA will not be able to continue overtime for claims processors,” said Victoria Dillon, the acting department press secretary in an email.

In May, VA began requiring claims processors to work overtime -- a minimum of 20 hours per month -- to process disability and education claims. The overtime helped the department significantly reduce the number of disability claims backlogged more than 125 days by more than 190,000, from a peak of 611,000 in March to about 418,500 on Sept. 30.

“This clear progress for veterans and their families is at risk without immediate action by Congress” Dillon wrote.

She also credited deployment of the Veterans Benefits Management System, an automated claims processing system, to all 56 Veterans Benefits Administration regional offices in June with aiding the backlog reduction.

Stephan Warren, the department’s acting chief information officer, told reporters last week that the VA continues to upgrade VBMS with software patches that continuously enhance the system, such as one that allows processors to easily pull electronic information from outside sources into a claims folder.

Dillon said the mandatory overtime and VBMS together have helped the Veterans Benefits Administration process more than 1,000 additional claims per day. The agency has been processing over 100,000 claims on average per month and nearly 1.2 million claims in fiscal year 2013. Those are “historic production levels VBA has never reached before,” Dillon said, with 90 percent accuracy.

Get the Nextgov iPhone app to keep up with government technology news.

(Image via Ioana Davies/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.