recommended reading

Insurers Worry About Big Gaps in Obamacare Site

Bildagentur Zoonar GmbH/

Insurance companies are still waiting for key parts of to be built—and still having trouble with the parts that are in place.

Important pieces of the Obamacare site are still glitchy, or missing altogether. And the site’s botched rollout is hardly boosting confidence in the vital components that still need to be built, including the systems for processing payments to insurers and squaring away the details of who has enrolled in which plans.

Both systems are crucial to the insurance industry, which needs to collect premiums so it can pay out claims. And carriers are still waiting for the delayed process of reconciling their enrollment information with the federal government’s data. As the rest of struggles to get off the ground, people in and near the insurance industry are nervous about the delays and about how well those systems will work once they’re in place.

“They don’t have a very good track record of building and testing systems, given what we’ve seen so far, so that is cause for concern,” an industry official said.

Another cause for insurers’ anxiety: CGI Federal—the contractor that has come under fire for its work building the bulk of—is also in charge of building the payment and reconciliation systems.

Reconciliation is the process by which insurance companies and the federally run insurance exchange iron out any discrepancies in enrollment information—making sure, for example, that the same person isn’t accidentally enrolled in two policies, and that the consumer and the insurance company got the same information about the size of any subsidies.

Consumers have to pay their first month’s premium by the end of December for their coverage to take effect on Jan. 1. And to make sure that the right people are paying the right amount for the right policy, insurers and the government need to reconcile their information. The process was supposed to start this month, but insurers are now skeptical that will happen. And they haven’t gotten word of any backup plan.

Gaps in enrollment information seem likely, given the myriad problems has had in submitting complete, accurate reports to insurance companies about the few people who have managed to sign up through the website.

Insurers say the records—known as “834” transmissions—are improving but have been rife with inaccuracies or missing necessary information.

The Centers for Medicare and Medicaid Services said Monday that it had identified—and fixed—a single glitch responsible for the vast majority of the site’s back-end errors. A software bug that prevented Social Security numbers from accompanying the reports was responsible for about 80 percent of the problems, CMS Communications Director Julie Bataille told reporters.

She could not specify the overall error rate for submissions to insurance companies, even though CMS would have to know that to assert that it had solved 80 percent of them.

Even as enrollment submissions are improving, however, insurers are still waiting for another big part of the system: the part that pays them. Most people who buy insurance through will be eligible for a subsidy to help cover the cost of their premiums. But CMS hasn’t yet built the system that transmits subsidy payments to insurance companies.

Insurers are supposed to receive their first payments in January, and they’re counting on the money to be there. Otherwise, they’ll be paying out claims for customers whose premiums haven’t been fully paid.

Insurers will be paid on time, Bataille said. CMS is piggybacking off Medicare’s payment system to process payments in January while it “builds out” the automated system that’s supposed to handle subsidy payments under the Affordable Care Act, she said.

This article appears in the December 3, 2013, edition of NJ Daily as Insurers Fret Over Big Gaps in Obamacare Site.

(Image via Bildagentur Zoonar GmbH/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.