recommended reading

2 Million Obamacare Enrollments Have Data Inconsistencies

MNsure insurance exchange representatives Carlos Villanueva, left, and Emily Joyce prepare for the Oct. 1 open enrollment debut at the center in St. Paul, Minn.

MNsure insurance exchange representatives Carlos Villanueva, left, and Emily Joyce prepare for the Oct. 1 open enrollment debut at the center in St. Paul, Minn. // Jim Mone/AP File Photo

According to government documents obtained by the Associated Press, the accounts of more than 2 million people who signed up for Obamacare have "data discrepancies," some of which could affect their subsidy eligibility. The discrepancies include "important details on income, citizenship and immigration status," according to the AP. The biggest concern is that some people may have received too high a subsidy, meaning they'd be asked to repay the excess or lose their coverage.

Obama administration officials said they believed most of the inconsistencies will be cleared up over the summer, but said they'd developed a system to "turn off" benefits for people who aren't eligible. "The fact that a consumer has an inconsistency on their application does not mean there is a problem on their enrollment," Julie Bataille, the Department of Health and Human Services' spokeswoman said. "Most of the time what that means is that there is more up-to-date information that they need to provide to us."

There are at least two possible reasons why the data would have inconsistencies. One, people lied about their income, citizenship or immigration status. Last year the administration announced that it was scaling back its verification process until 2015, when a stronger system would be set up. Congressional committees are looking into the discrepancies.

Two, as Bataille said, people need to provide updated information. But that reveals a flaw in the subsidy system — as a person's income level rises and falls throughout the year, their subsidy allocation will vary. This is especially a problem for the self-employed, who make up a large part of the exchanges and have to estimate their incomes. As Katie Vlietstra, vice president for government relations at the National Association for the Self-Employed, told Bloomberg in January, “the challenge with this calculation is that if your income changes throughout the year, you are required to reimburse the government any subsidies you received, most likely in your 2014 taxes.” According to Bloomberg those repayments will be capped at $300 to $2,500, depending on income.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.