Professional Documents
Culture Documents
Birla Institute of Technology & Science, Pilani Work Integrated Learning Programmes (Wilp)
Birla Institute of Technology & Science, Pilani Work Integrated Learning Programmes (Wilp)
4) Challenges galore
12) Service Request Fulfilment with regards to TPA for Health Insurance
13) Conclusion
THIRD PARTY ADMINISTRATORS FOR
HEALTH INSURANCE
TPA or Third Party Administrator (TPA) is a company/agency/organization holding
license from Insurance Regulatory Development Authority (IRDA) to process claims -
corporate and retail policies in addition to providing cashless facilities as an
outsourcing entity of an insurance company.
TPAs function as an intermediary between the insurance provider and the insured. The
stakeholders involved are as follows:
Insurance companies
Healthcare providers
Policyholders
Introduced by the IRDA in 2001, TPAs handle various pertinent aspects of insurance
as listed below:
Challenges galore:
Medi Assist India TPA Pvt. Ltd || United Healthcare Parekh TPA Pvt. Ltd || Meditek
(TPA) Services Ltd
The role of TPA in health insurance can be understood by the following points:
1. Who hires the TPA - The TPA is hired by the health insurance providing
company to aid in claim settlement process.
2. What is the difference between a TPA and a health insurance company -
The TPA acts as a link between the policyholder and insurance company, and
helps in smooth claim settlement process.
3. Is TPA mandatory in insurance - No, the TPA is not mandatory in insurance
and the insurer has the right to discontinue TPA service.
4. Does the policyholder have to pay money to TPA - No, the policyholder does
not have to pay money to TPA.
IT INCIDENT MANAGEMENT WITH REGARDS
- TPA FOR HEALTH INSURANCE
IT INCIDENT:
Service desk teams can publish forms in user self-service portal to ensure that
all relevant information is collected right at the time of ticket creation.
This not only helps sort incoming tickets but also ensures that the tickets are
routed to the technicians, most qualified to work on the issue.
Incident categorization also helps the service desk system apply the most
appropriate SLAs to incidents and communicate those priorities to end users.
After diagnosing the issue, the technician offers the end user a resolution, which
the end user can validate.
HOW TO CLASSIFY IT INCIDENTS:
Some factors that influence incident categorization include the urgency of the
incident and the severity of its impact on users or the business in general.
Typically, major incidents are the ones that affect business-critical services, thus
affecting the entire organization, and need immediate resolutions.
Minor incidents usually impact a single user or a department, and might have a
documented resolution in place already.
Incident management practices are widely used by the IT service desk teams. Service
desks are usually the single point of contact for end users to report issues to IT
management teams.
Here, first desk techs are the point of contact with the users who want to raise an
incident ticket. They can log incoming requests, assign tickets to second-level
support technicians, analyze and resolve incidents if possible, or escalate an
unresolved incident.
Incident management covers every aspect of an incident across its life cycle. It speeds
up the resolution process and makes ticket management transparent. Without incident
management, handling tickets can be a hassle. Some of the key problems that can arise
include:
Lack of transparency on ticket status and expected timelines for end users.
No proper record of past incidents.
Inability to document solutions for repeat or familiar issues.
Higher risk of business outages, particularly with major incidents.
Stretched resolution times
Lack of reporting abilities.
Decreased customer satisfaction
Offer multiple modes for ticket creation including through an email, phone call,
or a self-service portal.
Publish business-facing, custom IT incident forms for effective information
gathering.
Automatically categorize and prioritize IT incidents based on ticket criteria.
Associate SLAs with IT incidents based on ticket parameters like priority.
If all technicians, are of the same skill levels, auto-assign tickets to technicians
based on algorithms like load balancing and round robin.
Associate IT asset data, IT problems, and IT changes with IT incident tickets.
Ensure that incidents are closed only after providing a proper resolution by
confirming with end user and applying the appropriate closure codes.
Configure a custom end-user communication process for every step in an IT
incident life cycle
Create, and maintain a knowledge base with appropriate solutions
Provide role-based access to end users and technicians based on the complexity
of the solutions.
Handle major incidents by creating unique workflows.
PROBLEM MANAGEMENT WITH REGARDS -
TPA FOR HEALTH INSURANCE
WHAT IS PROBLEM MANAGEMENT?
Problem Management is the process to identify, prioritize, and systematically
resolve these underlying issues. It provides the end-to-end management of problems
from identification to elimination.
The purpose of this document is to describe the key activities that are required
to execute the
Technology Transformation (TT) Problem Management process and related
controls to ensure the
process generates the expected outputs, based on established accountability and
responsibility.
Proactive problem management helps to prevent incidents from occurring the first
time.
REACTIVE PROBLEM MANAGEMENT:
Reactive problem management helps to prevent incidents from recurring and may help
to resolve open incidents.
Through proactive and preventative actions aimed at addressing root causes of
incidents, resultant service availability and performance is improved and service
reliability is increased.
INPUTS FOR PROBLEM MANAGEMENT:
EVENT OCCURRENCE:
Events occur 24 x 7 x 365. In ITIL Event Management, the key is defining the types of
events that are significant to your operation and ensuring you have a system in place to
detect them.
EVENT NOTIFICATION:
Notifications are typically sent by monitoring tools or CIs (configuration items). At
this stage, these are simply notifications that an event has happened — and have
typically not yet been interpreted or correlated to understand the meaning or impact.
EVENT DETECTION:
In this step, a monitoring system, automated agent, or systems management solution
receives the notification and determines the meaning of the event.
EVENT LOGGED:
A record of the event is made, along with any subsequent actions taken. This may be
done by your systems management solution, or by the individual applications / services
/ hardware that triggered the event.
EVENT FILTERING AND CORRELATION:
Can the event be ignored, or does it need to be passed on to the events management
system? Often, information events are ignored. Warnings and exceptions often require
additional action, though. So the first step of this process — called first-level
correlation and filtering — is simply filtering which events should be ignored versus
passed on to the event management system.In the second level of correlation, a
correlation engine uses predefined business rules to determine the significance of
warning and exception events, and decide the appropriate next steps.
2. Warning. Warnings are indicators of activity that outside the norm — like
a threshold being approached. Like a hurricane or tornado warning, a
warning means that you should monitor conditions to make sure they do not
worsen — or take action to prevent them from worsening when appropriate.
An example of this type of event would be server capacity reaching 75%, or
a standard transaction taking 15% longer to complete than normal.
3. Exception. Exception events are indicators that something is wrong. The
services (and business they support) may be negatively impacted. A
network or server being down (as opposed to just approaching capacity) is
an example of an exception.
EVENT MANAGEMENT FLOW CHART
ACCESS MANAGEMENT WITH REGARDS
- TPA FOR HEALTH INSURANCE
IDENTITY AND ACCESS MANAGEMENT (IAM)
Access management makes sure people are granted access to the right resources and
nothing more. Because even verified users can pose a threat to an enterprise,
customerand corporate data need to be protected. For example, you don't want third-
party contractors to have the same access and privileges as senior management. In
addition to protecting access to data, IAM solutions can also allow you to set
different levels of privileges, so some users can view information while others can
edit it.
ACCESS MANAGEMENT:
Create and manage secure IDs for your prospective consumers for easy, frictionless
access to insuranceinformation across all platforms and touchpoints.
• With single sign-on and multi-factor authentication, you can simplify and secure
access to digital assets.
• With extensive preferences and consent management solutions, you can improve
consumer connections.
With complete authentication, access management, and data governance capabilities, you
can safeguard your company's reputation. Reliable CIAM software follows the industry's
best security and privacy best practices.
• The consumer care portal's features can streamline user provisioning, consumer
service, and consumer support.
BENEFITS OF CIAM
• Monitor compliance with the security policy regarding the target applications.
• Web access and single sign-on to enforce the access security and increase user
productivity.
• Users raise a variety of IT requests every day. It might be a request for new
software, the replacement of old hardware, access to applications, or a change
in the component of an asset.
• A Service Request is raised when the user needs something new or replaced.
The objective of ITIL Service Operation is to make sure that IT services are delivered
effectively and efficiently. The Service Operation lifecycle stage includes the fulfilling of
user requests, resolving service failures, fixing problems, as well as carrying out routine
operational tasks. Hence we should have ITIL Service Operation for all our services