Celent Says

Claims Investigations Using Social Media

Mike Fitzgerald
Insurance Experts' Forum, February 2, 2011

I had a very interesting discussion with a claims investigator last Thursday at Celent’s industry networking event in London (How Digital and Social Innovation Challenge the Insurer Business Model—read a summary of the event here). He went into some detail about how they were using social media in their claims work.

As background, this gentleman is the managing director of an independent investigation company based in London that serves the UK market. His company has expertise in both personal and commercial claims, and is hired by insurance companies to detect and research suspected claim fraud. 

He confirmed what I have heard from other claims investigators—their first step in an investigation is to check social networking sites for information. What he added was a richly descriptive context in which this information is used. 

The interview sounds as if it is out of a television script. Paraphrasing his comments, they went something like this:

“After obtaining some interesting information from social sites, we bring a claimant into the office for a chat. I often say 'May I make you a cup of tea?' I then lay a folder on the desk and say 'Have a look at this whilst I get your drink.' I then leave the room and they invariably open the folder. In it, we have screen prints of Facebook postings, pictures, Twitter feeds, etc., all of which refute basic facts in their claim statement. Many times it is not the pictures that are most incriminating, it is the text that they have posted themselves.

"For example, we have discovered postings that read: 'I had a great time in Ibiza. I danced all night!' (This can cast some suspicion on the status of a back injury that is paying disability!) I return with their tea and say 'Have you had a look? Great. Super. Now, there are only a couple of ways this can go…one, you can sign a paper that relinquishes your claims payments and agrees to pay my fee, or two, don’t sign it and we will hand this information over to the police who will begin a criminal investigation.' Obviously, almost all sign. 

I felt as though I was in a television show, but a couple of specifics really intrigued me about his comments. First, when I have seen the “have a look at the folder” technique on TV, it almost always contains pictures that someone has taken without their knowledge, or transcripts of wiretaps—both collected by a third party. What is very different about this “evidence” is that the claimant posted it him/herself and offered it freely for the world to see. Something to be said for the efficiency of self incrimination. 

Second, I agree that there is an uncomfortable, “big brother,” “Orwellian” aspect to this type of monitoring. I have seen some opinions that criticize insurance companies for using such tactics. My stand on this issue is that insurance fraud costs all of us money and if someone who is adding to my insurance costs can be found out through their own hand, I am all for it. Invading privacy is not acceptable, but using what is voluntarily placed in the public domain should be employed to its full use in order to match insurance rates and coverages with actual exposure. 

This blog has been reprinted with permission from Celent.

Mike Fitzgerald is a senior analyst in Celent's insurance practice, and can be reached at mfitzgerald@celent.com.

Readers are encouraged to respond to Mike using the “Add Your Comments” box below.

The opinions posted in this blog do not necessarily reflect those of Insurance Networking News or SourceMedia.

Comments (0)

Be the first to comment on this post using the section below.

Add Your Comments...

Already Registered?

If you have already registered to Insurance Networking News, please use the form below to login. When completed you will immeditely be directed to post a comment.

Forgot your password?

Not Registered?

You must be registered to post a comment. Click here to register.

Blog Archive

Fear This

Just days before this Issue, which contains our security cover story, went to press, we got some interesting news: 1.2 billion unique usernames and passwords and 542 million email addresses were reportedly stolen from 420,000 websites, according to The New York Times. The websites ranged from Fortune 500 companies down to small online retailers.

Should You Back Up Enterprise Data to the Cloud?

Six questions that need to be asked before signing on with an outside service.

Modernizing Information Management

While better reporting and actuarial analysis help to support financial decisions, improved analytics and decision making greatly assist the rest of the organization.

5 Strategies to Change the Game

Allstate's director of technology and operations says disruptive innovation has the power to completely change industries — ours included.

Strategic Planning: Here and Now

Insurers’ annual strategic planning efforts can benefit from an infusion of tactical reality.

Here Come the Millennials

As the Millennial generation comes of age, they will demand fundamental changes — and others as well — from life insurers.

Advertisement

Advertisement