Celent Says

Claims Investigations Using Social Media

Mike Fitzgerald
Insurance Experts' Forum, February 2, 2011

I had a very interesting discussion with a claims investigator last Thursday at Celent’s industry networking event in London (How Digital and Social Innovation Challenge the Insurer Business Model—read a summary of the event here). He went into some detail about how they were using social media in their claims work.

As background, this gentleman is the managing director of an independent investigation company based in London that serves the UK market. His company has expertise in both personal and commercial claims, and is hired by insurance companies to detect and research suspected claim fraud. 

He confirmed what I have heard from other claims investigators—their first step in an investigation is to check social networking sites for information. What he added was a richly descriptive context in which this information is used. 

The interview sounds as if it is out of a television script. Paraphrasing his comments, they went something like this:

“After obtaining some interesting information from social sites, we bring a claimant into the office for a chat. I often say 'May I make you a cup of tea?' I then lay a folder on the desk and say 'Have a look at this whilst I get your drink.' I then leave the room and they invariably open the folder. In it, we have screen prints of Facebook postings, pictures, Twitter feeds, etc., all of which refute basic facts in their claim statement. Many times it is not the pictures that are most incriminating, it is the text that they have posted themselves.

"For example, we have discovered postings that read: 'I had a great time in Ibiza. I danced all night!' (This can cast some suspicion on the status of a back injury that is paying disability!) I return with their tea and say 'Have you had a look? Great. Super. Now, there are only a couple of ways this can go…one, you can sign a paper that relinquishes your claims payments and agrees to pay my fee, or two, don’t sign it and we will hand this information over to the police who will begin a criminal investigation.' Obviously, almost all sign. 

I felt as though I was in a television show, but a couple of specifics really intrigued me about his comments. First, when I have seen the “have a look at the folder” technique on TV, it almost always contains pictures that someone has taken without their knowledge, or transcripts of wiretaps—both collected by a third party. What is very different about this “evidence” is that the claimant posted it him/herself and offered it freely for the world to see. Something to be said for the efficiency of self incrimination. 

Second, I agree that there is an uncomfortable, “big brother,” “Orwellian” aspect to this type of monitoring. I have seen some opinions that criticize insurance companies for using such tactics. My stand on this issue is that insurance fraud costs all of us money and if someone who is adding to my insurance costs can be found out through their own hand, I am all for it. Invading privacy is not acceptable, but using what is voluntarily placed in the public domain should be employed to its full use in order to match insurance rates and coverages with actual exposure. 

This blog has been reprinted with permission from Celent.

Mike Fitzgerald is a senior analyst in Celent's insurance practice, and can be reached at mfitzgerald@celent.com.

Readers are encouraged to respond to Mike using the “Add Your Comments” box below.

The opinions posted in this blog do not necessarily reflect those of Insurance Networking News or SourceMedia.

Comments (0)

Be the first to comment on this post using the section below.

Add Your Comments...

Already Registered?

If you have already registered to Insurance Networking News, please use the form below to login. When completed you will immeditely be directed to post a comment.

Forgot your password?

Not Registered?

You must be registered to post a comment. Click here to register.

Blog Archive

Avoiding the Bermuda Triangle of Data

Handled poorly, questions around data ownership, data quality and data security can sidetrack big data conversations and alienate business stakeholders.

Global Supply Chain, Local Problem

As a technology provider, your client’s ability to deliver products and services to their customers, when and where they need them, is at the heart of their business success.

Legacy Systems Are Increasingly a Competitive Handicap

Legacy systems, while reliable, increasingly hold insurers back, a new study finds

Five Reasons to Software-Define Your Operations

It may be possible to provision key services with the click of a mouse, but benefits go well beyond that.

3 Policy Admin Conversion Considerations

Insurers would be wise to learn these lessons before formulating a strategy to convert policies to a new policy administration system.

From Her to Watson, and What’s Next?

Imagine a learning system that can replace the performance of your best employee to provide the same level of support across the organization.