Feeds

DWP seeks data for identity verification service

Will pay supplier up to £2m for collection of benefit claimants' info

Providing a secure and efficient Helpdesk

The Department for Work and Pensions has published a tender worth up to £2m for the supply of biographical data to identity online benefit claimants.

The chosen supplier will provide biographical data to supplement information already available to the department, according to a notice published in the Official Journal of the European Union on 26 January.

It says that the two-year contract is part of the DWP's Automated Service Delivery (ASD) project and that a solution is needed to "successfully support all customers to use a remote service".

"This will support the ASD target of 80 per cent of DWP customers going on to self-serve using remote channels. DWP therefore needs access to sufficient biographical data to allow customers to provide the necessary assurance as to their identity. Without such data, DWP will be unable to support remote identity verification tests for sufficient customers to meet self service requirements," says the notice.

Phases one and two of the project will involve changing the circumstances functionality for existing Jobseekers Allowance (JSA) claimants, who should have enough data available in DWP data sources to allow an identity verification biographical match.

The third phase, scheduled to begin in January 2012 phase, includes the delivery of functionality to support new JSA claims. Analysis of JSA claims data by the department suggests that 31 per cent of new claimants, which amounts to 628,000 annually, are unlikely to have enough data available for an internal biographical match.

"Given the limitations of DWP data for this customer group, an alternative way of authenticating customer's identity will be required to obtain a biographical match utilising external data sources," explains the notice.

From April 2012, online state pension claims will also be included in the requirement.

As part of its fraud and error strategy, the DWP has a growing requirement to verify client information and provide a client risk profile. It said that access to data held by third parties is required to substantiate information supplied by its clients either in real time or near real time across a number of benefits.

This article was originally published at Kable.

Kable's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.