Feeds

DWP seeks data for identity verification service

Will pay supplier up to £2m for collection of benefit claimants' info

Gartner critical capabilities for enterprise endpoint backup

The Department for Work and Pensions has published a tender worth up to £2m for the supply of biographical data to identity online benefit claimants.

The chosen supplier will provide biographical data to supplement information already available to the department, according to a notice published in the Official Journal of the European Union on 26 January.

It says that the two-year contract is part of the DWP's Automated Service Delivery (ASD) project and that a solution is needed to "successfully support all customers to use a remote service".

"This will support the ASD target of 80 per cent of DWP customers going on to self-serve using remote channels. DWP therefore needs access to sufficient biographical data to allow customers to provide the necessary assurance as to their identity. Without such data, DWP will be unable to support remote identity verification tests for sufficient customers to meet self service requirements," says the notice.

Phases one and two of the project will involve changing the circumstances functionality for existing Jobseekers Allowance (JSA) claimants, who should have enough data available in DWP data sources to allow an identity verification biographical match.

The third phase, scheduled to begin in January 2012 phase, includes the delivery of functionality to support new JSA claims. Analysis of JSA claims data by the department suggests that 31 per cent of new claimants, which amounts to 628,000 annually, are unlikely to have enough data available for an internal biographical match.

"Given the limitations of DWP data for this customer group, an alternative way of authenticating customer's identity will be required to obtain a biographical match utilising external data sources," explains the notice.

From April 2012, online state pension claims will also be included in the requirement.

As part of its fraud and error strategy, the DWP has a growing requirement to verify client information and provide a client risk profile. It said that access to data held by third parties is required to substantiate information supplied by its clients either in real time or near real time across a number of benefits.

This article was originally published at Kable.

Kable's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
'Stop dissing Google or quit': OK, I quit, says Code Club co-founder
And now a message from our sponsors: 'STFU or else'
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Uber, Lyft and cutting corners: The true face of the Sharing Economy
Casual labour and tired ideas = not really web-tastic
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
Don't even THINK about copyright violation, says Indian state
Pre-emptive arrest for pirates in Karnataka
The police are WRONG: Watching YouTube videos is NOT illegal
And our man Corfield is pretty bloody cross about it
Oz biz regulator discovers shared servers in EPIC FACEPALM
'Not aware' that one IP can hold more than one Website
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.