Investigations and Fraud Case Management System
Location:
West Virginia, USA
Posted on:
Dec 10, 2025
Deadline:
Jan 6, 2026
Summary:
West Virginia seeks a secure, cloud-based system for fraud investigations, case management, and audit compliance.
(1) Vendor needs to provide investigations and fraud case management system– Provide for the implementation of a secure, cloud–based case management system that supports fraud detection, investigation tracking, evidence management, and case lifecycle management.– The system must streamline case intake, assignment, evidence handling, reporting, and closure, while also supporting real–time analytics, interoperability with state and law enforcement systems as necessary, and secure remote access.– Agency seeks to improve investigative and audit efficiency, strengthen fraud detection and prevention efforts, and ensure the protection of sensitive case data. Specification– The solution must provide audit, reporting, and analytic capabilities to support investigative oversight, compliance, and management decision–making– Encrypt all data at rest and in transit using Federal Information Processing Standards (FIPS) 140–3 validated encryption modules.– Provide multi–factor authentication (MFA) for all users accessing the solution.– Maintain comprehensive and immutable audit trails for all system access, modifications, and deletions, with the ability to generate audit logs for the Agency upon demand.– Ensure that all vendor personnel, subcontractors, or third parties with access to the system have completed agency Security Awareness Training and signed the agency Security Addendum– Provide configurable dashboards tailored to user roles (e.g., investigators, supervisors, administrators) that display case status, workload distribution, and investigative outcomes– Provide alerts to users as new tasks and case assignments are made– Track caseloads and assignments by investigator, team, or division, including timelines, task status, and completion rates– Generate standardized reports required by federal and state regulations, including fraud statistics, investigative results, and audit–ready documentation– Maintain permanent, tamper–evident logs of all system access, modifications,
