Remote identify proofing is the process federal agencies and other entities use to verify that the individuals who apply online for benefits and services are who they claim to be. If the applicant responds correctly to personal questions, their identity is considered to be verified. However, data stolen in recent breaches could be used fraudulently to respond to knowledge-based verification questions. Alternative methods are available that provide stronger security, but these methods may have limitations in cost, convenience, technological maturity, and they may not be viable for all segments of the public.
Comprehensive and sustained improvement in benefits access and customer experience requires changes across policy, operations, technology, staffing, procurement, and more. This guide offers a collection of actions and best practices for states to apply.
The Login.gov program roadmap articulates the values of the Login.gov program, outlines strategic priorities, and documents how the program is approaching nuanced identity topics.
The blog post emphasizes advancements in digital services, user engagement, and inter-agency collaborations that enhanced public access to government services.
Handbook by 18F designed for executives, budget specialists, legislators, and other “non-technical” decision-makers who fund or oversee state government technology projects that receive federal funding and implement the necessary technology to support federal programs. It aids in setting projects up for success by asking the right questions, identifying the right outcomes, and equally important, empowering decision-makers with a basic knowledge of the fundamental principles of modern software design.
This playbook shares best practices and innovations related to data and analytical approaches for improving grant outcomes. Equitable data practices improve the effectiveness and efficiency of federal program dollars through better resource allocation and more informed decision-making.
Policy changes are often dynamic and occur quickly, but they can only create impact once implemented. The Eligibility APIs Initiative at 18F shares an example from their work that shows the potential for rapid, accurate policy implementation as code.
Biometric identification technologies—such as facial recognition and fingerprinting—can affect underserved communities, including low-income and minority communities. GAO interviewed academics, advocacy groups, and technology experts to find out how.
We kicked off Rules as Code Demo Day with Alex Soble of 18F and Mike Gintz of 10x presenting their Eligibility APIs Initiative that explores whether APIs and rules as code might improve the efficiency and effectiveness with which federal public benefits programs communicate their policy to states. They demonstrated their original prototype, and how the open source code has now been extended into several initiatives.
Revision 4 of the National Institute of Standards and Technology (NIST) Special Publication 800-63, Digital Identity Guidelines, responds to the changing digital landscape that has emerged since the last major revision of this suite was published in 2017.