A case study on how North Carolina leveraged human-centered design, interagency collaboration, and data-sharing strategies to improve cross-enrollment in SNAP, WIC, and Medicaid, aiming to reduce administrative burden and better serve families.
American Public Human Services Association (APHSA)
This guide discusses general characteristics shared by organizations that have successfully created accessible content, and includes case studies that showcase characteristics of successful accessible content teams.
In this webinar, a panel of experts discuss what states can do right now to improve EBT security, how to use data to analyze theft patterns, and how EBT payment technology needs to evolve to ensure efficiency, security, and dignity for beneficiaries.
This resource provides examples and practical guides that explain how to use existing regulations and data sharing agreements to transfer client information or eligibility status between benefit programs.
This presentation from Steph White, Cross Enrollment Coordinator at the Michigan Department of Health and Human Services offers an in-depth example on implementing cross enrollment with WIC and general tools for cross enrollment.
This document is the Spanish-language version of the Model WIC Online Application. It provides a full set of translated application questions and instructions for applying to the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC).
This resource contains specific examples that highlight the advantages of designing reusable code components, software tools, or design formats. This guide also illustrates the possibilities for connecting new components to existing system infrastructure.
ACCESS NYC is an online public screening tool that residents can use to determine the City, State, and Federal health and human service benefit programs for which they are eligible.
In this updated primer, the DBN describes how identity proofing and authentication show up in public benefits applications and outlines equity and security concerns raised by common identity proofing and authentication methods.