This brief outlines the U.S. federal government’s framework to identify, reduce, and address administrative burdens through a series of executive orders, legislative actions, and updated policies focused on improving customer experience and increasing access to government benefits.
This video documents the Digital Benefits Network's Digital Identity Community of Practice launch, covering mission review, 2025 goals, California authentication innovations, and peer networking for equitable and effective digital identity in public benefits.
Recapping the work and achievements of the Digital Benefits Network (DBN), Digital Service Network (DSN), and the State Chief Data Officers Network (CDO) in 2025.
A webinar presenting fresh data on how young adults aged 22 are faring in terms of poverty, employment, education, living arrangements, and access to public benefits.
This landscape analysis examines data, design, technology, and innovation-enabled approaches that make it easier for eligible people to enroll in, and receive, federally-funded social safety net benefits, with a focus on the earliest adaptations during the COVID-19 pandemic.
There are frameworks available that could inform the standardization of communicating rules as code for U.S. public benefits programs. The Airtable communicates the differences between the frameworks and tools. Each entry is tagged with different categories that identify the type of framework or tool it is.
This report documents four experiments exploring if AI can be used to expedite the translation of SNAP and Medicaid policies into software code for implementation in public benefits eligibility and enrollment systems under a Rules as Code approach.
Hear perspectives on topics including centering beneficiaries and workers in new ways, digital service delivery, digital identity, and automation.This video was recorded at the Digital Benefits Conference (BenCon) on June 14, 2023.
In this updated primer, the DBN describes how identity proofing and authentication show up in public benefits applications and outlines equity and security concerns raised by common identity proofing and authentication methods.