This resource contains specific examples that highlight the advantages of designing reusable code components, software tools, or design formats. This guide also illustrates the possibilities for connecting new components to existing system infrastructure.
This page includes data and observations about authentication and identity proofing steps specifically for online applications that include MAGI Medicaid.
DGN Spotlights are short-form project profiles that feature exciting work happening across our network of digital government practitioners. Spotlights celebrate our members’ stories, lift up actionable takeaways for other practitioners, and put the resources + examples we host in the Digital Government Hub in context.
This guide provides a detailed overview summarizing the many initiatives and activities from Congress, the White House, federal agencies, and coalitions which may impact the digital identity landscape in the United States, including at state, local, Tribal, and territorial levels.
An overview video describing the Digital Identity Risk Management process outlined in NIST's Digital Identity Guidelines, which organizations can use to develop a risk-based approach to identity management.
This FormFest profile highlights Rachael Zuppke and Molly Graham’s work to redesign Michigan’s civil court forms using human-centered design, making them more accessible for people who must represent themselves in critical cases like eviction, family law, and guardianship.
NYC Opportunity collaborated with the Administration for Child Services (ACS) to design a family-centered process for prevention services, addressing confusion and lack of choice in the current system. By creating tools like the Provider Profile and Family Voice booklet, the team empowered families to choose providers based on their needs while ensuring their feedback reaches ACS. The project aims to improve family experiences and communication with ACS, with plans to expand through testing and future innovations like a web portal.
Government leaders discuss how to ensure seamless access to public benefits through breaking down silos, user-friendly digital identities, and privacy-focused security measures.