Our existing maze of family tax benefits — including the CTC, Earned Income Tax Credit (EITC), Child and Dependent Care Tax Credit (CDCTC), and head of household (HoH) filing status — has several structural deficiencies that make overhauling the system a prerequisite for any effort to boost support for families with children. The report offers several options for expanding and streamlining family tax benefits to address these issues.
This report outlines strategies states can adopt to improve access to SNAP, Medicaid, and WIC programs by leveraging policy options, data coordination, and streamlined service delivery.
Delve into our exploration of the executive orders, legislation, and administrative rules and guidance that shape government digital transformation across states and territories with our database and visualization tools.
This landscape analysis examines data, design, technology, and innovation-enabled approaches that make it easier for eligible people to enroll in, and receive, federally-funded social safety net benefits, with a focus on the earliest adaptations during the COVID-19 pandemic.
The GAO placed the UI system on its High Risk List in June 2022, leading the DOL to develop a transformation plan detailing activities and strategies for building a resilient UI system capable of responding effectively to future economic challenges.
APHSA established a working group to identify strengths, barriers, and opportunities for better system alignment in human services for young parents and children, leading to the development of a roadmap to support meaningful systems-level changes.
American Public Human Services Association (APHSA)
The Center on Budget and Policy Priorities (CBPP) report highlights the disproportionate hardships faced by Black and Latina mothers during the COVID-19 pandemic, exacerbated by systemic inequities.
This section of the Building Resilience plan outlines comprehensive strategies to help states prevent, detect, and recover unemployment insurance (UI) fraud while protecting legitimate claimants.
This page includes data and observations about authentication and identity proofing steps specifically for online applications that include child care applications.
Concerns over risks from generative artificial intelligence systems have increased significantly over the past year, driven in large part by the advent of increasingly capable large language models. But, how do AI developers attempt to control the outputs of these models? This primer outlines four commonly used techniques and explains why this objective is so challenging.
Center for Security and Emerging Technology (CSET)