The Benefits Enrollment Field Guide looks at the landscape of America’s safety net benefits experience in 2023 and tracks the differences from our 2019 assessment based on expanded evaluation criteria. It also highlights successful paths to equitable, human-centered experiences. It examines online enrollment for Modified Adjusted Gross Income (MAGI) Medicaid, SNAP, TANF, the Child Care Assistance Program (CCAP), and WIC.
The Enterprise Single Sign-On (SSO) Playbook is a practical guide to help federal agencies implement or modernize an SSO service for federal employee access to government applications.
In May 2020, Stanford's HAI hosted a workshop to discuss the performance of facial recognition technologies that included leading computer scientists, legal scholars, and representatives from industry, government, and civil society. The white paper this workshop produced seeks to answer key questions in improving understandings of this rapidly changing space.
An overview video describing the Digital Identity Risk Management process outlined in NIST's Digital Identity Guidelines, which organizations can use to develop a risk-based approach to identity management.
On May 19, 2023, the Digital Benefits Network published a new, open dataset documenting authentication and identity proofing requirements across online SNAP, WIC, TANF, Medicaid, child care (CCAP) applications, and unemployment insurance applications.
This visualized report is a first first-of-its-kind view of the state of benefits applications across the nation from a client perspective, including information on application availability online, combined benefit applications, application completion times, as well as login and identity proofing requirements.
This post argues that for the types of large-scale, organized fraud attacks that many state benefits systems saw during the pandemic, solutions grounded in cybersecurity methods may be far more effective than creating or adopting automated systems.
Remote identify proofing is the process federal agencies and other entities use to verify that the individuals who apply online for benefits and services are who they claim to be. If the applicant responds correctly to personal questions, their identity is considered to be verified. However, data stolen in recent breaches could be used fraudulently to respond to knowledge-based verification questions. Alternative methods are available that provide stronger security, but these methods may have limitations in cost, convenience, technological maturity, and they may not be viable for all segments of the public.