This report from the Joint Financial Management Improvement Program outlines efforts to use identity verification to reduce improper payments in government programs, while mitigating bias and disparate impacts.
The Joint Financial Management Improvement Program (JFMIP)
In December 2024, the Digital Benefits Network released an updated open dataset on authentication and identity proofing requirements across various public benefits applications to highlight best practices and areas for improvement in identity management.
This simulator, created by the Joint Financial Management and Improvement Program (JFMIP), allows users to model program performance for a hypothetical government program, based on different identity verification decisions. The simulator illustrates concepts from the JFMIP report on payment integrity.
Joint Financial Management and Improvement Program (JFMIP)
In this webinar, the Center on Budget and Policy Priorities and the Digital Benefits Network explored key terms related to digital identity, and provided ecosystem-level context on how authentication and identity proofing may show up in the online benefits experience and impact clients.
On May 19, 2023, the Digital Benefits Network published a new, open dataset documenting authentication and identity proofing requirements across online SNAP, WIC, TANF, Medicaid, child care (CCAP)applications, and unemployment insurance applications. This page includes data and observations about authentication and identity proofing steps specifically for online unemployment insurance applications.
The Department of Homeland Security's Biometric and Identity Technology Center (BI-TC) has hosted Biometric Technology Rallies to test new and emerging biometric technologies since 2018. This website hosts information about the 2022 and 2023 rallies.
Remote identify proofing is the process federal agencies and other entities use to verify that the individuals who apply online for benefits and services are who they claim to be. If the applicant responds correctly to personal questions, their identity is considered to be verified. However, data stolen in recent breaches could be used fraudulently to respond to knowledge-based verification questions. Alternative methods are available that provide stronger security, but these methods may have limitations in cost, convenience, technological maturity, and they may not be viable for all segments of the public.
On July 16, members of the Digital Identity Community of practice gathered to learn how peers are gathering beneficiary feedback on their experiences with accounts and proving their identity.