Use and Misuse of Social Security Numbers


Book Description




Social Security Numbers


Book Description

The SSN was created in 1936 to track workers' earnings and eligibility for Social Security (SS) benefits. Since that time, the SSN has been used for many non-SS purposes, and private sector use of the SSN has grown. This has raised concern over how this personal info. is being used and protected, esp. with the growth in electronic record keep. and the explosion of info. over the Internet, combined with a rise in identity theft. This report studied: the extent and nature of Fed., state, and county gov't. agencies' use of SSNs; the actions gov't. agencies take to safeguard SSNs from improper use; the extent and nature of Fed., state, and county governments' use of SSNs when they are in public records (PR); and the options available to safeguard SSNs when they are in PR.




Understanding SSI (Supplemental Security Income)


Book Description

This publication informs advocates & others in interested agencies & organizations about supplemental security income (SSI) eligibility requirements & processes. It will assist you in helping people apply for, establish eligibility for, & continue to receive SSI benefits for as long as they remain eligible. This publication can also be used as a training manual & as a reference tool. Discusses those who are blind or disabled, living arrangements, overpayments, the appeals process, application process, eligibility requirements, SSI resources, documents you will need when you apply, work incentives, & much more.




Improving the Social Security Representative Payee Program


Book Description

More than 7 million recipients of Social Security benefits have a representative payee-a person or an organization-to receive or manage their benefits. These payees manage Old Age, Survivors and Disability Insurance funds for retirees, surviving spouses, children, and the disabled, and they manage Supplemental Security Income payments to disabled, blind, or elderly people with limited income and resources. More than half of the beneficiaries with a representative payee are minor children; the rest are adults, often elderly, whose mental or physical incapacity prevents them from acting on their own behalf, and people who have been deemed incapable under state guardianship laws. The funds are managed through the Representative Payee Program of the Social Security Administration (SSA). The funds total almost $4 billion a month, and there are more than 5.3 million representative payees. In 2004 Congress required the commissioner of the SSA to conduct a one-time survey to determine how payments to individual and organizational representative payees are being managed and used on behalf of the beneficiaries.1 To carry out this work, the SSA requested a study by the National Academies, which appointed the Committee on Social Security Representative Payees. This report is the result of that study. Improving the Social Security Representative Payee Program: Serving Beneficiaries and Minimizing Misuse (1) assesses the extent to which representative payees are not performing their duties in accordance with SSA standards for representative payee conduct, (2) explains whether the representative payment policies are practical and appropriate, (3) identifies the types of representative payees that have the highest risk of misuse of benefits, and (4) finds ways to reduce the risk of misuse of benefits and ways to better protect beneficiaries.




Social Security Numbers


Book Description

The federal government uses SSNs as unique identifiers for many purposes, including employment, taxation, law enforcement, and benefits. However, SSNs are also key pieces of identifying information that potentially may be used to perpetrate identity theft. GAO was asked to review federal government efforts to reduce the collection and use of SSNs. This report examines (1) what governmentwide initiatives have been undertaken to assist agencies in eliminating their unnecessary use of SSNs and (2) the extent to which agencies have developed and executed plans to eliminate the unnecessary use and display of SSNs and have identified challenges associated with those efforts. To do so, GAO analyzed reports and guidance on protecting SSNs. GAO also analyzed SSN reduction plans and other documents, administered a questionnaire, and interviewed officials from the 24 CFO Act agencies.




Why Social Security?


Book Description




Social Security Numbers


Book Description

While the use of Social Security numbers (SSN) can be very beneficial to the public sector, SSNs are also a key piece of information used for committing identity crimes. The widespread use of SSNs by both the public and private sectors and their display in public records have raised concern over how SSNs might be misused and how they should be protected. In light of this concern, GAO was asked to examine (1) the extent to which SSNs are visible in records made available to the public, (2) the reasons for which governments collect SSNs in records that display them to the public, and (3) the formats in which these records are stored and ways that the public gains access to them. As well as looking at public records, GAO also examined the practices of several federal agencies regarding the display of entire nine-digit SSNs on health insurance and other identification cards issued under their authority.




Social Security


Book Description

A Documentary History tells the story of the creation and development of the U.S. Social Security program through primary source documents, from its antecendents and founding in 1935, to the controversial issues of the present. This unique reference presents the complex history of Social Security in an accessible volume that highlights the program's major moments and events.




The Unpredictable Certainty


Book Description

This book contains a key component of the NII 2000 project of the Computer Science and Telecommunications Board, a set of white papers that contributed to and complements the project's final report, The Unpredictable Certainty: Information Infrastructure Through 2000, which was published in the spring of 1996. That report was disseminated widely and was well received by its sponsors and a variety of audiences in government, industry, and academia. Constraints on staff time and availability delayed the publication of these white papers, which offer details on a number of issues and positions relating to the deployment of information infrastructure.