Supporting Statement - 0789

Supporting Statement - 0789.docx

SSA's Public Credentialing and Authentication Process

OMB: 0960-0789

Document [docx]
Download: docx | pdf

Supporting Statement for

Social Security Administration’s Public Credentialing and

Authentication Process

20 CFR 401.45, 20 CFR 402

OMB No. 0960-0789


A. Justification


1. Introduction/Authoring Laws and Regulations

The Social Security Administration (SSA: we, us, etc.) is continuing its public credentialing and authentication process that provides secure access to SSA’s electronic services.


We collect and maintain the customers’ personally identifiable information (PII) in our Central Repository of Electronic Authentication Data Master File Privacy Act system of records, which we published in the Federal Register (December 17, 2010, at 75 FR 79065). The PII may include but is not limited to the customer’s full name, address, date of birth, Social Security number, phone number, and other types of identity information [e.g., address information of persons from the W-2 and Schedule Self-Employed forms we receive electronically for our programmatic purposes as permitted by 26 USC 6103(l)(1)A)]. We may also collect knowledge-based authentication data, which is information customers establish with us or that we already maintain in our existing Privacy Act system of records.


We retain the data necessary to administer and maintain our Digital Identity infrastructure. This includes management and profile information, such as blocked accounts, failed access data, effective date of passwords, and other data that allows us to evaluate the system’s effectiveness. The data we maintain also may include archived transaction data and historical data.


We collect, maintain, and distribute confidential and non-confidential information in accordance with 42 U.S.C. 1306, 20 CFR 401 and 402, 5 U.S.C. 552 (Freedom of Information Act), 5 U.S.C. 552a (Privacy Act of 1974, as amended), Internal Revenue Code (26 U.S.C. § 6103(l)(1)(A)), Federal Information Security Modernization Act of 2014 (Title III) of the E-Government Act of 2002 (Pub.L. 107-347, section 301), and OMB Circular No. A-130.


This is a renewal of our current public credentialing and authentication process.


2. Description of Collection

The Social Security Administration offers a number of services through its MySocialSecurity web application. Because these services include sensitive and personal information about earnings records, as well as the opportunity to submit and track certain benefits applications, it is critical that Social Security ensures an individual’s identity is properly verified and credentialed prior to granting access to MySocialSecurity. This information collection establishes the information we must solicit to authenticate identities both remotely and in-person. SSA continually develops new methods for credentialing identities both remotely and in-person to facilitate ease of use while also upholding stringent identity verification requirements.


With this process, we offer consistent authentication across our secured online services. We allow our customers to request and maintain only one User ID, consisting of a self‑selected Username and Password, and the entry of a one-time security code to the customer’s registered email address or cell phone number to access multiple Social Security electronic services. Originally designed in accordance with the Office of Management and Budget (OMB) Memorandum M-04-04 (now obsolete) and the National Institute of Standards and Technology (NIST) Special Publication 800-63, this process provides the means of authenticating customers of our secured electronic services and streamlines access to those services.


Additionally, as of December 5, 2020, we recently enhanced our identity proofing (account registration) process to use driver license or state identification verification. We also reduced the agency’s reliance on knowledge-based authentication (KBA), which is our out of wallet (OOW) quiz process.  These enhancements improve both security and usability for our customers. We made these changes to allow the agency to move towards compliance with the NIST Special Publication 800-63-3 guidelines.


Our public credentialing and authentication process:

  • Issues a single User ID to any enumerated customer who wants to do business online with the agency and meets the eligibility criteria;

  • Partners with an external Identity Services Provider (ISP) to provide data for us to verify the identity of our online customers;

  • Offers access to some of our heaviest, but more sensitive, workloads online while providing us an acceptable level of confidence in the identity of the person requesting access to these services;

  • Offers an in-person identity verification process for those who are uncomfortable with, or unable to use, the online process;

  • Uses a risk-based approach to balance security ease of use, compliance, cost, and feasibility consideration; and

  • Provides a user-friendly means for the public to conduct extended business with us online instead of visiting local servicing offices or requesting information over the phone.


We use the information from this collection to identity proof and authenticate our customers online and to allow them access to their personal information from our records. We also use this information to provide second factor authentication. We are committed to expanding and improving this process so we can grant access to additional online services in the future.


Offering online services is not only an important part of meeting our goals, but is vital to good public service. In increasing numbers, the public expects to conduct complex business online. Ensuring our online services are both secure and user-friendly is our priority. With the limited data we have, it is difficult for us to meet the OMB and NIST authentication guidelines for identity proofing the public. Therefore, we awarded a competitively bid contract to an ISP, Equifax1, to help us verify the identity of our online customers.  We use this ISP, in addition to our other authentication methods, to help us prove, or verify, the identity of our customers when they are completing online, electronic transactions with us.


Social Security’s Digital Identity Strategy

We remain committed to enhancing our online services using digital identity processes, which balance usability and security. We continue to research and develop new digital identity capabilities while monitoring emerging threats.


The following are key components of our digital identity procedures:


Enrollment and Identity Verification


Individuals who meet the following eligibility requirements may enroll:

  • Must have a valid email address;

  • Must have a valid Social Security number (SSN);

  • Must have a domestic address of record (includes military addresses); and

  • Must be at least 18 years of age.


We collect identifying data and use SSA and ISP records to verify an individual’s identity. Individuals have the option of opting in or opting out of the new registration process. When customers select the “Create Account” button, the system presents them with a new temporary screen that informs customers that they can opt in/opt out of the new registration process. If the customer chooses to opt-in, the system may redirect them to the new version of registration which allows for verification of driver’s license or state identification information. If they choose to opt-out, the system redirects them to the current production version of our registration process. We may also ask the customer to provide certain financial information (e.g., Medicare wages, self-employed earnings, the last eight digits of a credit card number or the last direct deposit amount from Social Security benefits) for verification. We may also ask individuals to answer out‑of‑wallet questions so we can further verify their identities. Individuals who are unable to complete the process online can present identification at a field office to obtain a User ID.


  • Establishing the Credential The individual self-selects a username and password, both of which can be of variable length, and alphanumeric. The password may also include special characters. We provide a password strength indicator to help the individual select a strong password. We also ask the individual to choose challenge questions for use in restoring a lost or forgotten username or password.


  • Provide an Enrollment Code

When registering for a new account using a state ID, we provide a one-time enrollment code to a verified address that the customer provided during the registration process. To be issued a credential, the customer must enter the enrollment code received. The address of record could be digital (email or SMS text to a cell phone) or it could be the customers physical address. If the customer receives the enrollment code digitally and it is successfully verified, this digital address is automatically set up as the customer’s second factor of authentication. Customers who receive an enrollment code via mail may return at a later time to enter their second factor and finish setting up the account.


  • Provide a Second Factor

We ask individuals to provide a text message enabled cell phone number or an email address. We consider the cell phone number or email address the second factor of authentication. We send a security code to the individuals’ selected second factor. We require the individuals to confirm its receipt by entering the security code online.  Subsequently, each time the individuals attempt to sign in to their online accounts, we will also send a message with a one-time security code to the individuals’ selected second factor. The individuals must enter the security code along with their usernames and passwords. The code is valid for only 10 minutes. If the individual does not enter the code within 10 minutes of receiving it, or tries unsuccessfully to enter the code three times within ten minutes, the code expires, and the individual must request another code. A customer can request an unlimited number of security codes online.


If the customer chooses to receive security codes by text message, his or her cell phone rates may apply dependent on the type of cell phone plan. A customer who closes or signs out of the current session will receive another unique security code each time he or she signs back in.



If the customer chooses email, the email address registered to the account will display. The customer can change it or correct it if needed. There will only be one email address registered to each account. If the email address is enabled to receive security codes then it will display the first two characters followed by asterisks.


  • Sign in and Use Our authentication process provides an individual with a User ID for access to our sensitive online Social Security services. Second factor authentication requires the individual to sign in with a username, password, and a one-time security code sent to the individual’s selected second factor. We expanded our existing capabilities to require second factor authentication for every online sign in.  We also allow for maintenance of the second factor options. An individual who forgets the password can reset it automatically without contacting us.


Remote Identity Proofing Process

The enrollment process is a one-time only activity. We require individuals to agree to the “Terms of Service” detailed on our web site before we allow them to begin the enrollment process. The “Terms of Service” inform the individuals what we will and will not do with their personal information and provides the privacy and security protections on all data we collect. These terms also detail the consequences of misusing this service.


To verify an individual’s identity, we ask the individual to give us personal information, which may include:

  • Name;

  • Social Security number;

  • Date of birth;

  • Residential mailing address;

  • Phone number (suggested);

  • E-mail address;

  • State Identification Documents (Driver’s License, Learner’s Permit, or State Identification Card information)

  • Financial information; and


We send a subset of this information to the ISP, who may also generate a series of out‑of‑wallet questions back to the individual. The individual must answer all or most of the questions correctly before continuing in the process. The exact questions generated are unique to each individual.


This collection of information, or a subset of it, is mandatory for respondents who want to do business with us via the Internet. We collect this information via the Internet, on our public-facing website. We also offer an in-person identification verification process for individuals who cannot, or are not willing, to register online. For the in‑person process, the individual must go to a local SSA field office (or USPS post office for those areas participating in our pilot process) and provide identifying information. We do not ask for financial information with the in‑person process.


We only collect the identity verification information one time, when the individual registers for a credential. We ask for the User ID (Username and password) along with a security code sent to the individual’s selected second factor every time an individual signs in to our automated services.


The respondents are individuals who choose to use the Internet or Automated Telephone Response System to conduct business with us.


3. Use of Information Technology to Collect the Information

We collect this information electronically via the Internet through our public-facing website, www.socialsecurity.gov, under the agency’s Government Paperwork Elimination Act plan. We also collect this information through an in-person process for those who cannot, or choose not to, complete the registration online. For the in-person process, the individual provides the information to an SSA representative during a field office interview (or to a mail clerk in a USPS post office, for those participating in our pilot program). The representative enters the information via an Intranet customer service application. Approximately 6 percent of respondents use the in-person process to register for a User ID. Approximately 94 percent of respondents use the online process. Approximately 55% of the individuals who try to identity proof online are unsuccessful.


4. Why We Cannot Use Duplicate Information

The nature of the information we collect and the manner in which we collect it would normally preclude duplication. Although we currently use other collection instruments to obtain similar data, this identity verification, public credentialing, and authentication process offers the public additional features the applications noted below do not, for example, enhanced identity verification, access to multiple Social Security electronic services, and enhancement or upgrade of User IDs. Our other authentication processes, listed below, do not include these features.


  • RISA – Request for Internet and Automated 800# Services – Knowledge-Based Authentication for the Individual, OMB #0960-0596

  • IRES – Single Sign-On (SSO) & Integrated Registration Services for Business Services Online (BSO), OMB #0960-0626


Further, this identity verification, public credentialing, and authentication process will eventually absorb and replace the existing collections (mentioned above). We plan to accomplish this work through a series of annual releases. Additional releases will reduce the burden of the existing collections. We will prepare change requests for the existing collections to adjust the burden as needed.


5. Minimizing Burden on Small Respondents

This collection does not affect small businesses or other small entities.


6. Consequence of Not Collecting Information or Collecting it Less Frequently

Failure to collect this information to verify an individual’s identity would result in our non-compliance with OMB & NIST guidelines (NIST SP 800-63) and the Executive Order 13681. In addition, failure in our ability to verify the requesters’ identity would result in our inability to respond to their requests. Making this service available electronically saves the requester the effort of phoning a Social Security TeleService Center representative or visiting a Social Security field office, and it saves our staff time. We only collect this information on an as-needed basis; therefore, we cannot collect it less frequently. There are no technical or legal obstacles that prevent burden reduction.


7. Special Circumstances

There are no special circumstances that would cause Social Security to conduct this information collection in a manner inconsistent with 5 CFR 1320.5.


8. Solicitation of Public Comment and Other Consultations with the Public

The 60-day advance Federal Register Notice published on August 28, 2020, at 85 FR 53428, and we received no public comments. The 30-day FRN published on November 4, 2020 at 85 FR 70216. If we receive any comments in response to this Notice, we will forward them to OMB.


We will continue to conduct usability testing with members of the public, both beneficiaries and non-beneficiaries, as we build upon and enhance this process. We conduct the usability testing under our usability testing customer satisfaction survey, OMB No. 0960-0788.


9. Payment or Gifts to Respondents

Social Security does not provide payments or gifts to the respondents.


10. Assurances of Confidentiality

We can make disclosures without individual authorization only for purposes stated at the time of data collection (purposes typically identified in a system of records’ routine use provisions), or specifically consented to thereafter by each of the parties to whom we provided the promise of confidentiality. We collect, maintain, and distribute confidential and non-confidential information in accordance with 42 U.S.C. 1306, 20 CFR 401 and 402, 5 U.S.C. 552 (Freedom of Information Act), 5 U.S.C. 552a (Privacy Act of 1974), Internal Revenue Code (26 U.S.C. 6103(l)(1)(A)), Federal Information Security Modernization Act of 2014 (Title III) of the E-Government Act of 2002 (P.L. 107-347), and OMB Circular No. A-130.


11. Justification for Sensitive Questions

We ask questions of a sensitive nature in this Information Collection. We ask the respondents some knowledge-based, “out-of-wallet” questions, and we ask the respondents some “shared secret” questions. We may ask the respondents for financial information. Before we ask for any information, the respondents must read, and agree to our “Terms of Service,” which serves to acknowledge and indicate their consent to provide us with sensitive information. The “Terms of Service” explain what we will, and will not do with the information; it describes the responder’s responsibilities; and it explains our legal authority for collecting the information.


Out-of-Wallet Questions

The ISP incorporates both public and private data to allow generation and evaluation of questions uniquely pertaining to a given consumer. We call these “out-of-wallet” questions. The ISP designs these questions so only the individual would know the answer. If someone stole the consumer’s wallet, the identity thief should not be able to answer these questions.


The categories of questions are as follows:


  1. Credit questions – These questions incorporate information from the Credit Report of a consumer. The types of questions in the group are about specific lenders, dates, and terms of loans.


  1. Non-credit questions – These are questions derived from various public and private databases. The types of questions in this group vary from automobile related questions, to questions on previous residences, to questions on professions or licenses, etc.


These questions are important because we use them to protect and verify an individual’s identity. We must ensure only the true individuals can access their personal information. We ask these questions only once, and in multiple-choice format, when the respondent enrolls to create an account with us. (See the screen package for examples of these questions.)


We do not have access to the information the individual provides to the ISP. We do not retain or have access to any of the information – questions and answers – after the transaction takes place.


Financial Information

We may ask the individual to provide financial account information. We ask them to provide financial account information in the form of W-2 information; self-employment information from tax returns; monthly benefit direct deposit amount; or the last eight digits of a credit card. We confirm financial account information as another way of ensuring an individual’s identity, using our own records or, in the case of the last eight digits of a credit card, using the ISP’s records. The information the individuals provide does not allow us to access or view their financial accounts or credit records.  Providing this information is optional. We only ask for financial information one time, when the respondent enrolls to create a Social Security account. If the individuals are uncomfortable about giving us financial account information, they can still sign up for an account by visiting their local Social Security field office in person. We do not require financial information as part of the in-person process.


  Shared Secrets

We collect shared secrets from the individuals to use as password reset questions to improve customer service and reduce workloads and costs. If the individuals lose or forget their password, we ask the three questions we established with the individuals during account setup when they originally created the User ID. The individuals must provide correct answers, consistent with the answers on record, to all three questions.


During registration, we ask the individuals to select and answer three password reset questions. We grouped these questions into three sets dealing loosely with persons, places, and things. The individuals must select one question from each of the following categories:

  • Relationship questions;

  • Geographic questions; and

  • Objective questions.


Once the individuals provide correct answers to their shared secrets questions, the system will allow them to reset their password.


12. Estimates of Public Reporting Burden

Based on our current management information data, we estimate that 61,861,262 respondents use the Internet process annually to create and/or manage an account with us and then authenticate to gain access to our secured online services. We estimate that it takes an average of 8 minutes to complete a transaction, and 1 minute for a sign in transaction, resulting in an annual reporting burden of 1,949,824 hours. Additionally, we calculated a separate cost burden associated with this process (see #13 below).


Based on our current data, we estimate that 2,295,983 respondents annually visit an SSA field office where we use the Intranet process to create and manage an account with us. We estimate that it takes an average of 8 minutes to complete this transaction, resulting in an annual reporting burden of 306,131 hours. We did not calculate a separate cost burden for this process.


We use different modalities to collect the information, via the Internet and the Intranet. We included an estimated number of registrations and sign-ins when we calculated the total number of annual respondents. We estimated the number of minutes for completion by averaging the “time-on-task” figures we obtained from our usability testing. See the chart below with the updated figures:


Modality of Completion

Number of Respondents

Frequency of Response

Average Burden Per Response (minutes)

Estimated Total Annual Burden (hours)

Average Theoretical Hourly Cost Amount (dollars)*

Average Wait Time in Field Office (minutes)**

Total Annual Opportunity Cost (dollars)***

Internet Registration

7,875,448

1

8

1,050,060

$25.72*


$27,007,543***

Internet Sign-Ins

53,985,814

1

1

899,764

$25.72*


$23,141,930***


Intranet Registration (RCS)

2,295,983

1

8

306,131

$25.72*

24**

$7,873,689***

USPS Pilot Intranet Registration (RC)

2,400

1

8

320

$25.72*

24**

$32,922***

Totals

64,159,645



2,256,275



$58,056,084***

*We based this figures on average U.S. citizen’s hourly salary, as reported by Bureau of Labor Statistics data (https://www.bls.gov/oes/current/oes_stru.htm).


**We based this figure on the average FY 2020 wait times for field offices, based on our current management information data.


***This figure does not represent actual costs that we are imposing on recipients of Social Security payments to complete this application; rather, these are theoretical opportunity costs for the additional time respondents will spend to complete the application. There is no actual charge to respondents to complete the application.


In addition, OMB’s Office of Information and Regulatory Affairs is requiring SSA to use a rough estimate of a 30-minute, one-way, drive time in our calculations of the time burden for this collection. OIRA based their estimation on a spatial analysis of SSA’s current field office locations and the location of the average population centers based on census tract information, which likely represents a 13.97 mile driving distance for one-way travel. We depict this on the chart below:





Total Number of Respondents Who Visit a Field Office

Frequency of Response

Average One-Way Travel Time to a Field Office (minutes)

Estimated Total Travel Time to a Field Office (hours)

Total Annual Opportunity Cost for Travel Time (dollars)****

2,298,383

1

30

1,149,192

$29,557,218****

****We based this dollar amount on the Average Theoretical Hourly Cost Amount in dollars shown on the burden chart above.


Per OIRA, we include this travel time burden estimate under the 5 CFR 1320.8(a)(4), which requires us to provide “time, effort, or financial resources expended by persons [for]…transmitting, or otherwise disclosing the information,” as well as 5 CFR 1320.8(b)(3)(iii) which requires us to estimate “the average burden collection…to the extent practicable.” SSA notes that we do not obtain or maintain any data on travel times to a field office, nor do we have any data which shows that the average respondent drives to a field office, rather than using any other mode of transport. SSA also acknowledges that respondents’ mode of travel and, therefore, travel times vary widely dependent on region, mode of travel, and actual proximity to a field office.

NOTE: We included the total total opportunity cost estimate from this chart in our calculations when showing the total time and opportunity cost estimates in the paragraph below.


We base our burden estimates on current management information data, which includes data from actual interviews, as well as from years of conducting this information collection. Per our management information data, we believe that 8 minutes accurately shows the average burden per response for reading the instructions, gathering the facts, and answering the questions for registration, and 1 minute accurately shows the average burden per response to access the system for registered users. Based on our current management information data, the current burden information we provided is accurate. The total burden for this collection instrument is 2,255,955 burden hours (reflecting SSA management information data), which results in an associated theoretical (not actual) opportunity cost financial burden of $87,613,302. SSA does not charge respondents to complete our applications.


13. Annual Cost to the Respondents

There may be a cost burden to the respondents if respondents choose cell phone as the second factor. These costs could be incurred at registration, sign in, or when they contact us over the phone. However, since these costs are associated with the respondent’s chosen cell phone carrier, we do not estimate these costs in this ICR to avoid conjecture. Based on our knowledge of current cell phone plans, we estimate the costs could be as follows:

Short Message Service (SMS) cost – code sent via text message using SMS to the individual customer.

  • For the customer who receives the SMS code and does not have a text plan: the current cost could range from 10 cents to 20 cents per message.

  • For the customer who has a limited text plan: the cost would just be included as part of the plan. We have no way to estimate this cost.

  • For the customer who has an unlimited text plan, there would be no charge. The customer would have paid for this service as part of the plan. We have no way to estimate cost.

We estimate that 88% of U.S. cell phones have unlimited texting.


14. Annual Cost to Federal Government

The total cost to the Federal Government is approximately $18,018,340. This estimate accounts for costs from the following areas: (1) SSA employee (e.g., field office, 800 number, DDS staff) information collection and processing time; (2) systems development, updating, and maintenance costs for the electronic systems; and (3) the costs we listed below for our partnership for ISP expenses incurred via two tasks: a development and maintenance task, and a transaction task.


Here we break down the costs for the ISP as well as for systems development, updating, and maintenance costs:


ISP Costs

A key component of our registration and authentication process, which manifests itself as both an Internet application and an Intranet application, is the partnership with an ISP for the verification of personal information. We pay the ISP for expenses incurred via two tasks: a development and maintenance task and a transaction task. Currently, development and maintenance costs are approximately $529,554.00; and transaction costs are approximately $5,206,360.40 (the average cost per transaction is $0.92); totaling $5,735,914.40.


Social Security Costs

Social Security’s internal costs to develop and maintain the eAccess and RCS processes for the past three years are displayed in the following table.


Electronic Access - Actual Costs

FY18 – FY20*





FY18

FY19

FY20*

Development

$0.00

$2,919,607

$4,033,820

Maintenance

$473,108

$291,534

$151,439

Total

$473,108

$3,211,141

$4,185,259

* FY20 thru 06/30/2020.


We also included costs of $8,097,167 for SSA employees to collect and process the information. We based this cost on a GS-11 salary, at 8 minutes per respondent for the Intranet respondents only (since respondents who use the Internet typically do not need help from SSA staff). We have no other costs associated with this information collection.



15. Program Changes or Adjustments to the Information Collection Request

The burden decrease is due to removing the individualized burden for Advance Designation users, as we have rolled those into the total for the Internet Registration users. The increase in burden is due to the continuing expansion of our online services and the increase in the number of individuals who register for a credential so they can come online to do business with us.


Eventually, this identity verification, public credentialing, and authentication process will absorb and replace the existing authentication collections under OMB Control Numbers 0960-0596 and 0960-0626. We plan to accomplish this work through a series of annual releases. The future releases will reduce the burdens in the other existing authentication collections. We will continue to prepare change requests for the other existing authentication collections, as needed.


Future Plans


Due to the agile nature of our projects, we expect to move more applications to our my Social Security landing page, which customers access through the electronic access authentication, or allow direct access. At this time, we are still finalizing our IT modernization plans for these changes. We expect to submit another change request within six to nine months of this renewal submission to request approval for additional updates to the system, and potentially, update the burden again to include more customers if we are able to move more applications to our my Social Security landing page.


16. Plans for Publication Information Collection Results

We will not publish the results of the information collection.


17. Displaying the OMB Approval Expiration Date

We are not requesting an exception to the requirement to display the OMB approval expiration date.


  1. Exceptions to Certification Statement

We are not requesting an exception to the certification requirements at 5 CFR 1320.9 and related provisions at 5 CFR 1320.8(b)(3).


B. Collections of Information Employing Statistical Methods

Social Security does not use statistical methods for this information collection.

1 Equifax is a global information solutions provider. Equifax’s solutions help Social Security to manage risk and mitigate fraud.

12


File Typeapplication/vnd.openxmlformats-officedocument.wordprocessingml.document
File Title2010OMBPkg
AuthorMary Wisz
File Modified0000-00-00
File Created2022-05-12

© 2024 OMB.report | Privacy Policy