recommended reading

Social Security statements to go online

Updated with minor changes for clarity.

The Social Security Administration is ramping up its authentication procedures to allow contributors to access their Social Security statements online instead of waiting for a once-yearly letter or contacting a field office, an agency official said.

Once the statements are up, the agency intends to make more Social Security information available online, but there are no specific service plans at this point, said Alan Lane, the agency's associate chief information officer for open government.

There is not yet a firm deadline for the statements going online, he said.

When the entire project is complete, people will be able to use a single username and password to access all Social Security's online services. The agency has contracted with an outside vendor to help verify that the people requesting usernames and passwords are who they say they are, Lane said.

SSA has been especially cautious about making its information available online because Social Security numbers are highly valuable to identity thieves, Alan Balutis, chairman of the agency's Future Systems Technology Advisory Panel, said at a May 24 meeting.

As the rest of the government moves information online and citizens begin to expect online services from government, though, SSA is under pressure to find a safe way of following suit.

Citizens who want more security than a simple username and password combination when they access their Social Security statements will be able to opt for a double authentication process, Lane said. That will involve entering a newly generated personal identification number that's been texted to a preregistered cellphone, he said.

If the agency adds more sensitive services, it may require a double authentication with every log in, he said.

SSA is in the middle of a major technical overhaul to manage the onslaught of retiring baby boomers in the coming years.

The agency also has launched a series of Web initiatives to better communicate with increasingly tech-savvy retirees, including online videos featuring retirement age luminaries such as Patty Duke and Star Trek's George Takei.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.