4 minute read

Notes

250 | Revisiting Targeting in Social Assistance

• Developing dynamic intake processes so that all who are eligible can apply promptly rather than waiting years for the chance. • Developing routine or ongoing recertification and exit processes with a periodicity to match the program objectives and expected dynamics of changes in households’ welfare. • Preparing in advance for expectable disasters and crises, with triggers and emergency rules of operation laid out. • Building the client interface systems and capacities to run the programs well, with good governance and convenience for clients. • Upgrading practices for data management and data protection apace with the greater use of technology in delivery systems.

Notes

1. https://socialprotection-humanrights.org/framework/. 2. The program has recently been transformed and no longer exists as a conditional cash transfer due to shifts in the social policy in Mexico. 3. Quilombolas communities are the current inhabitants of quilombos who were organized by fugitive African-American slaves in remote and hard-to-find areas. Nowadays, the quilombolas population is mostly composed of descendants who lived, in their majority, from subsistence agriculture on donated, bought, or long-occupied lands. According to the Commisão Pro-Índio de São

Paulo, in 2019, there were 3,386 quilombolas communities across the country, but only 181 had land titles, while 1,719 were pursuing the process of acquiring legal title. For more on this, see Gaspar (2009). 4. Some questions are related to physical characteristics of the household; characteristics of household members, such as education level, employment status of the household head, and/or working-age adults; income information for all household members; description of the household’s assets; and some basic household expenses (for example, rent and utilities). 5. https://www.apc.org/en/news/extreme-poverty-and-digital-welfare-new -report-un-special-rapporteur-extreme-poverty-raises. 6. Diagnostics on reducing barriers to inclusion in ID systems may include dimensions such as whether there are women-only registration units; mobile or door-to-door services; outreach and information campaigns; forms in local languages or braille; multilingual personnel or staff trained to assist disabled or illiterate groups; allowing nonbinary gender categories and procedures for changing gender attributes; and alternative procedures for those who are unable to provide biometrics, proof of citizenship, or other supporting documents for enrollment/authentication (World Bank 2018a). 7. Foundational ID systems (such as civil registries, national IDs, population registers, and so forth) are created to serve as authoritative sources of legal identity information for the general population and to provide proof of identity for a variety of public and private sector use cases. See World Bank (2019a, xiv).

Improving Targeting Outcomes through Attention to Delivery Systems | 251

8. Estimations based on data from the Global ID4D Dataset 2018, accessed from https://datacatalog.worldbank.org/dataset/identification-development -global-dataset. 9. Know-your-customer refers to the process of verifying the identity of applicants, either at the time of application or during cross-verification checks. 10. https://www.worldbank.org/en/news/feature/2016/02/04/pakistan-building -equality-for-women-on-a-foundation-of-identity. 11. During the COVID-19 crisis, the usual distinction between local and nonlocal hukou workers was temporary relaxed, and dibao eligibility was expanded to unemployed, low-income migrant workers. 12. The family certificate is an official document issued in several countries (Algeria, Belgium, China, France, Germany, Japan, the Republic of Korea,

Morocco, Switzerland, and Vietnam). It consists of a collection of extracts from civil status documents relating to a family (births, deaths, marriages, and divorces). This type of document could be used by social programs as proof of family composition. The same objective can be achieved in countries that operate digital civil registries. The digital civil registry could identify the family unit—parents and minor children—based on the information from birth and death certificates. See https://www.service-public.fr/particuliers/vosdroits/N31784. 13. See “Fraud and Error in the Benefit System, 2017/18 Estimates,” Department of Work and Pensions, www.dwp.gov.uk. 14. As an example, in Sierra Leone, in setting up the first cash transfer program in 2014–16, several steps were taken to reduce errors in this stage, among them: (1) financial literacy was assessed and enrollment information related to the payment system was designed in graphical form to facilitate use of the payment system; and (2) to keep both administrative costs for the program and travel costs for participants reasonable, communities were grouped into clusters with enrollment carried out in the lead community of the cluster. 15. Fraud refers to intentional behavior on the part of the benefit claimant to obtain a benefit to which she/he is not entitled, or a larger one. Error refers to unintentional mistakes on behalf of benefit claimants or staff in the benefit office. When the error is made by the claimant, it is called a customer error; if it is made by program staff, it is called an official error. 16. https://www.calpnetwork.org/wp-content/uploads/2020/01/phl-ctp-final.pdf; http://documents1.worldbank.org/curated/en/967551504637043989/pdf /Typhoon-Yolanda-Haiyan-and-the-case-for-building-an-emergency-cash -transfer-program-in-the-Philippines.pdf. 17. See Oseni et al. (2021) for a consolidated guidebook. 18. For example, in Colombia, in the municipal offices involved with the social registry, one-third of the staff have been in their positions only one or two years. 19. https://uidai.gov.in/ecosystem/training-testing-certification-ecosystem.html. 20. To get into the program, applicants may underreport or misreport some of their circumstances, if these are difficult or impossible to verify. 21. Data privacy is about the proper handling of data—how it is collected, stored, and used—and maintaining compliance with agreements and consent. 22. Data protection refers to who gets access to data and protecting it from unauthorized users through encryption, key management, and authentication. 23. https://www.unsystem.org/personal-data-protection-and-privacy-principles.

This article is from: