SpruceID Blog

Thoughtful perspectives on identity, interoperability, and the systems that turn public policy into usable services.

Why Digital Identity Credentials Need to Work Across State Lines, And How to Make It Happen

Why Digital Identity Credentials Need to Work Across State Lines, And How to Make It Happen

As workforce mobility increases, the ability for credentials to move seamlessly across jurisdictions will depend more on the digital infrastructure behind them.
How to Evaluate Document Intake Vendors: 6 Questions State CIOs Should Ask

How to Evaluate Document Intake Vendors: 6 Questions State CIOs Should Ask

Before signing a document intake contract, every state CIO should be able to answer seven questions that determine whether the system will actually work in production.
What Is Interoperability in Government Digital Services? (And Why It's Not Optional)

What Is Interoperability in Government Digital Services? (And Why It's Not Optional)

In modern government, interoperability isn’t an IT feature. It’s the foundation of accessible, compliant public service.
How to Build a Digital ID People Actually Want to Use: 5 Lessons From the Field

How to Build a Digital ID People Actually Want to Use: 5 Lessons From the Field

The success of digital ID isn’t measured by credentials issued, but by how often people reach for it in real life.
Digital Identity In America: Series Overview

Digital Identity In America: Series Overview

An executive guide to SpruceID’s multi-part series on the future of digital identity in the U.S.
Digital Identity: End User Experience

Digital Identity: End User Experience

Part 8 of SpruceID’s Digital Identity in America Series
From Paper to Structured Data: The Missing Link in Government Digital Services

From Paper to Structured Data: The Missing Link in Government Digital Services

Governments already have the information they need; it’s just locked inside documents. This post explains how modern document capture, OCR, and validation turn paperwork into structured data that systems can actually use, enabling faster decisions and fewer errors.
Digital Identity Beyond Credentials: What Governments Actually Need

Digital Identity Beyond Credentials: What Governments Actually Need

Digital identity is more than issuing credentials. This piece explains how identity underpins access, fraud prevention, and service delivery — and why governments need flexible, standards-based identity infrastructure instead of single-purpose tools.
Applying Zero Trust to Government Data Flows

Applying Zero Trust to Government Data Flows

Zero Trust isn’t just a network model; it’s a way of handling data safely as it moves through government systems. This post explains how Zero Trust principles apply to document intake, identity checks, and service delivery, ensuring access is verified at every step without slowing users down.
Modernizing Government Systems Without Replacing Them

Modernizing Government Systems Without Replacing Them

Most agencies can’t rip and replace legacy systems — and shouldn’t have to. This post explains how modern APIs, identity layers, and workflow tools can extend existing systems without disrupting operations or increasing risk.
Why Privacy-Preserving Design Matters in Public Services

Why Privacy-Preserving Design Matters in Public Services

Public trust depends on how data is handled. This post explains privacy-by-design principles, selective disclosure, and why minimizing data exposure is just as important as securing it.
Secure by Design: Building Systems That Assume Breach

Secure by Design: Building Systems That Assume Breach

Modern government systems must assume compromise and design accordingly. This article covers encryption, device trust, least-privilege access, and how to build systems that remain safe even when parts fail.