17
results found in
9 ms
Page 1
of 2
Audit on the broadband internet infrastructure access
Poland has been granted over PLN 4 billion from the European Regional Development Fund to build the broadband internet access infrastructure. As part of three operational programmes 90 percent ... of assumed financing was contracted, namely PLN 3.9 billion. By the end of 2015, Poland should complete the investment and account for the expenses. According to NIK there is a risk that the infrastructure ... construction will not be completed by the deadline and the EU funds may not be used to the full. ... ... Simpler regulations and better supervision needed ... Polish SAI audited a project, which aim had been to develop broadband internet network across the country. They revealed that legal obstacles, idleness and lack of supervision were the main causes ... of delays. Some of the projects are in danger of not being completed on time and some of the EU funds may not be fully used.
Full description
Poland has been granted over PLN 4 billion from the European Regional Development Fund to build the broadband internet access infrastructure. As part of three operational programmes 90 percent ... of assumed financing was contracted, namely PLN 3.9 billion. By the end of 2015, Poland should complete the investment and account for the expenses. According to NIK there is a risk that the infrastructure ... construction will not be completed by the deadline and the EU funds may not be used to the full. ... ... Simpler regulations and better supervision needed ... Polish SAI audited a project, which aim had been to develop broadband internet network across the country. They revealed that legal obstacles, idleness and lack of supervision were the main causes ... of delays. Some of the projects are in danger of not being completed on time and some of the EU funds may not be fully used.
Full description
Supreme Audit Office of Poland
, issued in 2015
Risk cases: 2
Public access point to the Polish e-Administration
Coordinated audit series (46 auditees) focused on a web solution applied to give an easy access to Government e-services (the project planned to be completed in 2013) The audit was performed in 2008 ... and public report issued in March 2009. Primary goal of th presentation was intended to illustrate the use of 'e-Government Algorithm' elaborated by EUROSAI IT Working Group in 2005. One of issues mede better ... known by the audit was 'Project Frameworks vs Public Procurement'. ... ... Buyer, provider and methodologies need a balance ... Presentation based on a vast audit by Polish SAI which subject was of big network project aiming to provide one access point to Government and Selfgovernments services. The presentation illustrates ... old EUROSAI IT Wg 'Algorithm approach' and focuses on procurement systemic problems.
Full description
Coordinated audit series (46 auditees) focused on a web solution applied to give an easy access to Government e-services (the project planned to be completed in 2013) The audit was performed in 2008 ... and public report issued in March 2009. Primary goal of th presentation was intended to illustrate the use of 'e-Government Algorithm' elaborated by EUROSAI IT Working Group in 2005. One of issues mede better ... known by the audit was 'Project Frameworks vs Public Procurement'. ... ... Buyer, provider and methodologies need a balance ... Presentation based on a vast audit by Polish SAI which subject was of big network project aiming to provide one access point to Government and Selfgovernments services. The presentation illustrates ... old EUROSAI IT Wg 'Algorithm approach' and focuses on procurement systemic problems.
Full description
Supreme Audit Office of Poland
, issued in 2008
Risk cases: 3
Extract from the report to the Public Accounts Committee on the access to IT systems that support the provision of essential services to the Danish society
access to the IT systems and data of the institutions. Rigsrevisionen has not examined for what specific purposes unauthorized access to the institutions’ systems and data can be used. ... The report is focused on the significant risk that is associated with inadequate management and control of domain administrator privileges, which makes it possible for unauthorized persons to obtain ... ... Inadequate management and control of domain administrator privileges ... services to the Danish society from unauthorized access, obtained on the basis of domain administrator privileges. ... The Danish report concerns the measures - taken by six government institutions of various branches of State activities - to protect IT systems and data that support the provision of essential
Full description
access to the IT systems and data of the institutions. Rigsrevisionen has not examined for what specific purposes unauthorized access to the institutions’ systems and data can be used. ... The report is focused on the significant risk that is associated with inadequate management and control of domain administrator privileges, which makes it possible for unauthorized persons to obtain ... ... Inadequate management and control of domain administrator privileges ... services to the Danish society from unauthorized access, obtained on the basis of domain administrator privileges. ... The Danish report concerns the measures - taken by six government institutions of various branches of State activities - to protect IT systems and data that support the provision of essential
Full description
National Audit Office of Denmark
, issued in 2015
Risk cases: 4
Correct information at the right time in healthcare and nursing – collaboration without effect?
The Swedish National Audit Office has conducted an audit to determine whether Government initiatives have contributed to the objective that authorised healthcare staff shall have access to the right ... patient information at the right time by means of direct electronic access. ... ... Information share is crucial for competitive health care ... Health and social care staff has very limited access to patient information from other care-giving institutions, which may lead to health damage and wrong-treatment. The cooperation between ... the Government and the municipalities must improve if the investments in better access to common patient information shall get impact in practice.
Full description
The Swedish National Audit Office has conducted an audit to determine whether Government initiatives have contributed to the objective that authorised healthcare staff shall have access to the right ... patient information at the right time by means of direct electronic access. ... ... Information share is crucial for competitive health care ... Health and social care staff has very limited access to patient information from other care-giving institutions, which may lead to health damage and wrong-treatment. The cooperation between ... the Government and the municipalities must improve if the investments in better access to common patient information shall get impact in practice.
Full description
Riksrevisionen (Swedish National Audit Office)
, issued in 2011
Risk cases: 3
Cyber Attacks: Securing Agencies’ICT Systems
were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... of sensitive personal information. Unauthorised access through electronic means, also known as cyber intrusions, can result from the actions of outside individuals or organisations. Individuals operating from ... within government may also misuse information which they are authorised to access, or may inappropriately access and use government information holdings. <br/> Audit objective was to assess selected ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... of sensitive personal information. Unauthorised access through electronic means, also known as cyber intrusions, can result from the actions of outside individuals or organisations. Individuals operating from ... within government may also misuse information which they are authorised to access, or may inappropriately access and use government information holdings. <br/> Audit objective was to assess selected ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office
, issued in 2014
Risk cases: 3
Report on the government’s processing of confidential data on persons and companies
Rigsrevisionen has examined how eight government institutions process confidential data on persons and companies in 11 selected IT systems. The report is based on IT audits carried out in connection ... with the annual audit in the spring 2014. The purpose of the audit was to assess whether confidential data on persons and companies are adequately protected by the government institutions. ... ... Inadequate protection of confidential data ... If a government institution does not protect confidential data to the extent necessary, the risk that third parties get unauthorized access to the data is very high. In opinion of the Danish SAI ... , inadequate protection of confidential data may also erode the citizens’ and companies’ confidence in government data security. That may eventually become a barrier for the continued efforts to implement ... e-government and make government administration more efficient.
Full description
Rigsrevisionen has examined how eight government institutions process confidential data on persons and companies in 11 selected IT systems. The report is based on IT audits carried out in connection ... with the annual audit in the spring 2014. The purpose of the audit was to assess whether confidential data on persons and companies are adequately protected by the government institutions. ... ... Inadequate protection of confidential data ... If a government institution does not protect confidential data to the extent necessary, the risk that third parties get unauthorized access to the data is very high. In opinion of the Danish SAI ... , inadequate protection of confidential data may also erode the citizens’ and companies’ confidence in government data security. That may eventually become a barrier for the continued efforts to implement ... e-government and make government administration more efficient.
Full description
National Audit Office of Denmark
, issued in 2014
Risk cases: 2
Management and implementation of 1BestariNet
and secondary public schools in Malaysia are equipped with high-speed 4G Internet access and a virtual learning platform, providing high-speed internet connectivity and access to a world-class Integrated Learning ... 1BestariNet Service Project (1BestariNet) is an initiative undertaken by the Malaysian Ministry of Education (MOE) to replace and enhance ICT connectivity in schools. It is an enhancement ... to the SchoolNet service which terminated on 31 December 2010 with emphasis on end-to-end solutions (E2E) network services together with Virtual Learning Environment (VLE). Under this project, 10,000 primary ... ... To answer big risks in IT systems development you need all levels of organisation ... Audit of 1BestariNet is presented by the Malaysian National Audit Department together with other IT projects reviewed. A result is this concise and instructive list of lessons learnt and failures ... to be avoided. To maximize performance and minimize vendor lock-in you need a lot of concerted effort by top and line management, as well as users ready to work with new tools.
Full description
and secondary public schools in Malaysia are equipped with high-speed 4G Internet access and a virtual learning platform, providing high-speed internet connectivity and access to a world-class Integrated Learning ... 1BestariNet Service Project (1BestariNet) is an initiative undertaken by the Malaysian Ministry of Education (MOE) to replace and enhance ICT connectivity in schools. It is an enhancement ... to the SchoolNet service which terminated on 31 December 2010 with emphasis on end-to-end solutions (E2E) network services together with Virtual Learning Environment (VLE). Under this project, 10,000 primary ... ... To answer big risks in IT systems development you need all levels of organisation ... Audit of 1BestariNet is presented by the Malaysian National Audit Department together with other IT projects reviewed. A result is this concise and instructive list of lessons learnt and failures ... to be avoided. To maximize performance and minimize vendor lock-in you need a lot of concerted effort by top and line management, as well as users ready to work with new tools.
Full description
National Audit Department of Malaysia
, issued in 2013
Risk cases: 4
Report on the problems connected with the development and implementation of the digitally based Shared Medication Record
. and relevant health staff and the patients have direct digital access to updated medical data round the clock. The report answers the following questions: 1) Has the Ministry of Health and the NHA provided ... The purpose of the examination was to assess whether the department of the Danish Ministry of Health, the Danish National eHealth Authority (NHA) and the five regions that are responsible ... for the hospitals have made an adequate effort to develop and implement the Shared Medication Record (SMR). With the SMR, data on the citizens’ medication can be shared across hospitals, general practitioners, etc ... ... Involvement of key participants necessary from the very beginning ... Digitally based Shared Medication Record is basis of the complex healthcare system. Rigsrevisionen analysed unsolved issues related to unclear business case, insufficient analysis of work flows ... and processes leading to implementation problems, governance not involving key players, and IT security organisation.
Full description
. and relevant health staff and the patients have direct digital access to updated medical data round the clock. The report answers the following questions: 1) Has the Ministry of Health and the NHA provided ... The purpose of the examination was to assess whether the department of the Danish Ministry of Health, the Danish National eHealth Authority (NHA) and the five regions that are responsible ... for the hospitals have made an adequate effort to develop and implement the Shared Medication Record (SMR). With the SMR, data on the citizens’ medication can be shared across hospitals, general practitioners, etc ... ... Involvement of key participants necessary from the very beginning ... Digitally based Shared Medication Record is basis of the complex healthcare system. Rigsrevisionen analysed unsolved issues related to unclear business case, insufficient analysis of work flows ... and processes leading to implementation problems, governance not involving key players, and IT security organisation.
Full description
National Audit Office of Denmark
, issued in 2014
Risk cases: 2
Management and protection of assets in the field of the information-communication technologies at the ME SR
control of backup's functionality), restoring and security, possibility of unauthorised persons to access the IS and data, which increases the risk of information leakage and security risk, and inadequate ... The Supreme Audit office of the Slovak Republic (SAO SR) has conducted the audit at the Ministry of Environment of the Slovak Republic (ME SR) for the audit period 2011 and 2012 to examine ... the compliance with the generally binding legal regulations and the general statues in the field of the information-communication technologies (ICT) and the information systems of the public administration (ISPA ... ... Started from contracting, ended in security ... The perceptive and filled with findings audit - conducted by the Slovak SAI - discovered the list of issues which started in careless contracting procedures, failure to update the development concept ... and ended in exposing the organization to high security risks.
Full description
control of backup's functionality), restoring and security, possibility of unauthorised persons to access the IS and data, which increases the risk of information leakage and security risk, and inadequate ... The Supreme Audit office of the Slovak Republic (SAO SR) has conducted the audit at the Ministry of Environment of the Slovak Republic (ME SR) for the audit period 2011 and 2012 to examine ... the compliance with the generally binding legal regulations and the general statues in the field of the information-communication technologies (ICT) and the information systems of the public administration (ISPA ... ... Started from contracting, ended in security ... The perceptive and filled with findings audit - conducted by the Slovak SAI - discovered the list of issues which started in careless contracting procedures, failure to update the development concept ... and ended in exposing the organization to high security risks.
Full description
Supreme Audit Office of the Slovak Republic
, issued in 2012
Risk cases: 4
Audit of the Government, Government-guaranteed and Municipal Debt Management Information Systems in the Ministry of Finance of the Republic of Bulgaria
The main audit question studied during the audit was: Are the government, government-guaranteed (SDMS) and municipal debt management information systems (CMDR) at the Ministry of Finance effective ... ? The audit covered the period from 01.01.2013 to 31.12.2013 and investigated four major areas: IT system strategy and general management; IT security and controls against disasters; Operational controls ... and Documentation; Application Controls. ... ... Even effective and modern IT systems require improvements and updates to ensure their security and accountability ... For the management of the government, government-guaranteed and municipal debt the Ministry of Finance has established an advanced integrated information infrastructure. According to Bulgarian SAI ... the established system is effective and provides updated, complete and correct information. Nevertheless the audit report points out areas of security, application controls as well as documentation as the subjects ... that need further improvement and optimization.
Full description
The main audit question studied during the audit was: Are the government, government-guaranteed (SDMS) and municipal debt management information systems (CMDR) at the Ministry of Finance effective ... ? The audit covered the period from 01.01.2013 to 31.12.2013 and investigated four major areas: IT system strategy and general management; IT security and controls against disasters; Operational controls ... and Documentation; Application Controls. ... ... Even effective and modern IT systems require improvements and updates to ensure their security and accountability ... For the management of the government, government-guaranteed and municipal debt the Ministry of Finance has established an advanced integrated information infrastructure. According to Bulgarian SAI ... the established system is effective and provides updated, complete and correct information. Nevertheless the audit report points out areas of security, application controls as well as documentation as the subjects ... that need further improvement and optimization.
Full description
Bulgarian National Audit Office
, issued in 2014
Risk cases: 3