Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
59 results found in 9 ms Page 1 of 6
Whether Disclosure of the Public Sector Data Is Ensured
Strategy more important than declarations Why open data are so dificult to become reality? Lithuania possesses the elements required to disclose data but lacks a strategic approach. The report by SAI Lithuania reviews all critical elements of this problem. Most of them look like a pattern reproduced by other countries. And one important thing: the SAI Lithuania opened their own data - exactly on the day of publication of the audit report!
Full description
National Audit Office of the Republic of Lithuania , issued in 2016
Risk cases: 9
Digitisation of municipal services
and the private sector. The municipal sector is a significant provider of public services, and digitisation of municipal services is therefore essential for achieving this goal.<br/>The audit surveyed the status ... The purpose of digitisation is to increase the quality and efficiency of public services. It is a goal to make online services the norm for public administration's communication with citizens ... , assessed the significance of and possible obstacles to digitisation of municipal services. The audit examined how the Ministry of Local Government and Modernisation's use of policy instruments contributes ... ... Municipalities have not digitised their services to any extent ... Digitisation increases the quality and efficiency of public services and municipal sector is a significant provider of public services. Report of Riksrevisjonen of Norway shows however ... , that municipalities need a substantial support to execute this demanding task. To provide them with help, the central government has to coordinate own efforts first.
Full description
Office of the Auditor General of Norway , issued in 2016
Risk cases: 2
Report to the Public AccountsCommittee on mitigation of cyber attacks
This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... of attacks: - technical restriction of download of programmes; - limited use of local administrators; - systematic software updates. Rigsrevisionen has assessed whether the government bodies in the study ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
National Audit Office of Denmark , issued in 2013
Risk cases: 3
Good Practice in Annual Reports 2016-17
Reporting: a real skill The Building Public Trust Awards, sponsored by PwC, have been running for 15 years and the British NAO co-sponsors the public sector award. The Good Practices in annual reports 2016-2017 present eye-opening examples of how to make complex reports easily understandable and how to clearly outline goals and achievement of them.
Full description
National Audit Office , issued in 2018
Risk cases: 4
The development and use of identification services in public administration
The audit examined the implementation and coordination of projects aimed at developing identification services in public administration, cooperation among authorities in this area and compliance ... in public administration's electronic transactions. ... with legislation in procuring services. The audit also examined development, control and monitoring structures regarding identification services. The audit focused on electronic identification services that are used ... ... Unhealthy competition linked with lack of coordinatnion and with procurement irregularities ... See what may go wrong with the IT public procurement. Check out what is the basis to avoid irregularities or omissions in complying with public procurement legislation. National Audit Office ... of Finland identified also risks resulting from lack of horizontal coordination.
Full description
National Audit Office of Finland , issued in 2008
Risk cases: 3
Protection of automatically processed personal data
protection conforms to the data processing practices; - personal data is properly processed at public sector bodies; - the State Data Protection Inspectorate (SDPI) performs sufficient supervision ... of the Interior, Information Society Development Committee under the Ministry of Transport and Communications, and public establishment Central Project Management Agency. ... Over the past few years, a number of legal, management, supervision, information, and methodological issues related to the protection of personal data have piled up. As they have not been fully ... ... Data protection needs a long term strategy ... not addressed by the existing legislation. Moreover, SAI of Lithuania revealed failures in organization and control of personal data protection by public sector. ... Rapid development of information and communication technology continuously brings about issues of personal data protection. Due to lack of long-term vision in this area they are frequently
Full description
National Audit Office of the Republic of Lithuania , issued in 2013
Risk cases: 2
Usability of public digital services directed at businesses
G2B - in search of user friendliness Danish Rigsrevisionen finds that the digital services directed at businesses, examined during this audit, are not sufficiently user-friendly from start to finish, and the authorities need to focus more on ensuring that relevant solutions are interlinked in a userfriendly manner.
Full description
National Audit Office of Denmark , issued in 2015
Risk cases: 3
Has Public Administration Used All Opportunities for Efficient Management of ICT Infrastructure?
Efficient Management of ICT Infrastructure Centralised management of ICT services and infrastructure would allow the institutions to optimise in long run their resources – financial, human, material and technical. However, we observed during the audit that the move towards ICT centralisation and single data centres has ceased. The different ministries and even the institutions subordinated to the same ministry do not cooperate sufficiently with each other regarding the ICT management, maintenance, and infrastructure placement. They rather choose to maintain their own, sometimes even several, data centres.
Full description
State Audit Office of the Republic of Latvia , issued in 2019
Risk cases: 3
Public access point to the Polish e-Administration
and public report issued in March 2009. Primary goal of th presentation was intended to illustrate the use of 'e-Government Algorithm' elaborated by EUROSAI IT Working Group in 2005. One of issues mede better ... known by the audit was 'Project Frameworks vs Public Procurement'. ... Coordinated audit series (46 auditees) focused on a web solution applied to give an easy access to Government e-services (the project planned to be completed in 2013) The audit was performed in 2008 ... ... Buyer, provider and methodologies need a balance ... Presentation based on a vast audit by Polish SAI which subject was of big network project aiming to provide one access point to Government and Selfgovernments services. The presentation illustrates ... old EUROSAI IT Wg 'Algorithm approach' and focuses on procurement systemic problems.
Full description
Supreme Audit Office of Poland , issued in 2008
Risk cases: 3
Extract from the report to the Public Accounts Committee on the access to IT systems that support the provision of essential services to the Danish society
The report is focused on the significant risk that is associated with inadequate management and control of domain administrator privileges, which makes it possible for unauthorized persons to obtain ... access to the IT systems and data of the institutions. Rigsrevisionen has not examined for what specific purposes unauthorized access to the institutions’ systems and data can be used. ... ... Inadequate management and control of domain administrator privileges ... The Danish report concerns the measures - taken by six government institutions of various branches of State activities - to protect IT systems and data that support the provision of essential ... services to the Danish society from unauthorized access, obtained on the basis of domain administrator privileges.
Full description
National Audit Office of Denmark , issued in 2015
Risk cases: 4
59 results found. Page 1 of 6 next