112
results found in
14 ms
Page 9
of 12
Is Cybercrime Combated Effectively
Good coordination needed to fight cybercrime SAI Lithuania noticed that with the growing amount of cybercrimes, the society must be prepared to recognise the threats of cybercrime and be able to protect itself from them. There is a number of forces capable of preventing and investigating this type of crime, but auditors identified shortcomings in cybercrime prevention and investigation processes, starting from lack of common taxonomy and criteria.
Full description
Good coordination needed to fight cybercrime SAI Lithuania noticed that with the growing amount of cybercrimes, the society must be prepared to recognise the threats of cybercrime and be able to protect itself from them. There is a number of forces capable of preventing and investigating this type of crime, but auditors identified shortcomings in cybercrime prevention and investigation processes, starting from lack of common taxonomy and criteria.
Full description
National Audit Office of the Republic of Lithuania
, issued in 2020
Risk cases: 6
Analysis of alternatively financed building projects of the Federal Institutes ofTechnology
Analysis of alternatively financed building projects Hundreds of millions was invested by third parties in the Swiss Confederation's real estate portfolio and analyses show a net return of over 4% for investors. Early exit from this alternative financing must be examined to get some advantages and greater attention must be paid to the economic effectiveness for future financing models.
Full description
Analysis of alternatively financed building projects Hundreds of millions was invested by third parties in the Swiss Confederation's real estate portfolio and analyses show a net return of over 4% for investors. Early exit from this alternative financing must be examined to get some advantages and greater attention must be paid to the economic effectiveness for future financing models.
Full description
Swiss Federal Audit Office
, issued in 2017
Risk cases: 2
Recovery of housing allowance - easy to make mistakes
Avoid mistakes in housing allowance recovery Housing allowance recovery rules are complex and outdated. What more, ad hoc changes can result in unpredicted deficiencies. The Swedish NAO found that monitoring and evaluation based analysis is of critical importance to avoid problems on the administration side - and what much more important: on the side of financialy vulnerable households.
Full description
Avoid mistakes in housing allowance recovery Housing allowance recovery rules are complex and outdated. What more, ad hoc changes can result in unpredicted deficiencies. The Swedish NAO found that monitoring and evaluation based analysis is of critical importance to avoid problems on the administration side - and what much more important: on the side of financialy vulnerable households.
Full description
Swedish National Audit Office
, issued in 2018
Risk cases: 4
Has Public Administration Used All Opportunities for Efficient Management of ICT Infrastructure?
Efficient Management of ICT Infrastructure Centralised management of ICT services and infrastructure would allow the institutions to optimise in long run their resources – financial, human, material and technical. However, we observed during the audit that the move towards ICT centralisation and single data centres has ceased. The different ministries and even the institutions subordinated to the same ministry do not cooperate sufficiently with each other regarding the ICT management, maintenance, and infrastructure placement. They rather choose to maintain their own, sometimes even several, data centres.
Full description
Efficient Management of ICT Infrastructure Centralised management of ICT services and infrastructure would allow the institutions to optimise in long run their resources – financial, human, material and technical. However, we observed during the audit that the move towards ICT centralisation and single data centres has ceased. The different ministries and even the institutions subordinated to the same ministry do not cooperate sufficiently with each other regarding the ICT management, maintenance, and infrastructure placement. They rather choose to maintain their own, sometimes even several, data centres.
Full description
State Audit Office of the Republic of Latvia
, issued in 2019
Risk cases: 3
The Actıvıtıes Carrıed out wıthın the Framework of e-Transformatıon Turkey Project
'e-Transformation Turkey' Project Turkish SAI report presents a checklist of issues, which were spotted during the large scale e-Government transformation.
Full description
'e-Transformation Turkey' Project Turkish SAI report presents a checklist of issues, which were spotted during the large scale e-Government transformation.
Full description
Turkish Court of Accounts
, issued in 2006
Risk cases: 4
Building and Implementing the Phoenix Pay System
Expensive IT project became a failure Phoenix project (development of states pay system) was an incomprehensible failure of project management and oversight. Phoenix executives prioritized certain aspects, such as schedule and budget, over other critical ones, such as functionality and security. Phoenix executives did not understand the importance of warnings that the Miramichi Pay Centre, departments and agencies, and the new system were not ready. They did not provide complete and accurate information to deputy ministers and associate deputy ministers of departments and agencies, including the Deputy Minister of Public Services and Procurement, when briefing them on Phoenix readiness for implementation.
Full description
Expensive IT project became a failure Phoenix project (development of states pay system) was an incomprehensible failure of project management and oversight. Phoenix executives prioritized certain aspects, such as schedule and budget, over other critical ones, such as functionality and security. Phoenix executives did not understand the importance of warnings that the Miramichi Pay Centre, departments and agencies, and the new system were not ready. They did not provide complete and accurate information to deputy ministers and associate deputy ministers of departments and agencies, including the Deputy Minister of Public Services and Procurement, when briefing them on Phoenix readiness for implementation.
Full description
Office of theAuditor Generalof Canada
, issued in 2018
Risk cases: 3
The protection of research data at the Danish universities
The protection of research data at the Danish universities It is Rigsrevisionen’s assessment that the five largest universities are not adequately protecting their research data against unknown IT equipment. As a result, foreign actors may relatively easy gain unauthorized access to the universities’ research data.This is not considered satisfactory by Rigsrevisionen. The study shows that the five largest universities have defined guidelines for researchers’ use of software and hardware centrally, but that they have failed to centralise efforts to maintain a satisfactory level of security for research data. This is due mainly to the fact that, at some universities, researchers are allowed to bring their own devices,and at all the universities, researchers are allowed to have local administrator privileges, which gives them access to install software. Additionally, all five universities know of incidents where unknown hardware has been connected to their network.
Full description
The protection of research data at the Danish universities It is Rigsrevisionen’s assessment that the five largest universities are not adequately protecting their research data against unknown IT equipment. As a result, foreign actors may relatively easy gain unauthorized access to the universities’ research data.This is not considered satisfactory by Rigsrevisionen. The study shows that the five largest universities have defined guidelines for researchers’ use of software and hardware centrally, but that they have failed to centralise efforts to maintain a satisfactory level of security for research data. This is due mainly to the fact that, at some universities, researchers are allowed to bring their own devices,and at all the universities, researchers are allowed to have local administrator privileges, which gives them access to install software. Additionally, all five universities know of incidents where unknown hardware has been connected to their network.
Full description
National Audit Office of Denmark
, issued in 2018
Risk cases: 3
Supply of food and medicinal products
Supply of food and medicinal products Deficiencies in emergency preparedness and weaknesses in governance are still found by the Swedish NAO in the system of safeguarding supply of food and medicinal products. The system is complex and NAO appreciates efforts made by responsible agencies. However, they found also insufficient clarity in division of responsibilities and weaknesses in coordinantion.
Full description
Supply of food and medicinal products Deficiencies in emergency preparedness and weaknesses in governance are still found by the Swedish NAO in the system of safeguarding supply of food and medicinal products. The system is complex and NAO appreciates efforts made by responsible agencies. However, they found also insufficient clarity in division of responsibilities and weaknesses in coordinantion.
Full description
Swedish National Audit Office
, issued in 2018
Risk cases: 2
The Public Web Sites During a Period of Transmission to e-Government
Websites of e-Transformation Turkish auditors bring back their audit of 2006, in which they, among others reveiwed public websites during a period of transmission to e-Governmentbasics of the e-Transformation project.
Full description
Websites of e-Transformation Turkish auditors bring back their audit of 2006, in which they, among others reveiwed public websites during a period of transmission to e-Governmentbasics of the e-Transformation project.
Full description
Turkish Court of Accounts
, issued in 2006
Risk cases: 6
Data security and positions with access to confidential information
This government wide audit on information security and positions with access to confidential information has been performed at all ministries ans for each ministry also at one of the agencies ... . The 2007 Civil Service Data Information Security Decree (in Dutch: VIR 2007) is the legal foundation of the first part of this audit (data security). The Security Screening Act (in Dutch: WVO ... ) is the foundation of the second part (positions with access to confidential information). Only four of the organizations we have audited show an acceptible level of compliance with the 2007 Civil Service Data ... ... Shortcomings in information security and in positions with access to confidential information ... Surprising weaknesses were revealed by the NCA in its Government-wide operational audit performed as part of the 2011 audit into the state of central government accounts: Poor quality of data ... protection policy and poor protection of information systems. Also, non vetted positions with access to confidential information.
Full description
This government wide audit on information security and positions with access to confidential information has been performed at all ministries ans for each ministry also at one of the agencies ... . The 2007 Civil Service Data Information Security Decree (in Dutch: VIR 2007) is the legal foundation of the first part of this audit (data security). The Security Screening Act (in Dutch: WVO ... ) is the foundation of the second part (positions with access to confidential information). Only four of the organizations we have audited show an acceptible level of compliance with the 2007 Civil Service Data ... ... Shortcomings in information security and in positions with access to confidential information ... Surprising weaknesses were revealed by the NCA in its Government-wide operational audit performed as part of the 2011 audit into the state of central government accounts: Poor quality of data ... protection policy and poor protection of information systems. Also, non vetted positions with access to confidential information.
Full description
Netherlands Court of Audits
, issued in 2012
Risk cases: 3