170
results found in
13 ms
Page 15
of 17
Products sold on the European market: unravelling the system of CE marking
Problems with general picture The Netherlands National Court of Audit was interested in finding out whether anyone keeps track of all the actors involved in the process of system of European Union product markings. The interest was aroused by an observation that the vast majority of the questions raised about the system were prompted by incidents and that the questioners did not generally appear to be interested in the operation of the system as a whole...
Full description
Problems with general picture The Netherlands National Court of Audit was interested in finding out whether anyone keeps track of all the actors involved in the process of system of European Union product markings. The interest was aroused by an observation that the vast majority of the questions raised about the system were prompted by incidents and that the questioners did not generally appear to be interested in the operation of the system as a whole...
Full description
The Netherlands Court of Audit
, issued in 2017
Risk cases: 5
Swedish Customs control – an accurate enterprise?
It is better to know your own errors Control activities play an important role in successful work of Customs Service. Lack of thoroughful analysis of own errors can lead to ineffective use of some tools, and as a result, to difficulty in focus identification.
Full description
It is better to know your own errors Control activities play an important role in successful work of Customs Service. Lack of thoroughful analysis of own errors can lead to ineffective use of some tools, and as a result, to difficulty in focus identification.
Full description
Swedish National Audit Office
, issued in 2019
Risk cases: 4
The protection of research data at the Danish universities
The protection of research data at the Danish universities It is Rigsrevisionen’s assessment that the five largest universities are not adequately protecting their research data against unknown IT equipment. As a result, foreign actors may relatively easy gain unauthorized access to the universities’ research data.This is not considered satisfactory by Rigsrevisionen. The study shows that the five largest universities have defined guidelines for researchers’ use of software and hardware centrally, but that they have failed to centralise efforts to maintain a satisfactory level of security for research data. This is due mainly to the fact that, at some universities, researchers are allowed to bring their own devices,and at all the universities, researchers are allowed to have local administrator privileges, which gives them access to install software. Additionally, all five universities know of incidents where unknown hardware has been connected to their network.
Full description
The protection of research data at the Danish universities It is Rigsrevisionen’s assessment that the five largest universities are not adequately protecting their research data against unknown IT equipment. As a result, foreign actors may relatively easy gain unauthorized access to the universities’ research data.This is not considered satisfactory by Rigsrevisionen. The study shows that the five largest universities have defined guidelines for researchers’ use of software and hardware centrally, but that they have failed to centralise efforts to maintain a satisfactory level of security for research data. This is due mainly to the fact that, at some universities, researchers are allowed to bring their own devices,and at all the universities, researchers are allowed to have local administrator privileges, which gives them access to install software. Additionally, all five universities know of incidents where unknown hardware has been connected to their network.
Full description
National Audit Office of Denmark
, issued in 2018
Risk cases: 3
The rural broadband programme
Intervention in a noncompetitive market The British NAO's audit report of 2013 concerns ambitious yet delayed UK government programme, which objective was to have the best superfast broadband network in Europe by 2015. The report focuses on one of the programme's main problems: rural areas, where commercial providers had no plans to invest, because of lower returns.
Full description
Intervention in a noncompetitive market The British NAO's audit report of 2013 concerns ambitious yet delayed UK government programme, which objective was to have the best superfast broadband network in Europe by 2015. The report focuses on one of the programme's main problems: rural areas, where commercial providers had no plans to invest, because of lower returns.
Full description
National Audit Office
, issued in 2013
Risk cases: 7
The development and use of identification services in public administration
The audit examined the implementation and coordination of projects aimed at developing identification services in public administration, cooperation among authorities in this area and compliance ... with legislation in procuring services. The audit also examined development, control and monitoring structures regarding identification services. The audit focused on electronic identification services that are used ... in public administration's electronic transactions. ... ... Unhealthy competition linked with lack of coordinatnion and with procurement irregularities ... See what may go wrong with the IT public procurement. Check out what is the basis to avoid irregularities or omissions in complying with public procurement legislation. National Audit Office ... of Finland identified also risks resulting from lack of horizontal coordination.
Full description
The audit examined the implementation and coordination of projects aimed at developing identification services in public administration, cooperation among authorities in this area and compliance ... with legislation in procuring services. The audit also examined development, control and monitoring structures regarding identification services. The audit focused on electronic identification services that are used ... in public administration's electronic transactions. ... ... Unhealthy competition linked with lack of coordinatnion and with procurement irregularities ... See what may go wrong with the IT public procurement. Check out what is the basis to avoid irregularities or omissions in complying with public procurement legislation. National Audit Office ... of Finland identified also risks resulting from lack of horizontal coordination.
Full description
National Audit Office of Finland
, issued in 2008
Risk cases: 3
Report to the Public AccountsCommittee on mitigation of cyber attacks
This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... of attacks: - technical restriction of download of programmes; - limited use of local administrators; - systematic software updates. Rigsrevisionen has assessed whether the government bodies in the study ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... of attacks: - technical restriction of download of programmes; - limited use of local administrators; - systematic software updates. Rigsrevisionen has assessed whether the government bodies in the study ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
National Audit Office of Denmark
, issued in 2013
Risk cases: 3
Analysis of alternatively financed building projects of the Federal Institutes ofTechnology
Analysis of alternatively financed building projects Hundreds of millions was invested by third parties in the Swiss Confederation's real estate portfolio and analyses show a net return of over 4% for investors. Early exit from this alternative financing must be examined to get some advantages and greater attention must be paid to the economic effectiveness for future financing models.
Full description
Analysis of alternatively financed building projects Hundreds of millions was invested by third parties in the Swiss Confederation's real estate portfolio and analyses show a net return of over 4% for investors. Early exit from this alternative financing must be examined to get some advantages and greater attention must be paid to the economic effectiveness for future financing models.
Full description
Swiss Federal Audit Office
, issued in 2017
Risk cases: 2
The Annual Municipal Accounts as a basis for comparing municipalities - are the cost indicator reliable?
Municipal accounting: more standardized or more controlled Municipalities report among others, their costs, which cannot be directly attributed to any specific activity, product, or service. Standardized taxonomies exist, but they are not applied uniformly. Swedish NAO traces ramifications: lower ability to compare municipalities' data and need of more central level control.
Full description
Municipal accounting: more standardized or more controlled Municipalities report among others, their costs, which cannot be directly attributed to any specific activity, product, or service. Standardized taxonomies exist, but they are not applied uniformly. Swedish NAO traces ramifications: lower ability to compare municipalities' data and need of more central level control.
Full description
Swedish National Audit Office
, issued in 2018
Risk cases: 3
Recovery of housing allowance - easy to make mistakes
Avoid mistakes in housing allowance recovery Housing allowance recovery rules are complex and outdated. What more, ad hoc changes can result in unpredicted deficiencies. The Swedish NAO found that monitoring and evaluation based analysis is of critical importance to avoid problems on the administration side - and what much more important: on the side of financialy vulnerable households.
Full description
Avoid mistakes in housing allowance recovery Housing allowance recovery rules are complex and outdated. What more, ad hoc changes can result in unpredicted deficiencies. The Swedish NAO found that monitoring and evaluation based analysis is of critical importance to avoid problems on the administration side - and what much more important: on the side of financialy vulnerable households.
Full description
Swedish National Audit Office
, issued in 2018
Risk cases: 4
Broadband: Observations on Past and Ongoing Efforts to Expand Access and Improve Mapping Data
Successful broadband delivery with challenges Review of the GAO audits concerned with broadband deployment, expecially across areas where costs are high and returns on the investment are low.
Full description
Successful broadband delivery with challenges Review of the GAO audits concerned with broadband deployment, expecially across areas where costs are high and returns on the investment are low.
Full description
US Government Accountability Office
, issued in 2020
Risk cases: 5