Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
114 results found in 12 ms Page 6 of 12
Report on the government’s processing of confidential data on persons and companies
Rigsrevisionen has examined how eight government institutions process confidential data on persons and companies in 11 selected IT systems. The report is based on IT audits carried out in connection ... with the annual audit in the spring 2014. The purpose of the audit was to assess whether confidential data on persons and companies are adequately protected by the government institutions. ... ... Inadequate protection of confidential data ... , inadequate protection of confidential data may also erode the citizens’ and companies’ confidence in government data security. That may eventually become a barrier for the continued efforts to implement ... If a government institution does not protect confidential data to the extent necessary, the risk that third parties get unauthorized access to the data is very high. In opinion of the Danish SAI ... e-government and make government administration more efficient.
Full description
National Audit Office of Denmark , issued in 2014
Risk cases: 2
VETERANS’ HEALTH CARE - Preliminary Observations on VHA’s Claims Processing Delays and Efforts to Improve the Timeliness of Payments to Community Providers
existing VA care in the community programs, as required by law, the agency said it will examine strategies for improving the timeliness and accuracy of its payments to community providers.<br ... Due to increases in expenditures and utilization of VA care in the community services in recent years, VHA has had difficulty processing claims in a timely manner. In planning to consolidate its ... /> This statement, which is based on ongoing work, summarizes GAO’s preliminary observations about (1) VHA’s, Medicare’s, and TRICARE’s claims processing timeliness in fiscal year 2015; (2) factors that have impeded ... Data processing hold back by technology limitation, workload and administrative burden ... US GAO analyzed all factors of slower processing and user unfriendliness that occur sometimes to the veterans healthcare. The main focus is data processing - and it has been proved that it can ... be failing not only because of technology, but also because of work-process design, staff and organisation.
Full description
General Accountability Office , issued in 2016
Risk cases: 6
Management of Information Resources of the Ministry of the Interior
information systems. Whereas the Ministry has failed to implement some of the public audit recommendations of 2007 and 2010,6 we analysed, whether there have been any positive changes in the field of IT ... works is being implemented7 and the Information Technology and Communications Department under the Ministry of the Interior was appointed one of the four public IT service providers. <br/> The purpose ... Many activities of the Ministry of the Interior require the use of information resources that are of great significance to the entire State, such as the state and departmental registers, and public ... ... Process maturity examination can help in IT audit ... Main risk areas in case of this audit were strategic and organisational - Ministry’s weak ownership of IT resources, insufficient audit and internal control function. SAI Lithuania auditors found ... also flaws in change management and security processes. But the finding, which gave them the key to the root cause of problems, was connected with maturity assessment of the auditee's IT processes.
Full description
National Audit Office of the Republic of Lithuania , issued in 2016
Risk cases: 4
Report to the Public AccountsCommittee on mitigation of cyber attacks
have addressed the risk of cyber attacks and whether they have implemented these three security controls. ... This report concerns the action taken by Danish government bodies to prevent cyber attacks. Behaving sensibly in cyberspace to avoid attacks is important, but should be supplemented by technical ... security controls that can increase security and mitigate cyber attacks. International studies have concluded that three central security controls can prevent the majority of the currently known types ... Three basic security measures are often neglected ... Government agencies are open for cyber attacks because they often forget to respect three basic IT security measures. The three measures are: 1. technical restriction on programs downloading; 2 ... . limited use of local administrators rights; 3. systematic software updates.
Full description
National Audit Office of Denmark , issued in 2013
Risk cases: 3
Coordination of Infrastructure Works by Metropolitan Municipalities
in daily life, create financial burden and necessitate effective solutions. The purpose of this audit is to ensure that metropolitan municipalities eradicate defects in implementation, and Ministry ... Rapid population growth at metropoles as well as dense and planless structuring, especially in İstanbul and Ankara, have lead to an increase in demand for utilities services and consequently ... , in the resources used for the construction and maintenance of utilities. Moreover, in cities with dense population, damages to roads and sidewalks during the construction and maintenance of utilities cause problems ... ... ... Start geographic information system with cooperation rules and digital maps ... Organization of geographic and infrastructure information systems is an especially difficult task when bacause vast and intense coordination is necessary. The Turkisch Court of Accounts lists ... problems that reduce use and rise costs of this fundamental task.
Full description
Turkish Court of Accounts , issued in 2008
Risk cases: 2
Parallel Audit on Biometric Passports - Overall Results (anonymised)
and implementing the regulation on standards for security features and biometrics in passports and travel documents issued by the member states. The aim is to develop and maintain efficient and secure biometric ... A biometric passport (or ePassport) contains biometric information which serves to authenticate the identity of travellers. Biometric passport management is the process of establishing ... passport production procedures (see page 5). ... EUROSAI ITWG: Parallel Audit on Biometric Passports ... Swiss SAI summed up results of audits concluded in seven countries (Belgium, Latvia, Lithuania, Norway, Portugal, Switzerland). The evaluation of the reported results showed that the overall passport ... process is generally under control while a couple of high-risk findings were identified in the non-process-specific assessments. In the non-process-specific assessments, most of the countries found ... deficiencies and weaknesses related to the IS/IT system and the IT management. Medium risks have been identified in the area of laws and regulations, cost-benefit realisation and transparency, as well
Full description
Swiss Federal Audit Office , issued in 2015
Risk cases: 4
The Ministry of the Environment lacks a compact information system and still uses 125 separate information systems and databases
The objective of the audit was to scrutinise the management of funds earmarked for the purchase and administration of ICT within the MoE and selected organisations which come under the management ... of the MoE. The audit identified the following risks: (1) non-existence of the Integrated environmental information system (IEIS) as an independent information system; (2) purchase of ICT, within the budget ... chapter of the MoE, through a state co-funded organisation CENIA which comes under the management of the MoE; (3) utilisation of the information systems. The audited period was 2010 to 2013; where relevant ... ... Ministry of the Environment manages 125 information systems and databases ... systems (more than 125 information systems and databases) are designed, implemented and managed as individual information systems without a direct integration into a joint point of reference. ... The Ministry of the Environment (MoE) has for more than 20 years a legal obligation to administer and manage an Integrated Environmental Information System (IEIS). In spite of this fact, the existing
Full description
Supreme Audit Office of Czech Republic , issued in 2015
Risk cases: 7
The Board of Audit and Inspection (BAI) conducted an audit on the information systems in the area of service delivery to improve the system’s efficiency and convenience.
Korea was recognized as an Information Technology (IT) powerhouse by the international community of the UN in 2010. Such an achievement is attributable to the significant investments that the Korean ... government has commissioned toward improving the country’s information infrastructure within a short period of time.<br/> The government is investing 1 trillion won every year in an e-government project ... for citizens in the welfare and employment sectors by utilizing the renewed information infrastructure.<br/> However, the information system of some government ministries proved to have overlapping functions ... Enormous IT investments require tremendous coordination ... and the speed, the information technologies are implemented with, cause some problems to be tackled. The SAI Korea turns special atention to two of them: overlapping functionalities and interconnectivity issues. ... Korean government is investing 1 trillion won in e-government projectsevery year. Thus, the country has earned a reputation for the IT powerhouse. Apart from undeniable advantages, the huge scale
Full description
Board of Audit and Inspection of Korea , issued in 2011
Risk cases: 3
Management of State Information Resources
. Audit procedures were performed in all major institutions which form and implement the policy of information resources: Ministry of Transport and Communications, Ministry of the Interior, Ministry ... The objective of the audit was to assess effectiveness of the management of the state information resources and of the use of their possibilities: suitability of the chosen state resources management ... model; rationality of the use of the State Budget funds when managing information resources; use of the possibilities of the state information resources to improve the performance of the public sector ... Well targeted requirements, interconnected information resources and broad use - why so difficult to be gained? ... The leading idea of the 'Approach to Management of State Information Resources' programme was to entrench a comprehensive management of data resources. After five years preparations, the desired ... momentum was still not the case. SAI Lithuania analysed roots of the problems: concept, poor use of funds, lack of interconnections, unsatified users.
Full description
National Audit Office of the Republic of Lithuania , issued in 2013
Risk cases: 3
Performance Audit of the Georgian Government electronic Procurement system
and fraud, which in return supports the successful implementation of country’s anti-corruption policy. To develop such environment, the system must provide confidentiality, integrity and availability ... State procurement is one of the key components of public financial management. Its share in state budget is approximately 25 percent. Effective management of state procurements is an important sphere ... of interest for the State Audit Office. Considering the fact that since 2010 major part of public procurements is being conducted electronically and there is no alternative tool, uninterrupted provision ... ... Electronic procurement system - how effective are management and control mechanisms? ... SAI Georgia analyzed the electronic Government Procurement system. In their report they focus on compliance and security problems, which may harm the business goals and overall mission of the system.
Full description
State Audit Office Of Georgia , issued in 2016
Risk cases: 5
previous 114 results found. Page 6 of 12 next