Reports Search Reports Spatial Search Risk-cases Search Risk-cases Graph Traversal
52 results found in 12 ms Page 3 of 6
Report on the government’s processing of confidential data on persons and companies
Rigsrevisionen has examined how eight government institutions process confidential data on persons and companies in 11 selected IT systems. The report is based on IT audits carried out in connection ... with the annual audit in the spring 2014. The purpose of the audit was to assess whether confidential data on persons and companies are adequately protected by the government institutions. ... ... Inadequate protection of confidential data ... If a government institution does not protect confidential data to the extent necessary, the risk that third parties get unauthorized access to the data is very high. In opinion of the Danish SAI ... , inadequate protection of confidential data may also erode the citizens’ and companies’ confidence in government data security. That may eventually become a barrier for the continued efforts to implement ... e-government and make government administration more efficient.
Full description
National Audit Office of Denmark , issued in 2014
Risk cases: 2
The rural broadband programme
Intervention in a noncompetitive market The British NAO's audit report of 2013 concerns ambitious yet delayed UK government programme, which objective was to have the best superfast broadband network in Europe by 2015. The report focuses on one of the programme's main problems: rural areas, where commercial providers had no plans to invest, because of lower returns.
Full description
National Audit Office , issued in 2013
Risk cases: 7
Management of IT security in systems outsourced to external suppliers
Security to be improved in IT processes outsourced to external suppliers When IT processes are outsourced to external suppliers, the authorities no longer have direct control of the IT security, but remain responsible for managing the security of the IT. Authorities that fail to manage IT security actively based on risk assessments, and omit to monitor the implementation of these requirements, will not be able to determine if the level of IT security in the outsourced systems safeguards their systems and data. This is how the conclusion of the Rigsrevisionen starts. The Danish auditors noticed improvement in the audited entities, but they add that tha majority of the auditees: can refine their requirements for and follow-up on access control and logging practices
Full description
National Audit Office of Denmark , issued in 2016
Risk cases: 3
Recovery of housing allowance - easy to make mistakes
Avoid mistakes in housing allowance recovery Housing allowance recovery rules are complex and outdated. What more, ad hoc changes can result in unpredicted deficiencies. The Swedish NAO found that monitoring and evaluation based analysis is of critical importance to avoid problems on the administration side - and what much more important: on the side of financialy vulnerable households.
Full description
Swedish National Audit Office , issued in 2018
Risk cases: 4
Does the state administration effectively use the stored information?
State administration could use the accumulated information more effectively Latvian auditors found that government institutions have a good cooperation in the area of data use, but there are still several areas wherein a person still has to perform the function of a 'courier'. Many channels of data exchange and distribution used in state administration create a fragmented and complicated environment for maintenance of ICT, while responsible ministry does not become actively involved and does not coordinate cooperation of institutions.
Full description
State Audit Office of the Republic of Latvia , issued in 2017
Risk cases: 4
Cyber Attacks: Securing Agencies’ICT Systems
Cyber crime is an international problem, and it is estimated that in 2012, 5.4 million Australians fell victim to such crimes, with an estimated cost to the economy of $1.65 billion ... . In the government sector, the Australian Signals Directorate (ASD)3 has estimated that between January and December 2012, there were over 1790 security incidents against Australian Government agencies. Of these, 685 ... were considered serious enough to warrant a Cyber Security Operations Centre response. <br/> The protection of Australian Government systems and information from unauthorised access and use is a key ... ... Cyber-security strategy needs consistent implementation and periodic reviews ... List of 35 mitigation controls against cyber intrusions are a basic tool of information security strategy of the Australian Government. Top four are: 1. application whitelisting, 2. patching ... application, 3. patching operating systems, 4. minimising administrative privileges. Analysis by the ANAO helps to fill gaps and to direct next steps.
Full description
The Australian National Audit Office , issued in 2014
Risk cases: 3
Federal Agencies Need to Address Aging Legacy Systems
Be aware of legacy IT risks The US government spends about 75 percent of the total amount budgeted for information technology on operations and maintenance. GAO reviewed Office of Management and Budget and 26 agencies, covering years 2010 through 2017 and recommends to develop a goal for spending measure and finalize guidance to identify and prioritize legacy IT needing to be modernized or replaced.
Full description
General Accountability Office , issued in 2016
Risk cases: 3
Incorrect payments in social insurance - Control activities of the Swedish Social Insurance Agency
In 2014 the social insurance system accounted for six per cent of GDP. The long-term sustainability of a system of that magnitude requires that the public perceives its purpose to be important ... , that it is well administered and that it is as free of abuse as possible. It must also be financially stable over time, since major fluctuations impact other areas of the central government budget. When ... these things function as they should, the system is perceived to be legitimate and enjoys public confidence.<br/> According to available estimations, almost SEK 20 billion had been paid out incorrectly from ... Balance of priorities needed to reduce incorrect payments ... Role of social insurance in public finance is so substantial that reduction of incorrect payments' volume is matter of huge savings. The Swedish NAO noted positive initiatives by the Social Insurance ... Agency in this regard. However they found also, that serious problems can stem from giving higher priority to the speed of payment and customers satisfaction. They both are undoubtedly important features ... of each system, still, the prevention of incorrect payments needs strategic support to be really effective.
Full description
Swedish National Audit Office , issued in 2016
Risk cases: 3
Use of consultants and temporary staff
New skills needed in a longer term UK NAO: Used well, consultants and temporary staff can be an important source of specialist skills and capabilities that are uneconomic for departments to maintain in their permanent staff. Since 2009-10, the government has used spending controls to reduce its use of consultants and temporary staff, and by 2014-15 spending had fallen by £1.5 billion. However, spending has increased by between £400 million and £600 million since 2011-12, suggesting that this was more of a short-term reduction than a sustainable strategy. In the longer term, departments will need to develop workforce, skills and capacity plans to reduce their dependence on external skills. They will need to improve their strategic workforce planning to determine where they can deploy existing staff, where they need to recruit, and where they need to engage temporary resources. Without this, departments cannot demonstrate that they are achieving value for money from the use of consultants and temporary staff.
Full description
National Audit Office , issued in 2016
Risk cases: 7
Whether Disclosure of the Public Sector Data Is Ensured
Strategy more important than declarations Why open data are so dificult to become reality? Lithuania possesses the elements required to disclose data but lacks a strategic approach. The report by SAI Lithuania reviews all critical elements of this problem. Most of them look like a pattern reproduced by other countries. And one important thing: the SAI Lithuania opened their own data - exactly on the day of publication of the audit report!
Full description
National Audit Office of the Republic of Lithuania , issued in 2016
Risk cases: 9
previous 52 results found. Page 3 of 6 next