Reports
Search reports, investigative results, and agency plansShowing 171 - 180 of 224 results
Department of Education OIG
Remington College’s Use of Higher Education Emergency Relief Fund Student Aid and Institutional Grants
The objective of our audit was to determine if Remington College used the Student Aid (Assistance Listing Number (ALN) 84.425E) and Institutional (ALN 84.425F) portions of its Higher Education Emergency Relief Fund (HEERF) grant funds for allowable and intended purposes.Remington College generally used the Student Aid portion of its HEERF grant funds for allowable and intended purposes but did not always use the Institutional portion of its funds in accordance with Federal requirements. We found that Remington College spent Institutional funds for several unallowable purposes and did not...
Department of Education OIG
Lincoln College of Technology’s Use of Higher Education Emergency Relief Fund Student Aid and Institutional Grants
The objective of our audit was to determine whether Lincoln College of Technology (Lincoln) used the Student Aid (Assistance Listing Number (ALN) 84.425E) and Institutional (ALN 84.425F) portions of its Higher Education Emergency Relief Fund (HEERF) funds for allowable and intended purposes. We also reviewed Lincoln’s cash management practices and the timeliness and quality of the data Lincoln reported on its use of HEERF funds.LESC generally used the Student Aid portion of Lincoln’s HEERF funds for allowable and intended purposes but did not always use the Institutional portion of its funds...
Department of Homeland Security OIG
Lessons Learned from FEMA’s Initial Response to COVID-19
The objective was to determine how effectively FEMA supported and coordinated Federal efforts to distribute personal protective equipment (PPE) and ventilators in response to the COVID-19 outbreak. We determined that FEMA did not have reliable data to inform allocation decisions and ensure accurate adjudication of resource requests, it did not have a process to allocate the limited supply of PPE, and FEMA’s strategic documents did not clearly outline roles and responsibilities to lead the Federal response. We made three recommendations that FEMA improve the reliability of WebEOC, formally...
Department of Homeland Security OIG
DHS Needs to Enhance Its COVID-19 Response at the Southwest Border
The objective of this review was to determine to what extent the Department of Homeland Security has implemented COVID-19 measures for migrants at the southwest border. We reported that U.S. Customs and Border Protection (CBP) does not conduct COVID-19 testing for migrants who enter CBP custody and is not required to do so. Instead, CBP relies on local public health systems to test symptomatic individuals. According to CBP officials, as a frontline law enforcement agency, it does not have the necessary resources to conduct such testing. For migrants that are transferred or released from CBP...
Treasury Inspector General for Tax Administration
Effects of the COVID-19 Pandemic on Business Tax Return Processing Operations
Department of Health & Human Services OIG
CMS's COVID-19 Data Included Required Information From the Vast Majority of Nursing Homes, but CMS Could Take Actions To Improve Completeness and Accuracy of the Data
The United States currently faces a nationwide public health emergency because of the COVID-19 pandemic. Federal regulations, effective May 8, 2020, required nursing homes to report COVID-19 information, such as the number of confirmed COVID-19 cases among residents, at least weekly to the Centers for Disease Control and Prevention’s (CDC’s) National Healthcare Safety Network. Each week, CDC aggregates the reported information and sends the data to the Centers for Medicare & Medicaid Services (CMS) for posting to the CMS website. These data are used to assist with national surveillance of...
U.S. Postal Service OIG
U.S. Postal Service Protection Against External Cyberattacks
Our objective was to determine if the Postal Service has an effective security posture to protect its Information Technology (IT) infrastructure from external cyberattacks and prevent unauthorized access to restricted data.