Reports
Search reports, investigative results, and agency plansShowing 51 - 60 of 130 results
Treasury Inspector General for Tax Administration
The Taxpayer Advocate Service Assisted Thousands of Taxpayers With CARES Act Issues but Faced Challenges in Identifying and Tracking Applicable Cases
Department of Agriculture OIG
COVID-19—Oversight of the Emergency Food Assistance Program—Interim Report
The objective of our ongoing inspection is to evaluate FNS’ oversight of TEFAP—this report provides the interim results on what criteria FNS used to approve States for food and administrative funds provided under the FFCR and CARES Acts.
Department of Justice OIG
Staff Perceptions of the Federal Bureau of Prisons' Management of the Coronavirus Disease 2019 Pandemic: A Follow-Up Survey of BOP Staff
Results from this survey are available at the following link: https://experience.arcgis.com/experience/582f32f0127c4c86870b2e129c05b9…
Department of Agriculture OIG
COVID-19—Business and Industry Guaranteed Loan Modifications in Response to the Pandemic
We determined how RBCS implemented the B&I CARES Act Guaranteed Loan Program and made modifications to help guaranteed lenders with existing borrowers experiencing cash flow issues.
Treasury Inspector General for Tax Administration
People First Initiative Actions Helped Taxpayers During the Pandemic; However, Many Taxpayers Received Inaccurate Collection Notices
Treasury Inspector General for Tax Administration
Steps Were Taken to Protect Employee Health and Safety, but Additional Efforts Are Needed to Ensure Compliance With Federal Guidelines During Pandemics
Treasury Inspector General for Tax Administration
Inspection of Health and Safety Measures at Select IRS Taxpayer Assistance Centers During the COVID-19 Pandemic
Treasury Inspector General for Tax Administration
Effects of the COVID-19 Pandemic on Business Tax Return Processing Operations
U.S. Postal Service OIG
U.S. Postal Service Protection Against External Cyberattacks
Our objective was to determine if the Postal Service has an effective security posture to protect its Information Technology (IT) infrastructure from external cyberattacks and prevent unauthorized access to restricted data.