Skip to main content
Skip to list of reports Filters

Date Range

Submitting Agency

State (State and Local Reports)

Any Recommendations

Any Open Recommendations

Reports

Search reports, investigative results, and agency plansShowing 111 - 120 of 149 results
Tennessee Valley Authority OIG

Remote Application and Desktop Virtualization

The Office of the Inspector General OIG audited the Tennessee Valley Authority’s (TVA) use of remote application and desktop virtualization due to the risk of increased remote users during the COVID-19 pandemic and recent publicized remote access vulnerabilities. We found several areas where TVA was consistent with cybersecurity remote access best practices. However, we identified gaps in TVA’s configuration settings, architectural design, and administrative procedures. We recommend the Vice President and Chief Information and Digital Officer, Technology & Information, review the identified...
Department of the Treasury OIG

Apache Tribe of Oklahoma's Use of Coronavirus Relief Fund Payment

Department of the Treasury OIG

CORONAVIRUS DISEASE 2019 PANDEMIC RELIEF PROGRAMS: Audit of the Community Development Financial Institutions Fund's Implementation of the CDFI Rapid Response Program

Department of Transportation OIG

FTA Does Not Effectively Assess Security Controls or Remediate Cybersecurity Weaknesses To Ensure the Proper Safeguards Are in Place To Protect Its Financial Management Systems

What We Looked At The Coronavirus Aid, Relief, and Economic Security (CARES) Act of 2020 set up appropriations to support executive agency operations during the COVID-19 pandemic. The Federal Transit Administration (FTA) has received nearly $70 billion in CARES Act and other COVID-19 relief appropriations. FTA uses several financial management systems to approve, process, and disperse this funding for the transit industry’s COVID-19 response and recovery. Given the size of this investment, we initiated this audit. Our audit objective was to assess the effectiveness of FTA’s financial...
U.S. Postal Service OIG

U.S. Postal Service Protection Against External Cyberattacks

Our objective was to determine if the Postal Service has an effective security posture to protect its Information Technology (IT) infrastructure from external cyberattacks and prevent unauthorized access to restricted data.
General Services Administration OIG

PBS Did Not Always Follow CDC and Internal Guidance to Limit the Risk of COVID-19 Exposure

Department of the Treasury OIG

Desk Review of Puerto Rico

The objective of this desk review is to evaluate Puerto Rico's documentation supporting the uses of its Coronavirus Relief Fund (CRF) proceeds as reported in GrantSolutions and to assess risk of unallowable use of funds. The scope of our review will include obligation and expenditure data for the period of March 1, 2020 through June 30, 2021.

U.S. Postal Service OIG

COVID-19 Leave Administration

Our objective was to assess the Postal Service’s management of its employees’ use of novel coronavirus disease (COVID-19) leave under the Families First Coronavirus Response Act (FFCRA). Although the FFCRA expired on December 31, 2020, the Postal Service continued to allow liberal leave usage for employees who had a sickness related to COVID‑19. On March 11, 2021, the American Rescue Plan Act was signed into law. This Act is similar to the FFCRA in that it created a new type of leave. Effective March 12, 2021, and continuing through September 30, 2021, the American Rescue Plan Act provides...
U.S. Postal Service OIG

U.S. Postal Inspection Service Pandemic Response to Mail Fraud and Mail Theft

Our objective was to assess the Postal Inspection Service’s response to mail fraud and mail theft during the COVID-19 pandemic. After we began the audit, we received a congressional request from seven members of Congress asking us to identify what actions, if any, the Postal Inspection Service had taken to address the increase in mail theft during the COVID-19 pandemic.