Open Recommendations
| Recommendation Number | Significant Recommendation | Recommended Questioned Costs | Recommended Funds for Better Use | Additional Details | |
|---|---|---|---|---|---|
| 1 | Yes | $0 | $0 | ||
| Establish and implement procedures to ensure E2 account management practices enforce DOL’s security policies. | |||||
| 2 | Yes | $0 | $0 | ||
| Establish and implement procedures to ensure E2 is managed in compliance with contractual security requirements and DOL computer security policies for contracted information systems. | |||||