An official website of the United States government
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Brought to you by the Council of the Inspectors General on Integrity and Efficiency
Federal Reports
Report Date
Agency Reviewed / Investigated
Report Title
Type
Location
National Endowment for the Arts
National Endowment for the Arts Office of Inspector General Report on Agency Information Security Systems Controls*
This is the report to Congress on the state of the NEA's policies and practices to protect personally identifiable information on agency information systems, as of July 2016. Due to security concerns, this report is not published on the internet. A copy of this report may be obtained by submitting a freedom of information request at the following link: https://www.arts.gov/freedom-information-act-guide
Alerted to allegations that Senior Corps grantee Great Lake Inter-Tribal Council, Lac du Flambeau, WI, misused program funds, CNCS-OIG investigators conducted a review in conjunction with an agency grant officer and a program officer. This joint review found that the grantee had abused the funds awarded by CNCS in multiple ways.
As part of the Consolidated Appropriations Act of 2016 (Public Law 114-113), Congress passed the Cybersecurity Act of 2015 which required Offices of Inspectors General to conduct an evaluation and submit a report on “covered” computer systems to the appropriate committees of jurisdiction in the Senate and the House of Representatives by August 14, 2016. We evaluated aspects of PBGC computer systems that provide access to personally identifiable information (PII). Our objective was to provide descriptions of certain policies, practices, and procedures identified in the statute and listed below. The scope of our work was limited to obtaining and analyzing PBGC’s information security policies, practices, and procedures governing computer systems that provide access to PII. We did not test the Corporation’s internal controls or compliance with the policies and procedures provided in this report. Information on whether the Corporation followed the appropriate standards was based on OIG open recommendations and the Corporation’s Plan of Actions and Milestones.Sensitive information contained in the evaluation report has been redacted.