An official website of the United States government
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Brought to you by the Council of the Inspectors General on Integrity and Efficiency
Our objective was to assess the Postal Service’s management of penalty overtime. For this audit, we analyzed nationwide penalty overtime data during fiscal years (FYs) 2020 through 2022. The data included average penalty overtime per employee and the total penalty overtime hours used. We conducted site visits at 22 judgmentally selected facilities where we held interviews to identify underlying causes that contributed to penalty overtime usage at the facilities and the Postal Service as a whole. Additionally, we interviewed headquarters personnel regarding their responsibilities, processes, and procedures on the management of penalty overtime.
The Transportation Security Administration’s (TSA) fiscal year 2021 pipeline security directives, if implemented, should strengthen pipeline operators’ posture against cyber threats. TSA considered and partially addressed stakeholder feedback when drafting these two directives. However, TSA did not ensure all pipeline operators timely adhered to security requirements contained in the directives.
U.S. Customs and Border Protection’s (CBP) Office of Field Operations (OFO) uses the Centralized Area Video Surveillance System (CAVSS) at land ports of entry (LPOEs) to increase the safety of the public, employees, and property, but improvements are needed to address video surveillance system issues. Specifically, CAVSS experienced widespread recording gaps, instances of poorquality video and audio, areas of inadequate video and audio coverage within LPOEs, and inadequate privacy protections for detainees being held at LPOEs.
U.S. Customs and Border Protection (CBP) did not consistently target for additional inspection or evaluate potentially inadmissible international mail entering the United States through its nine International Mail Facilities (IMFs). Although IMFs faced challenges targeting mail and examining packages identified as potential threats, CBP did not evaluate whether its screening was effective or refer problems to stakeholders for resolution.
This is the audit of the NEA's information technology systems security. Due to security concerns, this report is not published on the internet. You can obtain a copy of this report through a freedom of information act request at the following link: https://www.arts.gov/freedom-information-act-guide.
What We Looked AtThis report presents the results of our quality control review (QCR) of an audit of the Department of Transportation's (DOT) information security program and practices. The Federal Information Security Modernization Act of 2014 (FISMA) requires agencies to develop, implement, and document agencywide information security programs and practices. FISMA also requires inspectors general to conduct annual reviews of their agencies' information security programs and report the results to the Office of Management and Budget. To meet this requirement, we contracted with CliftonLarsonAllen LLP (CLA) to conduct this audit subject to our oversight. The audit objective was to determine the effectiveness of DOT's information security program and practices in five function areas--Identify, Protect, Detect, Respond, and Recover.What We FoundOur QCR disclosed no instances in which CLA did not comply, in all material respects, with generally accepted Government auditing standards.Our RecommendationsDOT concurs with both of CLA's recommendations. We consider both recommendations resolved but open pending completion of planned actions.