An official website of the United States government
Here's how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Brought to you by the Council of the Inspectors General on Integrity and Efficiency
Federal Reports
Report Date
Agency Reviewed / Investigated
Report Title
Type
Location
Department of Veterans Affairs
Comprehensive Healthcare Inspection of the Martinsburg VA Medical Center in West Virginia
This Office of Inspector General (OIG) Comprehensive Healthcare Inspection Program report provides a focused evaluation of the quality of care delivered in the inpatient and outpatient settings of the Martinsburg VA Medical Center. The inspection covered key clinical and administrative processes associated with promoting quality care. It focused on Leadership and Organizational Risks; COVID-19 Pandemic Readiness and Response; Quality, Safety, and Value; Registered Nurse Credentialing; Medication Management: Remdesivir Use in VHA; Mental Health: Emergency Department and Urgent Care Center Suicide Risk Screening and Evaluation; Care Coordination: Inter-facility Transfers; and High-Risk Processes: Management of Disruptive and Violent Behavior.At the time of the OIG’s virtual inspection, the medical center’s executive leadership team had worked together for just over one month. Employee survey data revealed opportunities for the Director; Chief of Staff; and Associate Director, Patient Care Services to reduce staff feelings of moral distress at work. Patient experience survey data indicated that leaders had an opportunity to improve female respondents’ inpatient and specialty care experiences. The OIG’s review of the medical center’s accreditation findings did not identify any substantial organizational risk factors. However, the OIG identified concerns related to sentinel events and institutional disclosures. Executive leaders were generally knowledgeable about selected data used in Strategic Analytics for Improvement and Learning models and should continue to take actions to sustain and improve performance.The OIG issued nine recommendations for improvement in four areas:(1) Leadership and Organizational Risks• Sentinel events and institutional disclosures(2) Quality, Safety, and Value• Systems Resign and Improvement Program• Surgical work group attendance(3) Care Coordination• Patient transfer monitoring and evaluations• Inter-facility transfer forms• Medication list transmission(4) High-Risk Processes• Disruptive behavior committee attendance• Staff training
The Veterans Health Administration (VHA) has three regional procurement offices (RPOs) that acquire supplies and services to support the medical facilities within their regions (Central, East, and West). In FY 2020, the VA Office of Inspector General (OIG) published a report on contract closeout compliance at RPO East. Because of problems identified there, the OIG conducted this review to determine whether RPO Central and RPO West contracting officers adequately performed and documented contract closeout requirements. When contracting officers do not follow the necessary steps to close out contracts, they increase future financial and legal risk to the government and may prevent it from obtaining the maximum benefit of any unused funds. Therefore, to protect veterans and taxpayer dollars, contracting officers must maintain the necessary evidence to demonstrate contractor compliance with contract terms and conditions.The team reviewed a random sample of 55 RPO Central contracts and 40 RPO West contracts, each valued at over $500,000, that were closed between June 1 and December 31, 2020. Based on the team’s review, the OIG found that RPOs Central and West contracting officers did not perform required contract closeout duties. Reasons included unclear policies and systems, as well as ineffective oversight of the closeout process. Contracting officers also informed the team that a heavy workload and the prioritization of awarding contracts affected their ability to comply with contract administration requirements.The OIG recommended the executive directors for RPO Central and RPO West establish consistent quality assurance reviews, balance contracting officer workload, update guidance on the use of simplified acquisition procedures, consider additional strategies to ensure contract closeout compliance, and verify that the contract files for the 81 sampled contracts have complete closeout documentation.
The Tennessee Valley Authority (TVA) operates three nuclear plants capable of generating 7,800 megawatts of electricity. Groundwater contamination can result from routine nuclear plant activities such as wet storage of spent fuel, leaks from liquid waste pipelines and tanks, and leaks of contaminated cooling water. TVA Nuclear Power Group, Standard Programs and Processes 05.15, Fleet Groundwater Protection Program, establishes a long-term groundwater-monitoring program with the purpose of minimizing the potential for inadvertent releases to the environment from plant activities. Due to risks associated with potential groundwater contamination, we performed an evaluation to determine if TVA Nuclear has taken actions to address issues related to groundwater at nuclear plants, identified during fiscal years 2017 through 2021, in internal assessments, external assessments, consultant reports, and condition reports. We determined TVA Nuclear has taken actions, or no further actions were needed, to address the majority of issues and/or recommendations made. However, two recommendations from 2015 have not been addressed and likely affected TVA’s corporate insurance premiums.
This interim report presents the results of our self-initiated audit of mail delivery, customer service, and property conditions at the Marian Oldham Station in St. Louis, MO (Project Number 22-115-4). The Marian Oldham Station is in the Kansas-Missouri District of the Central Area and services ZIP Codes 63106 and 63108,1 which serve about 32,922 people and are considered to be urban. We judgmentally selected the Marian Oldham Station based on the number of customer inquiries per route that the unit received. From December 1, 2021 through February 28, 2022, the unit received 13.03 inquiries per route, which was more than the average of 7.02 inquiries per route for all sites serviced by the St. Louis Processing and Distribution Center (P&DC).
This interim report presents the results of our self-initiated audit of mail delivery, customer service, and property conditions at the Saint Peters Main Post Office (MPO) in Saint Peters, MO (Project Number 22-115-1). The Saint Peters MPO is in the Kansas-Missouri District of the Central Area and services ZIP Code 63376, which serves about 71,535 people and is considered to be urban. We judgmentally selected the Saint Peters MPO based on the number of customer inquiries per route the unit received. From December 1, 2021 through February 28, 2022, the unit received 12.54 inquiries per route, which was more than the average of 7.02 inquiries per route for all sites serviced by the St. Louis Processing and Distribution Center (P&DC).
- Identify Fiscal Year risk metrics associated with the cybersecurity control areas included in the scope of our evaluation. - Determine maturity levels for the four aforementioned cybersecurity control areas using a defined maturity model spectrum. - Report findings identified during the performance of evaluation procedures over selected cybersecurity controls.
What OIG Found:
- Lack of Signed IT Contingency Plans - Lack of Complete and Accurate Inventory of Hardware Assets - Lack of Formal Policies and Procedures for Software Asset Management - Lack of Periodic Review/Update over the Library’s Organization-Tier Policies - Lack of Annual System Security y Plan Compliance Reviews - Inconsistent System-Level Ongoing Control Assessments - Inconsistent Completing and Reviewing of Security y Assessments Reports
What OIG Recommends:
- Confirm and enforce a quality y control procedure to ensure that IT CPs are signed by the responsible personnel (Information System Business Owner, its ervice Operations Director, and Business Continuity y and Disaster Recovery Official) and uploaded to the Library’s governance risk and compliance (GRC) platform, as required by Library policies. 2.1 Develop formal procedures for maintaining an up-to-date inventory of hardware assets and removing unauthorized or unmanaged hardware assets in a timely manner. - Implement tools to a) track and monitor or all authorized hardware assets on the Library network and b) report or prevent unauthorized devices connecting to the network. - Maintain a complete, accurate, and centralized repository of all hardware assets connected to the Library network. - Develop and implement formal policies and procedures over their process for maintaining an up to-date software inventory that incorporates security y controls requirements from National Institute of Standards and Technology Special Publication (SP) 800-53, Configuration Management (CM-8), and industry practices from National Institute of Standards and TechnologySP 800-37 and National Institute of Standards and TechnologySP 800-128. - Complete the implementation of its Configuration Management Database (CMDB) to track and manage the inventory of software assets. - Identify Fiscal Year and authorize backup personnel to perform the annual review of the Library Security &A Guidance and Library Information Security y Continuous Monitoring (ISCM) Guidance in the event that the responsible personnel is unavailable. - Identify Fiscal Year and authorize backup personnel to perform the annual System Security Plan (SSP) compliance review in the event that the responsible personnel is unavailable. - Remediate or enter Plan of Action and Milestones (POA&Ms) for control assessment discrepancies associated with relevant information systems so they are in alignment with the Library’s policies and procedures and notifying the Authorizing Official (AO) of all updates or changes. - Identify Fiscal Year adequate resources to perform system control assessments. - Enhance the Library’s procedures for validating the completion and tracking of ongoing control assessments to ensure they are being performed in accordance with the Library’s policies and procedures. - Complete Security Assessment Reports (SARs) for the respective systems and notifying the AO of the results. - Implement a quality control process to validate the completion of SARs in accordance with the Library’s policies and procedures.
Financial Audit of the Power Transmission System for Wind Project in Sindh Wind Corridor in Pakistan Managed by National Transmission and Dispatch Company Limited, Grant 391-PEPA-ENR-WTL-00, for the Fiscal Year that Ended June 30, 2021
Financial Closeout Audit of MCC Resources Managed by Millennium Challenge Coordinating Unit Sierra Leone Under the Threshold Agreement, April 1, 2021, to July 29, 2021