In September 2015, OIG received an allegation claiming VA management failed to comply with VA policy and guidance when it deployed Real Time Location System (RTLS) assets without appropriate project oversight. The complainant also stated that VA deployed RTLS assets without meeting VA information security requirements.OIG found that the RTLS Project Management Office (PMO) did not follow guidance from VA’s Technology Acquisition Center to use an incremental project management approach and did not follow VA’s project implementation policy requiring the use of the Project Management Accountability System for all acquisitions and delivery of RTLS assets. VA awarded the first RTLS task order in June 2012. As of December 2016, $431 million had been obligated for RTLS assets and services without Government acceptance of a functional RTLS solution.Additionally, OIG found that RTLS assets were connected to the VA network without proper testing and approval of system security controls in accordance with VA’s risk management framework. As a result, VA’s internal network faced unnecessary risks from these untested RTLS system security controls. In October 2016, RTLS was granted an initial authorization to operate on the VA network.OIG recommended the Acting Under Secretary for Health, in conjunction with the Acting Assistant Secretary for Information and Technology, apply additional resources and implement improved integrated project management controls for the reminder of the project to restrict further cost increases and enforce the use of incremental project management controls, such as those used within the Veteran-focused Integration Process (VIP) on all remaining RTLS task orders, to ensure such efforts will provide an adequate return on investment. In addition, OIG recommended the Acting Assistant Secretary for the Office of Information and Technology ensure risk assessments are conducted on future RTLS deployments to identify potential risks and vulnerabilities that may adversely affect other VA systems.
| Report Date | Agency Reviewed / Investigated | Report Title | Type | Location | |
|---|---|---|---|---|---|
| Department of Veterans Affairs | Review of Alleged Mismanagement of VA’s Real Time Location System Project | Audit | Agency-Wide | View Report | |
| U.S. Postal Service | Fiscal Year 2017 Statistical Tests | Audit | Agency-Wide | View Report | |
| Tennessee Valley Authority | Sequoyah Nuclear Plant Corrective Action Program | Inspection / Evaluation | Agency-Wide | View Report | |
| Department of the Treasury | Classified Audit Report | Audit | Agency-Wide | View Report | |
| Department of the Treasury | TERRORIST FINANCING/MONEY LAUNDERING: Financial Institutions Used FinCEN Guidance Designed To Avoid Duplicate Filing of Reports With OFAC and FinCEN, but BSA Data Users Did Not Have Access to All Data | Audit | Agency-Wide | View Report | |
| Department of Defense | Transmittal of Independent Auditor’s Report on United States Army General Fund Schedule of Operating Material and Supplies as of August 31, 2017 | Audit | Agency-Wide | View Report | |
| Department of Commerce, Office of the Director of National Intelligence, Department of the Treasury, Department of Justice, Department of Homeland Security, Department of Energy, Department of Defense | Joint Report on the Implementation of the Cybersecurity Information Sharing Act of 2015 | Audit | Agency-Wide | View Report | |
| Department of the Treasury | Financial Management: Audit of the Bureau of Engraving and Printing's Fiscal Years 2017 and 2016 Financial Statements | Audit | Agency-Wide | View Report | |
| Department of Defense | The National Security Agency Enterprise | Audit | Agency-Wide | View Report | |
| Department of Defense | Naval Facilities Engineering Command Administration of Selected Energy Savings Performance Contracts | Audit | Agency-Wide | View Report | |