Treasury needs more reliable system to track computers, IG says

Three Treasury Department agencies need to conduct more reliable inventories of their computers to better guard against loss or theft, according to reports by Treasury's inspector general.

The IG reports, released earlier this fall, were based on interviews with managers and evaluations of inventory procedures from February to August at the Office of the Comptroller of the Currency, Financial Management Service and Bureau of Public Debt.

The agencies check their inventory at least once a year to make sure all computers are accounted for (or reported missing). But at two of the agencies, stockroom employees who have daily responsibility for overseeing the property conduct the audits, making the results less reliable than if an independent auditor completed the check, the report (OIG-02-119) concluded. The Bureau of Public Debt uses independent auditors, but until recently, the agency's audit review process was not independent.

" 'Key duties and responsibilities need to be divided or segregated among different people to reduce the risk of error or fraud,'" said the IG report (GAO/AIMD-00-21.3.1), citing a November 1999 General Accounting Office report on the federal government's internal control standards. "The strongest control employed by leading-edge locations was to exclude those with asset custody from the counting activity," according to the report.

The Treasury IG also looked at the Office of Thrift Supervision's computer inventory methods, and concluded the agency's methods were reliable. OTS uses an automated tracking system for its annual inventory review. Computer identification numbers are scanned into the system and any missing computers are reported to the appropriate office for investigation, according to the report.

The other agencies included in the audit agreed with the IG's recommendations and said they would begin scheduling independent audits and reviews this fall. Financial Management Service spokeswoman Alvina McHale said the changes would be implemented by June 2004 at the latest.

The IG report praised the agencies for developing written policies for employees on the proper management and safekeeping of computers, saying the policies helped ensure accountability and deter theft. And all agencies took appropriate steps to prevent sensitive or classified information that may have been stored on approximately 80 computers stolen or lost from fiscal years 1999 to 2001 from falling into the wrong hands, according to the report.

The agencies also made sure that employees attended annual security training sessions and could only access sensitive or classified information with a password, so that outsiders could not break into the system and pose a security threat should a computer be lost and fall into the wrong hands.

In addition, the agencies required employees to clear classified data off hard drives before throwing the computers out or transferring them to anybody without a password to access the classified information.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.


When you download a report, your information may be shared with the underwriters of that document.