Defense beefs up purchase card oversight

The Defense Department is aiming to stem the abuse of purchase cards by its employees by adding more controls to the department's acquisition regulations.

A proposed rule, published Dec. 20 in the Federal Register, implements recommendations issued last June by Defense officials. The proposed controls include limiting the number of cards issued, not issuing cards to contractors and keeping users under the purchase card limit. The proposed rule also makes local commanders responsible for oversight of purchase card use at their facilities.

"I am heartened by the actions under way to curb these abuses by both the administration and the secretary of Defense," Rep. Stephen Horn, R-Calif., said in December. Horn, who retired from Congress last month, was chairman of the House Government Reform Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations. "Nevertheless, Congress must continue its vigilant oversight of these programs," he said.

The government uses purchase cards to circumvent the procurement process for relatively small, routine purchases, and transactions are supposed to be capped at $2,500. Since 1994, purchases cards have saved the Defense Department about $900 million. In fiscal 2001, Defense reported 207,506 purchase card transactions valued at $6.1 billion.

But several investigations by the General Accounting Office uncovered widespread abuse of government purchase cards among military and civilian personnel. The watchdog agency discovered that some employees were using the cards to pay for prostitutes, golf games, clothes, jewelry and other unauthorized purchases.

Horn and Sen. Charles Grassley, R-Iowa, demanded that the Defense Department get control of its program. Last year, Grassley and Sen. Robert Byrd, D-W.Va., added an amendment to the fiscal 2002 Defense appropriations bill limiting the use of government purchase cards by members of the military.

"The Defense Department has to stop handing out [purchase] cards like so many Christmas cookies," Grassley said. "I'll continue to work with the GAO and the Defense Department inspector general until card abuse stops."

In an Oct. 15 memorandum, Office of Management and Budget Director Mitch Daniels told all agency heads to start submitting quarterly progress reports on their efforts to overhaul their charge card programs. The first reports are due to OMB's Office of Federal Procurement Policy on Jan. 15 and will cover October through December.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.