Recovery Act Raised Accountability, GAO Says

A sign indicating Recovery Act work was put up in Waukegan, Ill. in 2009. A sign indicating Recovery Act work was put up in Waukegan, Ill. in 2009. Jim Prisching/AP file photo

The 28 agencies that distributed stimulus grants under the 2009 Recovery Act have learned largely positive lessons in best practices for accountability and transparency, the Government Accountability Office reported.

As part of an examination of website tracking of how dollars were spent in 16 states to create jobs and boost economic growth, auditors found that federal agencies working with states “looked beyond their usual way of doing business and adjusted their usual practices to help ensure the accountability and transparency of Recovery Act funds.

“The oversight community adopted a faster and more flexible approach to how they conducted and reported on their audits and reviews so that their findings could inform programs of needed corrections before all Recovery funds were expended,” the GAO report released Friday said.

The report for the Senate Homeland Security and Governmental Affairs Committee comes after the Recovery Accountability and Transparency Board’s mission was extended until September 2015 so it could track the spending on relief for victims of 2012’s Hurricane Sandy.

As the government doled out what became $812 billion in recovery money, agencies leveraged technology by using Web-based reporting and “advanced data analytics to reduce fraud and to create easily accessible Internet resources that greatly improved the public’s access to information on how the funds were spent, GAO said.

Management approaches contributing to the successes, the congressional watchdog determined, include:

  • Strong support from top leaders.
  • Centrally situated collaborative governance structures.
  • Use of networks and agreements to share information and work toward common goals.
  • Adjustments and innovations in traditional oversight, “such as the increased use of upfront risk assessments, the gathering of ‘real time’ information, earlier communication of audit findings and the use of advanced data analytics.”

Keys to effective website design for tracking spending included establishing a clear purpose, using social networking tools to garner interest, tailoring the website to meet audience needs and obtaining stakeholder input during design, the auditors said.

The remaining challenge, GAO said, is for agencies to apply the same analytics to go beyond verifying any fraudulent use of funds to measuring the outcomes from grant spending governmentwide.

Working with the Office of Management and Budget and the Recovery Board, auditors for this study examined spending by the departments of Education, Energy, Transportation, and Housing and Urban Development, focusing on recipients in Georgia, Massachusetts, New York and Colorado.

Federal managers who read the report in draft generally agreed with its conclusions.  

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.