Internal Revenue Service

Status of GAO Financial Audit and Related Financial Management Report Recommendations Gao ID: GAO-09-514 June 25, 2009

In its role as the nation's tax collector, the Internal Revenue Service (IRS) has a demanding responsibility to annually collect trillions of dollars in taxes, process hundreds of millions of tax and information returns, and enforce the nation's tax laws. Since its first audit of IRS's financial statements in fiscal year 1992, GAO has identified a number of weaknesses in IRS's financial management operations. In related reports, GAO has recommended corrective actions to address those weaknesses. Each year, as part of the annual audit of IRS's financial statements, GAO makes recommendations to address any new weaknesses identified and follows up on the status of IRS's efforts to address the weaknesses GAO identified in previous years' audits. The purpose of this report is to (1) provide the status of audit recommendations and actions needed to fully address them and (2) demonstrate how the recommendations relate to control activities central to IRS's mission and goals.

IRS has made significant progress in improving its internal controls and financial management since its first financial statement audit in 1992, as evidenced by 9 consecutive years of clean audit opinions on its financial statements, the resolution of several material internal control weaknesses, and actions resulting in the closure of over 200 financial management recommendations. This progress has been the result of hard work throughout IRS and sustained commitment at the top levels of the agency. However, IRS still faces financial management challenges. At the beginning of GAO's audit of IRS's fiscal year 2008 financial statements, 81 financial management-related recommendations from prior audits remained open because IRS had not fully addressed the issues that gave rise to them. During the fiscal year 2008 financial audit, IRS took actions that GAO considered sufficient to close 35. At the same time, GAO identified additional internal control issues resulting in 16 new recommendations. In total, 62 recommendations remain open. To assist IRS in evaluating and improving internal controls, GAO categorized the 62 open recommendations by various internal control activities, which, in turn, were grouped into three broad control categories. The continued existence of internal control weaknesses that gave rise to these recommendations represents a serious obstacle that IRS needs to overcome. Effective implementation of GAO's recommendations can greatly assist IRS in improving its internal controls and achieving sound financial management and can help enable it to more effectively carry out its tax administration responsibilities. Most can be addressed in the short term (the next 2 years). However, a few recommendations, particularly those concerning IRS's automated systems, are complex and will require several more years to effectively address.



GAO-09-514, Internal Revenue Service: Status of GAO Financial Audit and Related Financial Management Report Recommendations This is the accessible text file for GAO report number GAO-09-514 entitled 'Internal Revenue Service: Status of GAO Financial Audit and Related Financial Management Report Recommendations' which was released on June 25, 2009. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Commissioner of Internal Revenue: United States Government Accountability Office: GAO: June 2009: Internal Revenue Service: Status of GAO Financial Audit and Related Financial Management Report Recommendations: GAO-09-514: GAO Highlights: Highlights of GAO-09-514, a report to the Commissioner of Internal Revenue. Why GAO Did This Study: In its role as the nation‘s tax collector, the Internal Revenue Service (IRS) has a demanding responsibility to annually collect trillions of dollars in taxes, process hundreds of millions of tax and information returns, and enforce the nation‘s tax laws. Since its first audit of IRS‘s financial statements in fiscal year 1992, GAO has identified a number of weaknesses in IRS‘s financial management operations. In related reports, GAO has recommended corrective actions to address those weaknesses. Each year, as part of the annual audit of IRS‘s financial statements, GAO makes recommendations to address any new weaknesses identified and follows up on the status of IRS‘s efforts to address the weaknesses GAO identified in previous years‘ audits. The purpose of this report is to (1) provide the status of audit recommendations and actions needed to fully address them and (2) demonstrate how the recommendations relate to control activities central to IRS‘s mission and goals. What GAO Found: IRS has made significant progress in improving its internal controls and financial management since its first financial statement audit in 1992, as evidenced by 9 consecutive years of clean audit opinions on its financial statements, the resolution of several material internal control weaknesses, and actions resulting in the closure of over 200 financial management recommendations. This progress has been the result of hard work throughout IRS and sustained commitment at the top levels of the agency. However, IRS still faces financial management challenges. At the beginning of GAO‘s audit of IRS‘s fiscal year 2008 financial statements, 81 financial management-related recommendations from prior audits remained open because IRS had not fully addressed the issues that gave rise to them. During the fiscal year 2008 financial audit, IRS took actions that GAO considered sufficient to close 35. At the same time, GAO identified additional internal control issues resulting in 16 new recommendations. In total, 62 recommendations remain open. To assist IRS in evaluating and improving internal controls, GAO categorized the 62 open recommendations by various internal control activities, which, in turn, were grouped into three broad control categories. Table: Summary of Open Recommendations by Control Category: Safeguarding of assets and security activities: Open at the beginning of 2008: 21; Closed during 2008 audit: 7; New from 2008 audit: 6; Total remaining open: 20. Proper recording and documenting of transactions: Open at the beginning of 2008: 33; Closed during 2008 audit: 13; New from 2008 audit: 4; Total remaining open: 24. Effective management review and oversight: Open at the beginning of 2008: 27; Closed during 2008 audit: 15; New from 2008 audit: 6; Total remaining open: 18. Total: Open at the beginning of 2008: 81; Closed during 2008 audit: 35; New from 2008 audit: 16; Total remaining open: 62. Source: GAO analysis of financial management recommendations made to IRS. [End of table] The continued existence of internal control weaknesses that gave rise to these recommendations represents a serious obstacle that IRS needs to overcome. Effective implementation of GAO‘s recommendations can greatly assist IRS in improving its internal controls and achieving sound financial management and can help enable it to more effectively carry out its tax administration responsibilities. Most can be addressed in the short term (the next 2 years). However, a few recommendations, particularly those concerning IRS‘s automated systems, are complex and will require several more years to effectively address. What GAO Recommends: GAO is not making any recommendations in this report. In commenting on this draft report, IRS stated that it is committed to implementing appropriate improvements to maintain sound financial management practices. To view the full product, including the scope and methodology, click on [hyperlink, http://www.gao.gov/products/GAO-09-514]. For more information, contact Steven J. Sebastian at (202)512-3406 or sebastians@gao.gov. [End of section] Contents: Letter: Background: Scope and Methodology: IRS's Progress on Financial Management Recommendations: Open Recommendations Grouped by Control Activity: Open Recommendations Arranged by Related Material Weakness, Significant Deficiency, Compliance Issue, or Other Control Issue: Concluding Observations: Agency Comments and Our Evaluation: Appendix I: Status of GAO Recommendations from Internal Revenue Service Financial Audits and Related Management Reports: Appendix II: Open Recommendations Arranged by Control or Compliance Issue: Financial Reporting: Unpaid Tax Assessments: Information Security: Tax Revenue and Refunds: Release of Federal Tax Liens: Other Control Issues: Appendix III: Comments from the Internal Revenue Service: Appendix IV: GAO Contact and Staff Acknowledgments: Tables: Table 1: Summary of Open Recommendations: Table 2: Recommendations to Improve IRS's Physical Controls over Vulnerable Assets: Table 3: Recommendations to Improve IRS's Segregation of Duties: Table 4: Recommendation to Improve IRS's Controls over Information Processing: Table 5: Recommendations to Improve IRS's Access Restrictions to and Accountability for Resources and Records: Table 6: Recommendations to Improve IRS's Documentation of Transactions and Internal Control: Table 7: Recommendations to Improve IRS's Accurate and Timely Recording of Transactions and Events: Table 8: Recommendations to Improve IRS's Execution of Transaction and Events: Table 9: Recommendations to Improve IRS's Reviews by Management at the Functional or Activity Level: Table 10: Recommendations to Improve IRS's Establishment and Review of Performance Measures and Indicators: Table 11: Recommendations to Improve IRS's Management of Human Capital: Table 12: Material Weakness: Controls over Financial Reporting: Table 13: Material Weakness: Controls over Unpaid Assessments: Table 14: Significant Deficiency: Controls over Revenues and Issuing Refunds: Table 15: Compliance with Laws and Regulations: Timely Release of Liens: Table 16: Other Control Issues Not Associated with a Material Weakness or Significant Deficiency: Abbreviations: CCTV: closed circuit television: CDDB: Custodial Detail Data Base: FFMIA: Federal Financial Management Improvement Act of 1996: FISCAM: Federal Information System Controls Audit Manual: FMFIA: Federal Managers' Financial Integrity Act of 1982: IDRS: Integrated Data Retrieval System: IRACS: Interim Revenue and Accounting Control System: IRM: Internal Revenue Manual: IRS: Internal Revenue Service: LMSB: Large and Mid-sized Business: NFC: National Finance Center: OMB: Office of Management and Budget: P&E: property and equipment: SCC: service center campus: SETS: Security Entry and Tracking System: TAC: taxpayer assistance center: TE/GE: Tax Exempt and Government Entities: TFRP: Trust Fund Recovery Penalty: [End of section] United States Government Accountability Office: Washington, DC 20548: June 25, 2009: The Honorable Douglas H. Shulman: Commissioner of Internal Revenue: Dear Mr. Shulman: In its role as the nation's tax collector, the Internal Revenue Service (IRS) has a demanding responsibility to collect taxes, process tax returns, and enforce the nation's tax laws. In fiscal year 2008, IRS collected about $2.7 trillion in tax payments, processed hundreds of millions of tax and information returns, and paid about $426 billion in refunds to taxpayers. Because of its role and overall mission, IRS's activities affect virtually all of the nation's citizens. It is therefore critical that the agency strive to maintain sound financial management practices. IRS has made much progress in improving its financial management since it was first required to prepare a set of financial statements and have them in fiscal year 1992. This progress was reflected in its ability to obtain and maintain a clean audit opinion on its financial statements each year beginning in fiscal year 2000, to correct several material internal control weaknesses over the years, and to make many other improvements in internal control. At the same time, more remains to be done to address long-standing internal control issues that continue to exist at the agency. IRS continues to have weak or ineffective internal controls over fundamental elements of its operations that leave it vulnerable to a greater risk of fraud, waste, abuse, and mismanagement. This, in turn, has the potential to affect the lives of the nation's taxpayers, as our audits over the years have demonstrated. For example, IRS's continued failure to promptly release federal tax liens could cause undue hardship and burden to taxpayers who are attempting to sell property or apply for commercial credit. An agency's internal control environment serves as the first line of defense in safeguarding its assets and in preventing and detecting errors and fraud, as well as in helping to effectively manage its stewardship over public resources.[Footnote 1] Unfortunately, IRS continues to be challenged with several long-standing material weaknesses in internal control that are at the heart of IRS's operations.[Footnote 2] During our audit of IRS's fiscal year 2008 financial statements, we continued to find material weaknesses in controls over: * financial reporting, * unpaid tax assessments, and: * information systems security. In addition to the material weaknesses, we continued to identify a significant deficiency involving IRS's control over tax revenue and refunds, which hampers IRS's ability to optimize the use of its resources to collect unpaid taxes and minimize payments of improper refunds. This significant deficiency was downgraded from a material weakness in fiscal year 2008 because IRS took significant steps to address the deficiencies comprising the material weakness, such as enhancing its cost accounting capabilities and performance measures. To assist IRS in strengthening its internal controls and improving its operations, we have made numerous recommendations as part of our annual financial statement audits and other financial management-related work at IRS. This report is being provided to you to (1) provide the status of financial audit and financial management-related recommendations and the actions needed to address them and (2) demonstrate how the recommendations relate to control activities central to IRS's mission and goals. We are not making any recommendations in this report. Our work was performed from December 2008 through May 2009 in accordance with generally accepted government auditing standards. For further details regarding our approach to this audit, see the Scope and Methodology section. Background: Internal control is not one event, but a series of activities that occur throughout an entity's operations and on an ongoing basis. Internal control should be recognized as an integral part of each system that management uses to regulate and guide its operations rather than as a separate system within an agency. In this sense, internal control is management control that is built into the entity as a part of its infrastructure to help managers run the entity and achieve their goals on an ongoing basis. Section 3512 (c), (d) of Title 31, U.S. Code, commonly known as the Federal Managers' Financial Integrity Act of 1982 (FMFIA), requires agencies to establish and maintain internal control. The agency head must annually evaluate and report on the control and financial systems that protect the integrity of federal programs. The requirements of FMFIA serve as an umbrella under which other reviews, evaluations, and audits should be coordinated and considered to support management's assertion about the effectiveness of internal control over operations, financial reporting, and compliance with laws and regulations. Office of Management and Budget (OMB) Circular No. A-123, Management's Responsibility for Internal Control, provides the implementing guidance for FMFIA, and sets out the specific requirements for assessing and reporting on internal controls consistent with the internal control standards issued by the Comptroller General of the United States. [Footnote 3] The circular defines management's responsibilities related to internal control and the process for assessing internal control effectiveness, and provides specific requirements for conducting management's assessment of the effectiveness of internal control over financial reporting. The circular requires management to annually provide assurances on internal control in its performance and accountability report, and for each of the 24 Chief Financial Officers Act agencies to include a separate assurance on internal control over financial reporting, along with a report on identified material weaknesses and corrective actions.[Footnote 4] The circular also emphasizes the need for integrated and coordinated internal control assessments that synchronize all internal control-related activities. FMFIA requires GAO to issue standards for internal control in the federal government. The Standards for Internal Control in the Federal Government (i.e., internal control standards) provides the overall framework for establishing and maintaining effective internal control and for identifying and addressing major performance and management challenges and areas at greatest risk of fraud, waste, abuse, and mismanagement. As summarized in the internal control standards, internal control in the government is defined by the following five elements, which also provide the basis against which internal controls are to be evaluated: * Control environment: Management and employees should establish and maintain an environment throughout the organization that sets a positive and supportive attitude toward internal control and conscientious management. * Risk assessment: Internal control should provide for an assessment of the risks the agency faces from both external and internal sources. * Control activities: Internal control activities help ensure that management's directives are carried out. The control activities should be effective and efficient in accomplishing the agency's control objectives. * Information and communications: Information should be recorded and communicated to management and others within the entity who need it and in a form and within a time frame that enables them to carry out their internal control and other responsibilities. * Monitoring: Internal control monitoring should assess the quality of performance over time and ensure that the findings of audits and other reviews are promptly resolved. A key objective in our annual audits of IRS's financial statements is to obtain reasonable assurance that IRS maintained effective internal controls with respect to financial reporting, including safeguarding of assets, and compliance with laws and regulations. While we use all five elements of internal control as a basis for evaluating the effectiveness of IRS's internal controls, our ongoing evaluations and tests have focused heavily on control activities to identify internal control weaknesses and offer recommendations for corrective action. Control activities are the policies, procedures, techniques, and mechanisms that enforce management's directives. In other words, they are the activities conducted in the everyday course of business that are intended to accomplish a control objective, such as ensuring IRS employees successfully complete background checks prior to being granted access to taxpayer information and receipts. As such, control activities are an integral part of an entity's planning, implementing, reviewing, and accountability for stewardship of government resources and achievement of effective results. Scope and Methodology: To accomplish our objectives, we evaluated the effectiveness of corrective actions IRS implemented during fiscal year 2008 in response to open recommendations as part of our fiscal years 2008 and 2007 financial audits. To determine the current status of the recommendations, we (1) obtained IRS's reported status of each recommendation and corrective action taken or planned as of April 2009, (2) compared IRS's reported status to our fiscal year 2008 audit findings to identify any differences between IRS's and our conclusions regarding the status of each recommendation, and (3) performed additional follow-up work regarding IRS's actions taken to address the open recommendations. In order to determine how these recommendations fit within IRS's management and internal control structure, we compared the open recommendations and the issues that gave rise to them, to the control activities listed in the internal control standards and to the list of major factors and examples outlined in our Internal Control Management and Evaluation Tool.[Footnote 5] We also considered how the recommendations and the underlying issues were categorized in our prior reports; whether IRS had addressed, in whole or in part, the underlying control issues that gave rise to the recommendations; and other legal requirements and implementing guidance, such as OMB Circular No. A-123; FMFIA; and the Federal Information System Controls Audit Manual (FISCAM).[Footnote 6] Our work was performed from December 2008 through May 2009 in accordance with generally accepted government auditing standards. Further details on our audit scope and methodology are included in our report on the results of our audits of IRS's fiscal years 2008 and 2007 financial statements.[Footnote 7] We requested comments on a draft of this report from the Commissioner of Internal Revenue or his designee on May 26, 2009. We received comments from the Commissioner on June 11, 2009. We have reprinted IRS's written comments in appendix III. IRS's Progress on Financial Management Recommendations: IRS continues to make progress addressing its significant financial management challenges. Over the years since we first began auditing IRS's financial statements in fiscal year 1992, IRS has taken actions that enabled us to close over 200 of our financial management-related recommendations. This includes 35 recommendations we are closing based on actions IRS took during the period covered by our fiscal year 2008 financial audit. At the same time, however, our audits continue to identify additional internal control issues, resulting in further recommendations for corrective action, including 16 new financial management-related recommendations resulting from our fiscal year 2008 financial audit. These internal control issues, and the resulting recommendations, can be directly traced to the control activities in the internal control standards. As such, it is essential that they be fully addressed and resolved to strengthen IRS's overall financial management to efficiently and effectively achieve its goals and mission. Status of Recommendations Based on the Fiscal Year 2008 Financial Statement Audit: In July 2008, we issued a report on the status of IRS's efforts to implement corrective actions to address financial management recommendations stemming from our fiscal year 2007 and prior year financial audits and other financial management-related work.[Footnote 8] In that report, we identified 81 audit recommendations that remained open and thus required corrective action by IRS. A significant number of these recommendations had been open for several years, either because IRS had not taken corrective action or because the actions taken had not yet effectively resolved the issues that gave rise to the recommendations. IRS continued to work to address many of the internal control issues to which these open recommendations relate. In the course of performing our fiscal year 2008 financial audit, we identified numerous actions IRS took to address many of its internal control issues. On the basis of IRS's actions, which we were able to substantiate through our audit, we are able to close 35 of these prior years' recommendations. IRS considers another 18 of the prior years' recommendations to be effectively addressed. However, we still consider them to be open either because we have not yet been able to verify the effectiveness of IRS's actions or because, in our view, the actions taken did not fully address the issue that gave rise to the recommendation. Forty-six recommendations from prior years remain open, a significant number of which have been outstanding for several years. During our audit of IRS's fiscal year 2008 financial statements, we identified additional issues that require corrective action. In a recent management report to IRS,[Footnote 9] we discussed these issues, and made 16 new recommendations to address them. Consequently, 62 financial management-related recommendations need to be addressed. While most of these can be addressed in the short term,[Footnote 10] a few, particularly those concerning IRS's automated systems, are complex and will require several more years to fully and effectively address. We consider 52 recommendations to be short-term and 10 to be long-term. In addition to the 62 open recommendations from our financial audits and other financial management-related work, there are 74 open recommendations stemming from our assessment of IRS's information security controls over key financial systems, information, and interconnected networks. Those 74 primarily relate to lack of an agencywide information security program, which was a key reason for the material weakness in IRS's information systems security controls over its financial and tax processing systems. Unresolved, previously reported recommendations and newly identified recommendations related to information security increase the risk of unauthorized disclosure, modification, or destruction of financial and sensitive taxpayer data. Recommendations resulting from the information security issues identified in our annual audits of IRS's financial statements are reported separately because of the sensitive nature of these issues. Appendix I presents a list of (1) the 81 recommendations based on our financial statement audits and other financial management-related work that we had not previously reported as closed, (2) IRS-reported corrective actions taken or planned as of April 2009, and (3) our analysis of whether the issues that gave rise to the recommendations have been effectively addressed based primarily on the work performed during our fiscal year 2008 financial statement audit. Appendix I includes recommendations based on our fiscal year 2008 financial statement audit. The appendix lists the recommendations by the date on which the recommendation was made and by report number. Appendix II presents the open recommendations arranged by related material weakness, significant deficiency, compliance issue, or other control issue as described in our opinion report on IRS's financial statements. [Footnote 11] Open Recommendations Grouped by Control Activity: Linking the open recommendations from our financial audits and other financial management-related work, and the issues that gave rise to them, to internal control activities that are central to IRS's tax administration responsibilities provides insight regarding their significance. The internal control standards define 11 control activities grouped into three broad categories as shown in table 1.[Footnote 12] The open recommendations from our financial audits and financial management- related work, and the underlying issues that gave rise to them, can be traced to one of the control activities. Table 1: Summary of Open Recommendations: Control category/control activity: Safeguarding of assets and security activities: Physical control over vulnerable assets; Open at the beginning of 2008: 9; Closed during 2008 audit: 4; New from 2008 audit: 6; Total remaining open: 11; Percentage: 18. Control category/control activity: Safeguarding of assets and security activities: Segregation of duties; Open at the beginning of 2008: 3; Closed during 2008 audit: 0; New from 2008 audit: 0; Total remaining open: 3; Percentage: 5. Control category/control activity: Safeguarding of assets and security activities: Controls over information processing; Open at the beginning of 2008: 1; Closed during 2008 audit: 0; New from 2008 audit: 0; Total remaining open: 1; Percentage: 1. Control category/control activity: Safeguarding of assets and security activities: Access restrictions to and accountability for resources and records; Open at the beginning of 2008: 8; Closed during 2008 audit: 3; New from 2008 audit: 0; Total remaining open: 5; Percentage: 8. Control category/control activity: Safeguarding of assets and security activities: Subtotal; Open at the beginning of 2008: 21; Closed during 2008 audit: 7; New from 2008 audit: 6; Total remaining open: 20; Percentage: 32. Control category/control activity: Proper recording and documenting of transactions: Appropriate documentation of transactions and internal controls; Open at the beginning of 2008: 12; Closed during 2008 audit: 3; New from 2008 audit: 0; Total remaining open: 9; Percentage: 15. Control category/control activity: Proper recording and documenting of transactions: Accurate and timely recording of transactions and events; Open at the beginning of 2008: 18; Closed during 2008 audit: 9; New from 2008 audit: 3; Total remaining open: 12; Percentage: 19. Control category/control activity: Proper recording and documenting of transactions: Proper execution of transactions and events; Open at the beginning of 2008: 3; Closed during 2008 audit: 1; New from 2008 audit: 1; Total remaining open: 3; Percentage: 5. Control category/control activity: Proper recording and documenting of transactions: Subtotal; Open at the beginning of 2008: 33; Closed during 2008 audit: 13; New from 2008 audit: 4; Total remaining open: 24; Percentage: 39. Control category/control activity: Effective management review and oversight: Reviews by management at the functional or activity level; Open at the beginning of 2008: 19; Closed during 2008 audit: 9; New from 2008 audit: 3; Total remaining open: 13; Percentage: 21. Control category/control activity: Effective management review and oversight: Establishment and review of performance measures and indicators; Open at the beginning of 2008: 3; Closed during 2008 audit: 3; New from 2008 audit: 3; Total remaining open: 3; Percentage: 5. Control category/control activity: Effective management review and oversight: Management of human capital; Open at the beginning of 2008: 5; Closed during 2008 audit: 3; New from 2008 audit: 0; Total remaining open: 2; Percentage: 3. Control category/control activity: Effective management review and oversight: Subtotal; Open at the beginning of 2008: 27; Closed during 2008 audit: 15; New from 2008 audit: 6; Total remaining open: 18; Percentage: 29. Control category/control activity: Total; Open at the beginning of 2008: 81; Closed during 2008 audit: 35; New from 2008 audit: 16; Total remaining open: 62; Percentage: 100. Source: GAO analysis of the status of financial management recommendations made to IRS. [End of table] As table 1 indicates, 20 recommendations (32 percent) relate to issues associated with IRS's lack of effective controls over safeguarding of assets and security activities. Another 24 recommendations (39 percent) relate to issues associated with IRS's inability to properly record and document transactions. The remaining 18 open recommendations (29 percent) relate to issues associated with the lack of effective management review and oversight. On the following pages, we group the 62 open recommendations under the control activity to which the condition that gave rise to them most appropriately fits. We first define each control activity as presented in the internal control standards and briefly identify some of the key IRS operations that fall under that control activity. Although not comprehensive, the descriptions are intended to help explain why actions to strengthen these control activities are important for IRS to efficiently and effectively carry out its overall mission. For each recommendation, we also indicate whether it is a short-term or long- term recommendation. For those characterized as short-term, we believe that IRS has the capability to implement solutions within 2 years. Safeguarding of Assets and Security Activities: Given IRS's mission, the sensitivity of the data it maintains, and its processing of trillions of dollars of tax receipts each year, one of the most important control activities at IRS is the safeguarding of assets. Internal control in this important area should be designed to provide reasonable assurance regarding prevention or prompt detection of unauthorized acquisition, use, or disposition of an agency's assets. We have grouped together the four control activities in the internal control standards that relate to safeguarding of assets (including tax receipts) and security activities (such as limiting access to only authorized personnel): (1) physical control over vulnerable assets, (2) segregation of duties, (3) controls over information processing, and (4) access restrictions to and accountability for resources and records. Physical Control over Vulnerable Assets: Internal control standard: An agency must establish physical control to secure and safeguard vulnerable assets. Examples include security for and limited access to assets such as cash, securities, inventories, and equipment which might be vulnerable to risk of loss or unauthorized use. Such assets should be periodically counted and compared to control records. IRS collects trillions of dollars in taxes each year, a significant amount of which is collected in the form of checks and cash accompanied by tax returns and related information. IRS collects taxes both at its own facilities as well as at lockbox banks that operate under contract with the Department of the Treasury's (Treasury) Financial Management Service. IRS acts as custodian for (1) the tax payments it receives until they are deposited in the General Fund of the U.S. Treasury and (2) the tax returns and related information it receives until they are either sent to the Federal Records Center or destroyed. IRS is also charged with controlling many other assets, such as computers and other equipment, but IRS's legal responsibility to safeguard tax returns and the confidential information taxpayers provide on tax returns makes the effectiveness of its internal controls with respect to physical security essential. While effective physical safeguards over receipts should exist throughout the year, such safeguards are especially important during the peak tax filing season. Each year during the weeks preceding and shortly after April 15, an IRS service center campus (SCC) or lockbox bank may receive and process daily over 100,000 pieces of mail containing returns, receipts, or both. The dollar value of receipts each SCC and lockbox bank processes increases to hundreds of millions of dollars a day during the April 15 time frame. The following 11 recommendations are designed to improve IRS's physical controls over vulnerable assets. We consider all of them to be correctable on a short-term basis. (See table 2.) Table 2: Recommendations to Improve IRS's Physical Controls over Vulnerable Assets: ID no.: 04-08; Recommendations: Enforce policies and procedures to ensure that service center campus security guards respond to alarms. (short-term) ID no.: 06-05; Recommendations: Equip all Taxpayer Assistance Centers (TACs) with adequate physical security controls to deter and prevent unauthorized access to restricted areas or office space occupied by other IRS units, including those TACs that are not scheduled to be reconfigured to the "new TAC" model in the near future. This includes appropriately separating customer service waiting areas from restricted areas in the near future by physical barriers such as locked doors marked with signs barring entrance by unescorted customers. (short-term) ID no.: 06-08; Recommendations: Enforce the requirement that all security or other responsible personnel at service center campuses (SCC) and lockbox banks record all instances involving the activation of intrusion alarms, regardless of the circumstances that may have caused the activation. (short-term) ID no.: 07-04; Recommendations: Develop and implement appropriate corrective actions for any gaps in closed circuit television (CCTV) camera coverage that do not provide an unobstructed view of the entire exterior of the SCC's perimeter, such as adding or repositioning existing CCTV cameras or removing obstructions. (short-term) ID no.: 07-20; Recommendations: Establish and maintain sufficient secured storage space to properly secure and safeguard property and equipment inventory, including in-stock inventories, assets from incoming shipments, and assets that are in the process of being excessed and/or shipped out. (short-term) ID no.: 09-03; Recommendations: Document in the Internal Revenue Manual (IRM) minimum requirements for establishing criteria for time discrepancies or other inconsistencies, which if noted as part of the required monitoring of Form 10160, Receipt for Transport of IRS Deposit, would require off- site surveillance of couriers. (short-term) ID no.: 09-04; Recommendations: Document in the IRM minimum requirements for conducting off-site surveillance of couriers entrusted with taxpayer receipts and information. (short-term) ID no.: 09-06; Recommendations: Establish procedures to ensure that an inventory of all duress alarms is documented for each location and is readily available to individuals conducting duress alarm tests before each test is conducted. (short-term) ID no.: 09-07; Recommendations: Establish procedures to periodically update the inventory of duress alarms at each TAC location to ensure that the inventory is current and complete as of the testing date. (short-term) ID no.: 09-08; Recommendations: Provide instructions for conducting quarterly duress alarm tests to ensure that IRS officials conducting the test (1) document the test results for each duress alarm listed in the inventory, including date, findings, and planned corrective action and (2) track the findings until they are properly resolved. (short-term) ID no.: 09-09; Recommendations: Establish procedures requiring that each physical security analyst conduct a periodic documented review of the Emergency Signal History Report and emergency contact list for its respective location to ensure that (1) appropriate corrective actions have been planned for all incidents reported by the central monitoring station and (2) the emergency contact list for each location is current and includes only appropriate contacts. (short-term) Source: GAO analysis of financial management recommendations made to IRS. [End of table] Segregation of Duties: Internal control standard: Key duties and responsibilities need to be divided or segregated among different people to reduce the risk of error or fraud. This should include separating the responsibilities for authorizing transactions, processing and recording them, reviewing the transactions, and handling any related assets. No one individual should control all key aspects of a transaction or event. IRS employees process trillions of dollars of tax receipts each year, of which hundreds of billions are received in the form of cash or checks, and for processing hundreds of billions of dollars in refunds to taxpayers.[Footnote 13] Consequently, it is critical that IRS maintain appropriate separation of duties to allow for adequate oversight of staff and protection of these vulnerable resources so that no single individual would be in a position of causing an error or irregularity, potentially converting the asset to personal use, and then concealing it. For example, when an IRS field office or lockbox bank receives taxpayer receipts and returns, it is responsible for depositing the cash and checks in a depository institution and forwarding the related information received to an SCC for further processing. In order to adequately safeguard receipts from theft, the person responsible for recording the information from the taxpayer receipts on a voucher should be different from the individual who prepares those receipts for transmittal to the SCC for further processing. Also, for procurement of goods and services, the person who places an order for goods and services should be different from the person who receives the goods and services. Such separation of duties will help to prevent the occurrence of fraud, theft of IRS assets, or both. Implementing the following three recommendations would help IRS improve its separation of duties, which will in turn strengthen its controls over tax receipts and refunds and procurement activities. All are short- term in nature. (See table 3.) Table 3: Recommendations to Improve IRS's Segregation of Duties: ID no.: 02-16; Recommendations: Ensure that field office management complies with existing receipt control policies that require a segregation of duties between employees who prepare control logs for walk-in payments and employees who reconcile the control logs to the actual payments. (short- term) ID no.: 05-32; Recommendations: Establish policies and procedures to require appropriate segregation of duties in small business/self-employed units of field offices with respect to preparation of Payment Posting Vouchers, Document Transmittal forms, and transmittal packages. (short- term) ID no.: 07-21; Recommendations: Develop and implement procedures to require that separate individuals place orders with vendors and perform receipt and acceptance functions when the orders are delivered. (short-term) Source: GAO analysis of financial management recommendations made to IRS. [End of table] Controls over Information Processing: Internal control standard: A variety of control activities are used in information processing. Examples include edit checks of data entered, accounting for transactions in numerical sequences, and comparing file totals with control totals. There are two broad groupings of information systems control--general control (for hardware such as mainframe, network, end-user environments) and application control (processing of data within the application software). General controls include entitywide security program planning, management, and backup recovery procedures and contingency and disaster planning. Application controls are designed to help ensure completeness, accuracy, authorization, and validity of all transactions during application processing. IRS relies extensively on computerized systems to support its financial and mission-related operations. To efficiently fulfill its tax processing responsibilities, IRS relies extensively on interconnected networks of computer systems to perform various functions, such as collecting and storing taxpayer data, processing tax returns, calculating interest and penalties, generating refunds, and providing customer service. As part of our annual audits of IRS's financial statements, we assess the effectiveness of IRS's information security controls over key financial systems, data, and interconnected networks at IRS's critical data processing facilities that support the processing, storage, and transmission of sensitive financial and taxpayer data.[Footnote 14] From that effort over the years, we have identified information security control weaknesses that impair IRS's ability to ensure the confidentiality, integrity, and availability of its sensitive financial and taxpayer data. As of January 2009, there were 74 open recommendations from our information security work designed to improve IRS's information security controls.[Footnote 15] As discussed previously, recommendations resulting from our information security work are reported separately and are not included in this report primarily because of the sensitive nature of these issues. However, the following short-term recommendation is related to systems limitations and IRS's need to enhance its computer programs. (See table 4.) Table 4: Recommendation to Improve IRS's Controls over Information Processing: ID no.: 02-18; Recommendations: Work with the National Finance Center (NFC) to resolve the technical limitations that exist within the Security Entry and Tracking System (SETS) database and continue to periodically review SETS data to detect and correct errors. (short-term) Source: GAO analysis of financial management recommendations made to IRS. [End of table] Access Restrictions to and Accountability for Resources and Records: Internal control standard: Access to resources and records should be limited to authorized individuals, and accountability for their custody and use should be assigned and maintained. Periodic comparison of resources with the recorded accountability should be made to help reduce the risk of errors, fraud, misuse, or unauthorized alteration. Because IRS deals with a large volume of cash and checks, it is imperative that it maintain strong controls to appropriately restrict access to those assets, the records that track those assets, and sensitive taxpayer information. Although IRS has a number of both physical and information systems controls in place, some of the issues we have identified in our financial audits over the years pertain to ensuring that those individuals who have direct access to these cash and checks are appropriately vetted before being granted access to taxpayer receipts and information and to ensuring that IRS maintains effective access security control. The following five short-term recommendations were intended to help IRS improve its access restrictions to assets and records. (See table 5.) Table 5: Recommendations to Improve IRS's Access Restrictions to and Accountability for Resources and Records: ID no.: 08-12; Recommendations: Establish procedures to require documentation demonstrating that favorable background checks have been completed for all contractors prior to allowing them access to TAC and other field offices. (short-term) ID no.: 08-13; Recommendations: Require including, in all shredding service contracts, provisions requiring (1) completed background investigations for contractor employees before they are granted access to sensitive IRS information and (2) periodic, unannounced inspections at off-site shredding facilities by IRS to verify ongoing compliance with IRS safeguards and security requirements. (short-term) ID no.: 08-15; Recommendations: Establish procedures to require obtaining and reviewing documentation of completed background investigations for all shredding contractors before granting them access to taxpayer or other sensitive IRS information. (short-term) ID no.: 08-16; Recommendations: Reinforce existing policies requiring the use of the revised Form 13094 when hiring juveniles. (short-term) ID no.: 08-17; Recommendations: Reinforce existing policies requiring verification of the information on Form 13094 by contacting the reference directly and documenting the details of this contact. (short-term) Source: GAO analysis of financial management recommendations made to IRS. [End of table] Proper Recording and Documenting of Transactions: IRS has a number of internal control issues that relate to recording transactions, documenting events, and tracking the processing of taxpayer receipts or information. We have grouped three control activities together that relate to proper recording and documenting of transactions: (1) appropriate documentation of transactions and internal controls, (2) accurate and timely recording of transactions and events, and (3) proper execution of transactions and events. Appropriate Documentation of Transactions and Internal Control: Internal control standard: Internal control and all transactions and other significant events need to be clearly documented, and the documentation should be readily available for examination. The documentation should appear in management directives, administrative policies, or operating manuals and may be in paper or electronic form. All documentation and records should be properly managed and maintained. IRS collects and processes trillions of dollars in taxpayer receipts annually both at its own facilities and at lockbox banks under contract to process taxpayer receipts for the federal government. Therefore, it is important that IRS maintain effective controls to ensure that all documents and records are properly and timely recorded, managed, and maintained both at its facilities and at the lockbox banks. IRS must adequately document and disseminate its procedures to ensure that they are available for IRS employees. IRS must also document its management reviews of controls, such as those regarding refunds and returned checks, credit card purchases, and reviews of taxpayer assistance centers (TAC). Finally, to ensure future availability of adequate documentation, IRS must ensure that its systems, particularly those now being developed and implemented, have appropriate capability to trace transactions. Resolving the following nine recommendations would assist IRS in improving its documentation of transactions and internal control procedures. Eight of these recommendations are short-term, and one is long-term. (See table 6.) Table 6: Recommendations to Improve IRS's Documentation of Transactions and Internal Control: ID no.: 05-39; Recommendations: Enforce requirements for documenting monitoring actions and supervisory review for manual refunds. (short-term) ID no.: 06-01; Recommendations: Require that Refund Inquiry Unit managers or supervisors document their review of all forms used to record and transmit returned refund checks prior to sending them for final processing. (short-term) ID no.: 06-02; Recommendations: Enforce compliance with existing requirements that all IRS units transmitting taxpayer receipts and information from one IRS facility to another, including SCCs, TACs, and units within Large and Mid-sized Business (LMSB) and Tax-Exempt and Government Entities (TE/GE), establish a system to track acknowledged copies of document transmittals. (short-term) ID no.: 06-04; Recommendations: Require that managers or supervisors document their reviews of document transmittals to ensure that taxpayer receipts and/or taxpayer information mailed between IRS locations are tracked according to guidelines. (short-term) ID no.: 06-07; Recommendations: Document supervisory visits by offsite managers to TACs not having a manager permanently on-site. This documentation should be signed by the manager and should (1) record the time and date of the visit, (2) identify the manager performing the visit, (3) indicate the tasks performed during the visit, (4) note any problems identified, and (5) describe corrective actions planned. (short-term) ID no.: 07-15; Recommendations: Issue a memorandum to employees in the Centralized Insolvency Office reiterating the Internal Revenue Manual (IRM) requirement to timely record bankruptcy discharge information onto taxpayer accounts in the master file or to manually release the liens in the Automated Lien System. (short-term) ID no.: 08-01; Recommendations: As IRS proceeds with its implementation of the Custodial Detail Data Base (CDDB), it should verify that CDDB, when it becomes fully operational and is used in conjunction with the Interim Revenue and Accounting Control System (IRACS), will provide IRS with the direct transaction traceability for all of its tax-related transactions as required by the U.S. Standard General Ledger (SGL), Federal Financial Management System Requirements (FFMSR), and the Federal Financial Management Improvement Act of 1996 (FFMIA). (long- term) ID no.: 08-02; Recommendations: Document and implement the specific procedures to be performed by the IRS statistician in each step of the unpaid assessment estimation process. (short-term) ID no.: 08-07; Recommendations: Develop and provide comprehensive guidance to assist TAC managers in conducting reviews of outlying TACs and documenting the results. This guidance should include a description of the key controls that should be in place at outlying TACs, specify how often these key controls should be reviewed, and specify how the results of each review should be documented, including follow-up on issues identified in previous TAC reviews. (short-term) Source: GAO analysis of financial management recommendations made to IRS. [End of table] Accurate and Timely Recording of Transactions and Events: Internal control standard: Transactions should be promptly recorded to maintain their relevance and value to management in controlling operations and making decisions. This applies to the entire process or life cycle of a transaction or event from the initiation and authorization through its final classification in summary records. In addition, control activities help to ensure that all transactions are completely and accurately recorded. IRS maintains taxpayer records for tens of millions of taxpayers in addition to maintaining its own financial records. To carry out this responsibility, IRS often has to rely on outdated computer systems or manual work-arounds. Unfortunately, some of IRS's recordkeeping difficulties we have reported on over the years will not be addressed until it can replace its aging systems, an effort that is long-term and partly depends on future funding. Implementation of the following 12 recommendations would strengthen IRS's recordkeeping abilities. (See table 7.) Seven of these recommendations are short-term, and 5 are long-term regarding requirements for new systems for maintaining taxpayer records. Several of the recommendations listed deal with financial reporting processes, such as maintaining subsidiary records, recording budgetary transactions, and tracking program costs. Some of the issues that gave rise to several of our recommendations directly affect taxpayers, such as those involving duplicate assessments, errors in calculating and reporting manual interest, errors in calculating penalties, and recovery of trust fund penalty assessments. Seven of these recommendations have remained open at least 5 years and one over 10 years, reflecting the complex nature of the underlying systems issues that must be resolved to fully address some of these issues. Table 7: Recommendations to Improve IRS's Accurate and Timely Recording of Transactions and Events: ID no.: 94-02; Recommendations: Monitor implementation of actions to reduce the errors in calculating and reporting manual interest on taxpayer accounts, and test the effectiveness of these actions. (short-term) ID no.: 99-01; Recommendations: Manually review and eliminate duplicate or other assessments that have already been paid off to assure that all accounts related to a single assessment are appropriately credited for payments received. (short-term) ID no.: 99-03; Recommendations: Ensure that IRS's modernization blueprint includes developing a subsidiary ledger to accurately and promptly identify, classify, track, and report all IRS unpaid assessments by amount and taxpayer. This subsidiary ledger must also have the capability to distinguish unpaid assessments by category in order to identify those assessments that represent taxes receivable versus compliance assessments and write-offs. In cases involving trust fund recovery penalties, the subsidiary ledger should ensure that (1) the trust fund recovery penalty assessment is appropriately tracked for all taxpayers liable but counted only once for reporting purposes and (2) all payments made are properly credited to the accounts of all individuals assessed for the liability. (short-term) ID no.: 99-20; Recommendations: Analyze and determine the factors causing delays in processing and posting Trust Fund Recovery Penalty (TFRP) assessments. Once these factors have been determined, IRS should develop procedures to reduce the impact of these factors and to ensure timely posting to all applicable accounts and proper offsetting of refunds against unpaid assessments before issuance. (long-term) ID no.: 99-36; Recommendations: Make enhancements to IRS financial systems to include recording plant and equipment (P&E) and capital leases as assets when purchased and to generate detailed records for P&E that reconcile to the financial records. (long-term) ID no.: 01-17; Recommendations: Develop a subsidiary ledger for leasehold improvements and implement procedures to record leasehold improvement costs as they occur. (long-term) ID no.: 01-39; Recommendations: Develop a mechanism to track and report the actual costs associated with reimbursable activities. (long-term) ID no.: 06-22; Recommendations: Direct Facilities Management Branch managers to research and resolve the aging reports. (short-term) ID no.: 08-06; Recommendations: In instances where computer programs are not functioning in accordance with the intent of the IRM, take appropriate action to correct the programs so that they function in accordance with the IRM. (long-term) ID no.: 09-01; Recommendations: Correct the Integrated Data Retrieval System (IDRS) computer program for identifying individual taxpayers who have entered into an installment agreement so that except in situations where the taxpayer did not file the tax return timely, failure-to-pay penalty assessments made after the date of the installment agreement are calculated using the monthly one-quarter of one percent penalty rate on all of the taxpayer's accounts covered by the installment agreement. (short-term) ID no.: 09-12; Recommendations: Reiterate IRS's existing policy requiring that transactions be recorded accurately to the undelivered orders obligation accounts. (short-term) ID no.: 09-13; Recommendations: Perform existing reviews of transactions recorded in undelivered orders obligation accounts in a more timely manner in an effort to detect and correct errors, such as duplicate receipt and acceptance charges, earlier in the process. (short-term) Source: GAO analysis of financial management recommendations made to IRS. [End of table] Proper Execution of Transactions and Events: Internal control standard: Transactions and other significant events should be authorized and executed only by persons acting within the scope of their authority. This is the principal means of ensuring that only valid transactions to exchange, transfer, use, or commit resources and other events are initiated or entered into. Authorizations should be clearly communicated to managers and employees. Each year, IRS pays out hundreds of billions of dollars in tax refunds, some of which are distributed to taxpayers manually.[Footnote 16] IRS requires that all manual refunds be approved by designated officials. However, weaknesses in controls for authorizing such refunds expose the federal government to losses because of the issuance of improper refunds. Likewise, the failure to ensure that employees obtain appropriate authorizations to use purchase cards or initiate travel similarly leave the government open to fraud, waste, or abuse. Dealing with the following three short-term recommendations would improve IRS's controls over its manual refund, travel, and purchase card transactions. (See table 8.) Table 8: Recommendations to Improve IRS's Execution of Transaction and Events: ID no.: 05-37; Recommendations: Enforce documentation requirements relating to authorizing officials charged with approving manual refunds. (short- term) ID no.: 08-24; Recommendations: Issue a memorandum to employees that reiterates IRS policy requiring all employees to obtain appropriate approvals of travel authorizations prior to the initiation of their travel. (short- term) ID no.: 09-10; Recommendations: Develop, document, and implement procedures to regularly monitor the timeliness of purchase card approvals. This should include establishing procedures and responsibility for identifying and following up on instances of noncompliance with required approval timeframes. (short-term) Source: GAO analysis of financial management recommendations made to IRS. [End of table] Effective Management Review and Oversight: All personnel within IRS have an important role in establishing and maintaining effective internal controls, but IRS's managers have additional review and oversight responsibilities. Management must set the objectives, put control activities in place, and monitor and evaluate controls to ensure that they are followed. Without adequate monitoring by managers, there is a risk that internal control activities may not be carried out effectively and in a timely manner. We have grouped three control activities related to effective management review and oversight: (1) reviews by management at the functional or activity level, (2) establishment and review of performance measures and indicators, and (3) management of human capital. Although we also include the control activity "top-level reviews of actual performance" in this grouping, we do not have any open recommendations to IRS related to this internal control activity. Reviews by Management at the Functional or Activity Level: Internal control standard: Managers need to compare actual performance to planned or expected results throughout the organization and analyze significant differences. IRS employs over 100,000 full-time and seasonal employees. In addition, as discussed earlier, Treasury's Financial Management Service contracts with banks to process tens of thousands of individual receipts, totaling hundreds of billions of dollars. Management oversight of operations is important at any organization, but is imperative at IRS given its mission. Implementing the following 11 short-term and 2 long-term recommendations would improve IRS's management oversight of courier services, contractor facilities, penalty calculations, timely release of liens, issuance of manual refunds, and use of appropriated funds. (See table 9.) These recommendations were made because an internal control activity either did not exist or the existing control was not being adequately or consistently applied. Table 9: Recommendations to Improve IRS's Reviews by Management at the Functional or Activity Level: ID no.: 99-22; Recommendations: Expand IRS's current review of campus deterrent controls to include similar analyses of controls at IRS field offices in areas such as courier security, safeguarding of receipts in locked containers, requirements for fingerprinting employees, and requirements for promptly overstamping checks made out to "IRS" with "Internal Revenue Service" or "United States Treasury." Based on the results, IRS should make appropriate changes to strengthen its physical security controls. (short-term) ID no.: 01-06; Recommendations: Implement procedures to closely monitor the release of tax liens to ensure that they are released within 30 days of the date the related tax liability is fully satisfied. As part of these procedures, IRS should carefully analyze the causes of the delays in releasing tax liens identified by our work and prior work by IRS's former internal audit function and ensure that such procedures effectively address these issues. (short-term) ID no.: 05-33; Recommendations: Enforce the requirement that a document transmittal form listing the enclosed Daily Report of Collection Activity forms be included in transmittal packages, using such methods as more frequent inspections or increased reliance on error reports compiled by the service center teller units receiving the information. (short-term) ID no.: 05-38; Recommendations: Enforce requirements for monitoring accounts and reviewing monitoring of accounts for manual refunds. (short-term) ID no.: 07-24; Recommendations: To the extent that IRS intends to use the information security work conducted under the Federal Information Security Management Act of 2002 (FISMA) to meet related A-123 requirements, identify the areas where the work conducted under FISMA does not meet the requirements of OMB Circular No. A-123 and, considering the findings and recommendations of our work on IRS's information security, expand FISMA procedures or perform additional procedures as part of the A-123 reviews to augment FISMA work. (short-term) ID no.: 07-25; Recommendations: Revise A-123 test plans to include appropriate consideration of the design of internal controls in addition to implementation of controls over individual transactions. (short-term) ID no.: 07-27; Recommendations: Begin devising appropriate A-123 follow-up procedures for the last 3 months of the fiscal year to be implemented once the material weaknesses identified through the annual financial statement audits have been resolved. (short-term) ID no.: 08-04; Recommendations: To address the inconsistency in assigning the effective date of an accuracy-related penalty, modify the Business Master File computer program so that the date of the deficiency assessment is used as the effective date of any associated accuracy- related penalty. (long-term) ID no.: 08-08; Recommendations: Establish a process to periodically update and communicate the specific required reviews for all off-site TAC managers. (short-term) ID no.: 08-14; Recommendations: Revise the IRM to include a requirement that IRS conduct periodic, unannounced inspections at off-site contractor facilities entrusted with sensitive IRS information; document the results, including identification of any security issues; and verify that the contractor has taken appropriate corrective actions on any security issues observed. (short-term) ID no.: 09-02; Recommendations: Add specific requirements to the IRM to require that manual refund units assign back up staff to perform manual refund monitoring activities whenever a manual refund initiator is absent for an extended period of time. (short-term) ID no.: 09-05; Recommendations: Establish procedures to track and routinely report the total dollar amounts and volumes of receipts collected by individual TAC location, group, territory, area, and nationwide. (long-term) ID no.: 09-11; Recommendations: Revise the IRM section related to the limited use of expired appropriations to provide additional guidance to help employees distinguish between procurement actions that constitute new obligations and those that merely adjust or liquidate prior obligations that the IRS incurred during an expired appropriation's original period of availability. (short-term) Source: GAO analysis of financial management recommendations made to IRS. [End of table] Establishment and Review of Performance Measures and Indicators: Internal control standard: Activities need to be established to monitor performance measures and indicators. These controls could call for comparisons and assessments relating different sets of data to one another so that analyses of the relationships can be made and appropriate actions taken. Controls should also be aimed at validating the propriety and integrity of both organizational and individual performance measures and indicators. IRS's operations include a vast array of activities encompassing educating taxpayers, processing of taxpayer receipts and data, disbursing hundreds of billions of dollars in refunds to millions of taxpayers, maintaining extensive information on tens of millions of taxpayers, and seeking collection from individuals and businesses that fail to comply with the nation's tax laws. Within its compliance function, IRS has numerous activities, including identifying businesses and individuals that underreport income, collecting from taxpayers who do not pay taxes, and collecting from those receiving refunds for which they are not eligible. Although IRS has at its peak over 100,000 employees, it still faces resource constraints in attempting to fulfill its duties. It is vitally important for IRS to have sound performance measures to assist it in assessing its performance and targeting its resources to maximize the government's return on investment. However, in past audits we have reported that IRS did not capture costs at the program or activity level to assist in developing cost-based performance measures for its various programs and activities. As a result, IRS is unable to measure the costs and benefits of its various collection and enforcement efforts to best target its available resources. The following short-term and two long-term recommendations are designed to assist IRS in (1) evaluating its operations, (2) determining which activities are the most beneficial, and (3) establishing a good system for oversight. (See table 10.) These recommendations call for IRS to measure, track, and evaluate the costs, benefits, or outcomes of its operations--particularly with regard to identifying its most cost- effective tax collection activities. Table 10: Recommendations to Improve IRS's Establishment and Review of Performance Measures and Indicators: ID no.: 09-14; Recommendations: Establish a formal, documented process for identifying over time the full range of IRS's programs and underlying activities, outputs, and services for which IRS believes full cost information would be useful to executives and program managers. Such a process should (1) be formally established and documented through policies, procedures, guidance, meeting minutes, and other appropriate means; (2) define the roles and responsibilities of the CFO and other business units in the process; and (3) be focused on the goal of determining what cost information would be useful and the most appropriate means of developing and reporting it for both existing programs and new programs as they are initiated. (short-term) ID no.: 09-15; Recommendations: For each of the IRS programs, activities, outputs, and services identified for which full cost information would be useful to IRS executives and program managers, complete the development of full cost methodologies to routinely accumulate and report on their full costs, including down to the activity level where appropriate. Such full cost data should be readily accessible to IRS program managers whenever they are needed and should include both personnel costs based on time spent on specific activities as well as all associated non- personnel costs and be drawn from or reconcilable to IRS's financial accounting system. (long-term) ID no.: 09-16; Recommendations: Develop outcome-oriented performance measures and related performance goals for IRS's enforcement programs and activities that include measures of the full cost of, and the revenue collected from, those programs and activities (return on investment) to assist IRS's managers in optimizing resource allocation decisions and evaluating the effectiveness of their activities. (long-term) Source: GAO analysis of financial management recommendations made to IRS. [End of table] Management of Human Capital: Internal control standard: Effective management of an organization's workforce--its human capital--is essential to achieving results and an important part of internal control. Management should view human capital as an asset rather than a cost. Only when the right personnel for the job are on board and are provided the right training, tools, structure, incentives, and responsibilities is operational success possible. Management should ensure that skill needs are continually assessed and that the organization is able to obtain a workforce that has the required skills that match those necessary to achieve organizational goals. Training should be aimed at developing and retaining employee skill levels to meet changing organizational needs. Qualified and continuous supervision should be provided to ensure that internal control objectives are achieved. Performance evaluation and feedback, supplemented by an effective reward system, should be designed to help employees understand the connection between their performance and the organization's success. As a part of its human capital planning, management should also consider how best to retain valuable employees, plan for their eventual succession, and ensure continuity of needed skills and abilities. IRS's operations cover a wide range of technical competencies with specific expertise needed in tax-related matters; financial management; and systems design, development, and maintenance. Because IRS has tens of thousands of employees spread throughout the country, it is imperative that management keeps its guidance up-to-date and its staff properly trained. Putting the following two short-term recommendations into effect would assist IRS in its management of human capital. (See table 11.) Table 11: Recommendations to Improve IRS's Management of Human Capital: ID no.: 07-08; Recommendations: Require that managers or supervisors provide the manual refund initiators in their units with training on the most current requirements to help ensure that they fulfill their responsibilities to monitor manual refunds and document their monitoring actions to prevent the issuance of duplicate refunds. (short- term) ID no.: 08-03; Recommendations: Document and implement specific detailed procedures for reviewers to follow in their review of unpaid assessments statistical estimates. Specifically, IRS should require that a detailed supervisory review be performed to ensure: (1) the statistical validity of the sampling plans, (2) data entered into the sample selection programs agree with the sampling plans, (3) data entered into the statistical projection programs agree with IRS's sample review results, (4) data on the spreadsheets used to compile the interim projections and roll-forward results trace back to supporting statistical projection results, and (5) the calculations on these spreadsheets are mathematically correct. (short-term) Source: GAO analysis of financial management recommendations made to IRS. [End of table] Open Recommendations Arranged by Related Material Weakness, Significant Deficiency, Compliance Issue, or Other Control Issue: For several years, we have reported material weaknesses, significant deficiencies, noncompliance with laws and regulations, and other control issues in our annual financial statement audits and related management reports.[Footnote 17] To assist IRS in addressing those control issues, appendix II provides summary information regarding the primary issue to which each open recommendation is related. To compile this summary, we analyzed the nature of the open recommendations to relate them to the material weaknesses, significant deficiency, compliance issue, and other control issues not associated with a material weakness or significant deficiency identified as part of our financial statement audit. Concluding Observations: Increased budgetary pressures and an increased public awareness of the importance of internal control require IRS to carry out its mission more efficiently and more effectively while protecting taxpayers' information. Sound financial management and effective internal controls are essential if IRS is to efficiently and effectively achieve its goals. IRS has made substantial progress in improving its financial management since its first financial audit, as evidenced by unqualified audit opinions on its financial statements for the past 9 years, resolution of several material internal control weaknesses and significant deficiencies, and actions taken resulting in the closure of hundreds of financial management recommendations. This progress has been the result of hard work by many individuals throughout IRS and sustained commitment of IRS leadership. Nonetheless, more needs to be done to fully address the agency's continuing financial management challenges. Further efforts are needed to address the internal control deficiencies that continue to exist. Effective implementation of the recommendations we have made and continue to make through our financial audits and related work could greatly assist IRS in improving its internal controls and achieving sound financial management. While we recognize that some actions--primarily those related to modernizing automated systems--will take a number of years to resolve, most of the open recommendations can be addressed in the short term. Agency Comments and Our Evaluation: In commenting on a draft of this report, IRS expressed its appreciation for our acknowledgment of the agency's progress in addressing its financial management changes as evidenced by our closure of 35 open financial management recommendations from prior GAO reports. IRS also commented that it is committed to implementing appropriate improvements to ensure that it maintains sound financial management practices. We will review the effectiveness of further corrective actions IRS has taken or will take to address all open recommendations as part of our audit of IRS's fiscal year 2009 financial statements. We are sending copies of this report to the Chairmen and Ranking Members of the Senate Committee on Appropriations; Senate Committee on Finance; Senate Committee on Homeland Security and Governmental Affairs; and Subcommittee on Taxation, IRS Oversight and Long-Term Growth, Senate Committee on Finance. We are also sending copies to the Chairmen and Ranking Members of the House Committee on Appropriations; House Committee on Ways and Means; the Chairman and Vice Chairman of the Joint Committee on Taxation; the Secretary of the Treasury; the Director of OMB; the Chairman of the IRS Oversight Board; and other interested parties. The report is also available at no charge on the GAO Web site at [hyperlink, http://www.gao.gov]. If you or your staffs have any questions concerning this report, please contact me at (202) 512-3406 or sebastians@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix IV. Sincerely yours, Signed by: Steven J. Sebastian: Director: Financial Management and Assurance: [End of section] Appendix I: Status of GAO Recommendations from Internal Revenue Service Financial Audits and Related Management Reports: This appendix presents a list of (1) the 81 recommendations that we had not previously reported as closed, (2) Internal Revenue Service (IRS) reported corrective actions taken or planned as of April 2009, and (3) our analysis of whether the issues that gave rise to the recommendations have been effectively addressed. It also includes recommendations based on our fiscal year 2008 financial statement audit. The appendix lists the recommendations by the date on which the recommendation was made and by report number. ID no.: 94-02; Recommendation: Monitor implementation of actions to reduce the errors in calculating and reporting manual interest on taxpayer accounts, and test the effectiveness of these actions (short-term); Source report: Financial Management: Important IRS Revenue Information Is Unavailable or Unreliable (GAO/AIMD-94-22, Dec. 21, 1993); Status per IRS: Open. The Deputy Commissioner, Services and Enforcement issued a memorandum in July 2008 emphasizing the need to use training modules and on-site assistance from the Servicewide Interest Program to ensure accurate calculations. Interest-related training was provided to personnel by January 2009, and additional guidance will be issued to Collection field personnel. SB/SE updated Internal Revenue Manual provisions and made upgrades to the commercial software program utilized to compute manual interest. SB/SE is developing a random sampling process to be completed by October 2009 to measure the accuracy of interest computations; Status per GAO: Open. During our fiscal year 2006 audit, we tested a statistical sample of manual interest transactions and estimated that 18 percent of IRS's manual interest population contains errors. We concluded that IRS controls over this area was still ineffective. The ineffectiveness of these controls contributes to errors in taxpayer records, which is a major component of the material weakness in IRS's management of unpaid assessments. While IRS has undertaken several actions to strengthen controls over this area, such as updating guidance and providing training related to manual interest calculations, it has yet to develop a sampling methodology to monitor the accuracy of its manual interest computation and assess the effectiveness of its corrective actions. Consequently, we did not test IRS controls in this area as part of our fiscal year 2008 audit, as both we and IRS believed that the actions taken by IRS thus far would not improve the accuracy of the manual interest calculations. We will continue to monitor IRS's actions to address this recommendation during future audits. ID no.: 99-01; Recommendation: Manually review and eliminate duplicate or other assessments that have already been paid off to assure that all accounts related to a single assessment are appropriately credited for payments received (short-term); Source report: Internal Revenue Service: Immediate and Long-Term Actions Needed to Improve Financial Management (GAO/AIMD-99-16, Oct. 30, 1998); Status per IRS: Open. Small Business/Self-Employed (SB/SE) continues to request programming changes to increase Automated Trust Fund Recovery systemic processing to reduce the number of accounts requiring manual intervention. IRS reviews Trust Fund Recovery Penalty (TFRP) transactions to ensure accurate and timely recording, including Performance Assurance System reviews by a daily random selection of closed cases, management reviews of a random selection of both closed and open casework, and Headquarters Operational Reviews. In addition to the above reviews, Campus Compliance Services is exploring the development and implementation of a statistically valid sampling plan to monitor the accuracy and timeliness of the cross-referencing of payments and credits to TFRP accounts. The frequency and process for performing these internal reviews will be considered during development; Status per GAO: Open. IRS has made significant progress in this area over the past several years. For example, IRS established procedures to more clearly link each penalty assessment against a responsible corporate officer to a specific tax period of the business account and began phasing in the use of the Automated Trust Fund Recovery system intended to properly cross-reference payments received. IRS also enhanced the Automated Trust Fund Recovery system in fiscal year 2008 to begin automatically reducing the amounts owed on all related accounts when a payment is received from one related party. However, the system is currently unable to process all payments related to such cases. Consequently, IRS must continue to manually reduce the account balance on related accounts for some payments. Thus, the opportunity for errors and omissions continues to exist. Our most recent test indicates that IRS's controls in this area are still not effective in ensuring that all TFRP payments are correctly credited to all related parties in a timely manner. We will continue to monitor IRS's actions to address this recommendation during future audits. ID no.: 99-03; Recommendation: Ensure that IRS's modernization blueprint includes developing a subsidiary ledger to accurately and promptly identify, classify, track, and report all IRS unpaid assessments by amount and taxpayer. This subsidiary ledger must also have the capability to distinguish unpaid assessments by category in order to identify those assessments that represent taxes receivable versus compliance assessments and write-offs. In cases involving trust fund recovery penalties, the subsidiary ledger should ensure that (1) the trust fund recovery penalty assessment is appropriately tracked for all taxpayers liable but counted only once for reporting purposes and (2) all payments made are properly credited to the accounts of all individuals assessed for the liability (short-term); Source report: Internal Revenue Service: Immediate and Long-Term Actions Needed to Improve Financial Management (GAO/AIMD-99-16, Oct. 30, 1998); Status per IRS: Open. IRS is developing the Custodial Detailed Data Base (CDDB), which it believes will ultimately address many of the outstanding financial management recommendations. IRS implemented the first phase of the CDDB during fiscal year 2006. In fiscal year 2008, IRS enhanced CDDB to record unpaid assessments, including accrued penalties and interest in the general ledger by the various financial reporting categories. The Chief Financial Officer's (CFO) office continues to ensure the accuracy of the TFRP cross-referencing using weekly CDDB reports. The CFO provides SB/SE with identified errors so SB/SE can correct the taxpayers account and CDDB can correctly classify the transactions. CDDB is now classifying approximately 80 percent of the TFRP inventory where TFRP assessments are appropriately tracked for all taxpayers liable but counted only once for reporting purposes; Status per GAO: Open. During fiscal year 2008, IRS enhanced CDDB to begin regularly recording unpaid assessments, including accrued penalties and interest, from its master files to its general ledger by the various financial reporting categories (taxes receivable, compliance assessments, and write-offs). These enhancements established CDDB's capability to function as a subsidiary ledger for unpaid tax debt. However, due to inherent limitations in CDDB programs for classifying unpaid assessments into the correct financial reporting categories and inaccuracies in taxpayer records, IRS is still unable to use CDDB as its subsidiary ledger for external reporting of its unpaid assessments, and must continue to use a labor-intensive, manual compensating process to estimate the year-end balances of the various categories of unpaid tax assessments to avoid material misstatements to its financial statements. Specifically, IRS had to make over $28 billion in adjustments to the fiscal year-end 2008 gross taxes receivable balance produced by CDDB as part of its manual estimation process for financial reporting. Full operational capability of CDDB depends on the successful implementation of future system releases planned through 2009 and the ability of these releases to address current limitations in accurately classifying all of IRS's unpaid assessments. The lack of a fully functioning subsidiary ledger capable of producing accurate, useful, and timely information with which to manage and report externally is a major component of the material weakness in IRS's management of unpaid assessments. We will continue to monitor IRS's development of CDDB during our fiscal year 2009 and future audits. ID no.: 99-20; Recommendation: Analyze and determine the factors causing delays in processing and posting TFRP assessments. Once these factors have been determined, IRS should develop procedures to reduce the impact of these factors and to ensure timely posting to all applicable accounts and proper offsetting of refunds against unpaid assessments before issuance (long-term); Source report: Internal Revenue Service: Custodial Financial Management Weaknesses (GAO/AIMD-99-193, Aug. 4, 1999); Status per IRS: Open. SB/SE completed the Control Point Monitor (CPM) pilot in May 2008 and prepared a CPM manual. The CPM serves as a conduit from the Area Office to the Campus for assessment. The CPM manual establishes specific timeframes in which the CPM must process/complete required TFRP actions. Implementation of the manual is currently being negotiated with the National Treasury Employees Union to address impact and implementation issues resulting from the changes to the CPM process. SB/SE has created a suite of managerial reports to provide oversight of the TFRP process. SB/SE continues to submit Work Requests and Information Technology Assets Management System tickets to enhance the assessment process to provide greater efficiencies in the processing and posting of TFRP assessments; Status per GAO: Open. During our fiscal year 2008 audit, we continued to identify long delays in processing and posting TFRP assessments. Although IRS has developed a draft of the CPM manual to provide better guidance for the timely processing of TFRP assessments, the manual is currently undergoing internal reviews and awaiting final approval for official use. We will continue to monitor IRS's actions to address this recommendation during our fiscal year 2009 audit. ID no.: 99-22; Recommendation: Expand IRS's current review of campus deterrent controls to include similar analyses of controls at IRS field offices in areas such as courier security, safeguarding of receipts in locked containers, requirements for fingerprinting employees, and requirements for promptly overstamping checks made out to "IRS" with "Internal Revenue Service" or "United States Treasury." Based on the results, IRS should make appropriate changes to strengthen its physical security controls (short-term); Source report: Internal Revenue Service: Custodial Financial Management Weaknesses (GAO/AIMD-99-193, Aug. 4, 1999); Status per IRS: Closed. All IRS field offices continue to provide training and to perform reviews to strengthen controls over remittances. SB/SE conducts reviews with each territory manager. Headquarters staff ensures Territory managers are enforcing the requirement for group managers to randomly sample remittance packages for review. Each area director receives a report with any findings and recommendations for implementation. All Tax Exempt and Government Entities (TE/GE) Division Directors continue to perform operational reviews to ensure their subordinate groups are properly processing all checks. TE/GE provides training and notices on these procedures. During fiscal year 2008, all managers certified in their 2008 Annual Assurance Review that vulnerable assets, such as cash, securities, and equipment, are physically secured and access to them is controlled. TE/GE will also implement by September 2009 requirements to verify that control procedures are in place during operational reviews, and include information on proper check handling procedures during training for new hires and Revenue Agents. Large and Mid-sized Business (LMSB) has incorporated instructions on the use of the U.S. Treasury Stamp in training given to new hires as part of their on the job training and periodically in group meetings. The use of the U.S. Treasury Stamp has also been incorporated into the Internal Revenue Manual (IRM) and is part of IRS's standard operating procedure used for processing payments; Status per GAO: Open. The objective of this recommendation was to create a mechanism for IRS to monitor the status of pervasive weaknesses in controls over taxpayer receipts and information that we have found at IRS's field offices over the years. The purpose of this monitoring is to facilitate the timely detection and effective resolution of issues and to verify the effectiveness of new and existing policies and procedures on an ongoing basis. During our fiscal year 2008 audit, we identified instances at (1) four SB/SE units where there was no segregation of duties between preparation of the payment posting vouchers and subsequent preparation of the related document transmittals and transmittal package; (2) four SB/SE units where a document transmittal form was not prepared when transmitting multiple Daily Report of Collection Activity forms to the Submission Processing (SP) Center; (3) three SB/SE units where there was no system in place to monitor acknowledged/unacknowledged transmittals to the submission processing center; (4) five SB/SE units where there was no evidence of managerial review of document transmittals; and (5) all 10 field offices where there were no procedures in place to verify that names on the duress alarm contact list were current and that appropriate first responders were contacted in the event of an emergency. Had IRS periodically reviewed the effectiveness of these controls in field offices as we recommended, these issues might have been detected and corrected. We will continue to assess IRS's actions during our fiscal year 2009 audit. ID no.: 99-25; Recommendation: Ensure that additional staff are employed or existing staff appropriately cross-trained to be able to perform the master file extractions and other ad hoc procedures needed for IRS to continually develop reliable balances for financial reporting purposes (short- term); Source report: Internal Revenue Service: Custodial Financial Management Weaknesses (GAO/AIMD-99-193, Aug. 4, 1999); Status per IRS: Closed. IRS augmented its Modernization & Information Technology Services staff, and cross-trained employees to increase the appropriate depth of experience to perform the master file extractions and other ad hoc procedures for financial reporting purposes. Modernization & Information Technology Services reduced the Assembler Language Code programmer shortages and increased contractor support by 17 percent. IRS also continues to expand the use of CDDB during the annual audit, and the addition of trained Modernization & Information Technology Services and contractor staff ensures development of reliable balances for financial reporting purposes on a continuing basis; Status per GAO: Closed. IRS hired additional staff in the Custodial Accounting Branch, which has responsibility for the custodial financial statements. Also, employees were cross-trained and current systems expanded to better support the financial reporting of revenue, refunds, and unpaid assessments. In addition, IRS reduced its shortage of assembly language programmers by holding training classes for employees. ID no.: 99-29; Recommendation: Develop the data to support meaningful cost information categories and cost-based performance measures (long-term); Source report: Internal Revenue Service: Serious Weaknesses Impact Ability to Report on and Manage Operations (GAO/AIMD-99-196, Aug. 9, 1999); Status per IRS: Closed. IRS developed a cost accounting policy that provides guidance on managerial cost concepts for the agency, established an Office of Cost Accounting within the CFO, and completed several cost pilot projects to demonstrate the viability of its full cost methodology at the program level. Performance measures were enhanced, and the return on investment for the Earned Income Tax Credit program was completed with full cost information. As demonstrated by the cost pilots, IRS has the capability to use the cost data within the Integrated Financial System (IFS) and the associated workload and production data from IFS and its business unit systems to calculate the full costs of its products, services, and programs. The IFS contains 4 years of fully allocated cost data; Status per GAO: Closed. IRS has taken several actions to address this recommendation and improve its cost accounting capability. For example, in fiscal year 2007, IRS developed and issued its first cost accounting policy to provide guidance on the concepts and requirements for managerial cost accounting within IRS. In addition, in fiscal year 2008, IRS (1) established an Office of Cost Accounting within its CFO, (2) completed several cost pilots to demonstrate its capability to use the cost data within IFS and the associated workload and production data from its business unit systems to calculate the full costs of its products, services, and programs, and (3) completed development of the return on investment for the Earned Income Tax Credit program that includes full cost information. However, IRS has not extended the cost pilot methodology to develop full cost information on the full range of IRS's programs. Nevertheless, in order to provide recommendations more closely aligned with the current status, we have agreed with IRS to close this recommendation based on IRS's progress to date and have reported the remaining issues, along with related recommendations for corrective action, in our June 2009 management report. See GAO-09-513R and recommendations 09-14 and 09-15 in this report. ID no.: 99-36; Recommendation: Make enhancements to IRS financial systems to include recording plant and equipment (P&E) and capital leases as assets when purchased and to generate detailed records for P&E that reconcile to the financial records. (long-term); Source report: Internal Revenue Service: Serious Weaknesses Impact Ability to Report on and Manage Operations (GAO/AIMD-99-196, Aug. 9, 1999); Status per IRS: Open. IRS has established strong internal controls and procedures to enhance its ability to account for property and equipment in IFS. IRS is looking at enhancing its asset-tracking system to more closely reconcile physical asset records to the financial records. This would enable targeted reconciliations to occur; Status per GAO: Open. Our fiscal year 2008 property and equipment valuation testing revealed problems with the linking of the purchase of assets recorded in the general ledger system to the P&E inventory system, which indicates that IRS's detailed P&E records do not fully reconcile to the financial records. We will continue to monitor IRS's strategy in addressing these financial management systems issues. ID no.: 01-04; Recommendation: As an alternative to prematurely suspending active collection efforts, and using the best available information, develop reliable cost-benefit data relating to collection efforts for cases with some collection potential. These cost-benefit data would include the full cost associated with the increased collection activity (i.e., salaries, benefits, administrative support), as well as the expected additional tax collections generated (Short-term); Source report: Internal Revenue Service: Recommendations to Improve Financial and Operational Management (GAO-01-42, Nov. 17, 2000); Status per IRS: Closed. IRS is using a workload delivery model in the development and monitoring of an Enterprise Collection Plan that aligns performance measures across all collection organizations to match results against the corporate measures. Results of the model are used to project inventory receipt patterns by function and category of work, allowing for improved management of corporate collection inventory and resource allocation. New models were implemented in the Inventory Delivery System on January 12, 2009. The use of a rules engine has also been incorporated in the Inventory Delivery System to systemically make changes to case routing based on modeling predictions and rules. Collection Case Selection continues to provide ad hoc case assignments for testing case routing. Cases are selected based on a set of criteria and routed to different treatments to determine where like cases should be routed in the future. The CFO also included return on investment calculations for its collection initiatives in the 2007, 2008, and 2009 Budget Submissions; Status per GAO: Closed. IRS has taken significant steps to address this recommendation. IRS built sophisticated computer modeling and risk assessment techniques with increased predictive power to improve IRS's ability to route unpaid tax cases to the appropriate enforcement resource. IRS estimated that those changes have resulted in several billion dollars in additional tax collections. IRS has also established governance councils for IRS's examination and collection activities. Finally, IRS has completed several actions to improve its ability to develop full cost information for its enforcement programs. Although IRS's actions taken to date are important, they have not fully addressed the objectives of our recommendation, such as completing the development of full cost methodologies for IRS's programs and activities. In order to provide recommendations more closely aligned with the current status, we have agreed with IRS to close this recommendation based on IRS's progress to date and have reported the remaining issues, along with related recommendations for corrective action, in our June 2009 management report. See GAO-09-513R and recommendations 09-14, 09-15, and 09-16 in this report. ID no.: 01-06; Recommendation: Implement procedures to closely monitor the release of tax liens to ensure that they are released within 30 days of the date the related tax liability is fully satisfied. As part of these procedures, IRS should carefully analyze the causes of the delays in releasing tax liens identified by our work and prior work by IRS's former internal audit function and ensure that such procedures effectively address these issues (short-term); Source report: Internal Revenue Service: Recommendations to Improve Financial and Operational Management (GAO-01-42, Nov. 17, 2000); Status per IRS: Open. IRS continues to address issues that cause late lien releases through an internal Lien Release Action Plan and by conducting reviews as a part of its A-123 controls assessment process. Based on the annual sample of lien releases, the results of seven errors (liens released in an untimely manner) in 59 observations, yield a net most likely error of 12 percent, and (at greater than 95 percent confidence level), an upper error limit that could be as high as 21 percent. IRS added corrective actions to address issues found during the review. SB/SE is re-evaluating the fiscal years 2009 and 2010 overall lien release error rate goals and will submit changes to the Lien Release Action Plan; Status per GAO: Open. IRS has taken a number of actions over the past several years to address this issue. However, during our fiscal year 2008 audit, we continued to find that IRS did not always release liens in a timely manner. In IRS's own Office of Management and Budget (OMB) A-123 testing of lien releases, it identified 7 instances out of 59 cases tested in which it did not release the applicable federal tax lien within the statutory 30-day period. The time between the satisfaction of the liability and release of the lien ranged from 33 days to more than 494 days. Based on these results, IRS estimated that for about 12 percent of unpaid tax assessment cases that were resolved in fiscal year 2008, in which it had filed a tax lien, it did not release the lien within 30 days of the resolution of the case. IRS is 95 percent confident that the percentage of cases in which the lien was not released within 30 days does not exceed 21 percent. IRS's ineffective controls over this area results in its noncompliance with Internal Revenue Code Section 6325 which requires IRS to release its tax liens within 30 days of the date the related tax liability is fully satisfied. We will continue to monitor IRS's actions to address this recommendation in future audits. ID no.: 01-12; Recommendation: For (1) IRS's Automated Underreporter and Combined Annual Wage Reporting programs, (2) screening and examination of Earned Income Tax Credit claims, and (3) identifying and collecting previously disbursed improper refunds, use the best available information to develop reliable cost-benefit data to estimate the tax revenue collected by, and the amount of improper refunds returned to, IRS for each dollar spent pursuing these outstanding amounts. These data would include (1) an estimate of the full cost incurred by IRS in performing each of these efforts, including the salaries and benefits of all staff involved, as well as any related nonpersonnel costs, such as supplies and utilities, and (2) the actual amount (a) collected on tax amounts assessed and (b) recovered on improper refunds disbursed (long-term); Source report: Internal Revenue Service: Recommendations to Improve Financial and Operational Management (GAO-01-42, Nov. 17, 2000); Status per IRS: Closed. IRS has taken steps to examine Earned Income Tax Credit claims, and to address the collection of Automated Underreporter and Combined Annual Wage Reporting as part of the workload delivery model. IRS updated the Earned Income Tax Credit error estimates and identified root causes of non-compliance. Additionally, in fiscal year 2008, IRS calculated a full-cost return on investment for Earned Income Tax Credit and completed an Automated Underreporter cost accounting pilot using IFS cost data. This pilot calculated the return on investment of Automated Underreporter case closures, which represented those cases that were closed after a notice was sent to the taxpayer. IRS established Exam and Collection governance bodies to improve collection efforts and implemented a modeling tool to better target collection efforts; Status per GAO: Closed. IRS has taken significant steps to address this recommendation, including those listed in the "status per IRS" column. IRS's cost pilot projects completed in fiscal year 2008, demonstrated IRS's ability to determine the full cost of its programs. Although IRS's actions taken to date are important, they have not fully addressed the objectives of our recommendation. For example, IRS's cost pilot project methodology is time-consuming and requires intensive manual intervention, and IRS has not completed the task of developing methodologies for its programs and activities. In order to provide recommendations more closely aligned with the current status, we have agreed with IRS to close this recommendation based on IRS's progress to date and have reported the remaining issues, along with related recommendations for corrective action, in our June 2009 management report. See GAO-09-513R and recommendations 09-14, 09-15, and 09-16 in this report. ID no.: 01-17; Recommendation: Develop a subsidiary ledger for leasehold improvements and implement procedures to record leasehold improvement costs as they occur (long-term); Source report: Internal Revenue Service: Recommendations to Improve Financial and Operational Management (GAO-01-42, Nov. 17, 2000); Status per IRS: Open. IRS will continue to pursue alternative approaches to enhance its ability to account for leasehold improvements; Status per GAO: Open. We will continue to monitor IRS's development of alternative approaches to enhance its ability to account for P&E assets. ID no.: 01-39; Recommendation: Develop a mechanism to track and report the actual costs associated with reimbursable activities (long-term); Source report: Management Letter: Improvements Needed in IRS's Accounting Procedures and Internal Controls (GAO-01-880R, July 30, 2001); Status per IRS: Closed. The IRS is tracking and reporting the actual costs associated with reimbursable agreements through various business unit work load management tracking systems and IFS. The IRS Reimbursable Operating Guidelines established the procedures and processes for capturing direct and indirect costs associated with reimbursable agreements; Status per GAO: Open. IRS has improved its methodology for allocating its costs of operations at the business unit level. However, further actions are needed for it to accumulate and report actual costs associated with specific reimbursable projects. We confirmed that IRS's workload management tracking systems now capture details of time worked; however, these systems do not capture the full costs associated with specific reimbursable projects and do not interface with the general ledger (IFS) to capture all costs. We also noted that the fiscal year 2008 Reimbursable Operating Guidelines provide detail on determining the costs that should be included in the cost projection for a reimbursable agreement. However, the guidelines do not describe a process for determining the total actual costs incurred at the end of the agreement term, determining the difference between actuals and the original cost estimate, and refunding or billing for the difference. We will continue to monitor IRS's efforts to fully implement its cost accounting system and, once it has been fully implemented, evaluate the effectiveness of IRS's procedures for developing cost information for its reimbursable agreements. ID no.: 02-08; Recommendation: Implement policies and procedures to require that all employees itemize on their time cards the time spent on specific projects. (long-term); Source report: Internal Revenue Service: Progress Made, but Further Actions Needed to Improve Financial Management (GAO-02-35, Oct. 19, 2001); Status per IRS: Closed. Employees itemize how their time is spent on specific projects/tasks in various workload management systems, and this information is utilized in the development of cost information which is used in resource allocation decisions; Status per GAO: Closed. IRS has taken action to address our recommendation. We confirmed that IRS currently uses 24 separate functional tracking (workload management) systems for various categories of employees to itemize and track their time charges. Collectively, these systems now capture details of time worked by project for all employees. ID no.: 02-09; Recommendation: Implement policies and procedures to allocate nonpersonnel costs to programs and activities on a routine basis throughout the year (long-term); Source report: Internal Revenue Service: Progress Made, but Further Actions Needed to Improve Financial Management (GAO-02-35, Oct. 19, 2001); Status per IRS: Closed. IFS allocates nonpersonnel costs to programs monthly and makes available cost data to managers, including the full cost of operating business units, and details on the allocated costs (i.e., building rent, depreciation, support costs, etc.). All business units can run cost reports as needed; Status per GAO: Closed. IRS has taken actions to address this recommendation. We confirmed that IRS has improved its cost accounting capabilities by developing and implementing a methodology for allocating its costs of operations to its business units and to the cost categories on the Statement of Net Cost on a monthly basis. However, the cost categories on the Statement of Net Cost are at a higher level than specific programs and activities. Although IRS has developed full cost information on several IRS programs, IRS has not developed such information on the full range of IRS programs. However, in order to provide recommendations more closely aligned with the current status, we have agreed with IRS to close this recommendation based on IRS's progress to date and have reported the remaining issues, along with related recommendations for corrective action, in our June 2009 management report. See GAO-09-513R and recommendations 09-14 and 09-15 in this report. ID no.: 02-16; Recommendation: Ensure that field office management complies with existing receipt control policies that require a segregation of duties between employees who prepare control logs for walk-in payments and employees who reconcile the control logs to the actual payments (short- term); Source report: Management Report: Improvements Needed in IRS's Accounting Procedures and Internal Controls (GAO-02-746R, July 18, 2002); Status per IRS: Closed. Wage and Investment (W&I) has taken a number of actions to address this recommendation. Field Assistance emphasizes the requirement for including a document transmittal form listing the Daily Report of Collection Activity forms in transmittal packages, and ensuring that they are reconciled and reviewed. Territory managers review and discuss monthly reports with the group manager. Results of the reviews are forwarded to the area director. Operational reviews at all levels are conducted annually to ensure that field offices comply with the requirement to prepare Form 3210, which lists all Forms 795 being shipped to the SP Center. W&I completed its annual Filing Season Readiness Workshop for all taxpayer assistance center (TAC) managers, which addressed remittance and data security. New managers will attend the "Managing a TAC" course during fiscal year 2009, which provides ongoing training on payment processing and managerial reviews. Operational reviews completed for fiscal year 2008 revealed that the TAC managers are validating employee profiles to ensure restricted command codes were used according to guidelines; Status per GAO: Open. While IRS has cited that it is taking a number of actions to ensure existing receipt control policy requirements for segregation of duties are followed, one of the main mechanisms it uses to enforce this policy is training. IRS conducts an annual Filing Season Readiness Workshop for TAC managers and provides training for new TAC managers on collecting taxpayer receipts and conducting managerial reviews. During our review of the handouts provided for the annual readiness workshop we noted several sections that discussed IRS's policies related to segregation of duties. In contrast, we found that the "Managing a TAC" course for new TAC managers did not specifically address those policies. From our discussions with IRS officials, the Filing Season Readiness Workshop is conducted annually during the first quarter of the fiscal year. Consequently, new TAC managers assigned after the first quarter of the fiscal year will not receive the same level of training regarding segregation of duties. In addition, during our recent visits to selected TACs in March 2009, we found instances where segregation of duties related to accepting and recording walk-in payments were not implemented. ID no.: 02-18; Recommendation: Work with the National Finance Center (NFC) to resolve the technical limitations that exist within the Security Entry and Tracking System (SETS) database and continue to periodically review SETS data to detect and correct errors (short-term); Source report: Management Report: Improvements Needed in IRS's Accounting Procedures and Internal Controls (GAO-02-746R, July 18, 2002); Status per IRS: Open. Agency-Wide Shared Services (AWSS) Personnel Security has taken several short and long term measures to reduce the instance of SETS errors. The short-term measures include (1) publishing instructions on the Personnel Security intranet site for SETS users to follow while reviewing bi-weekly SETS reports, (2) issuing bi-weekly emails to all SETS users with the most current reports to be used in identifying and reporting errors to NFC, and (3) compiling weekly extracts of all enter-on-duty dates where there were no fingerprint results or where the results were after the enter-on-duty date and sending those to each employment office for updates and feedback. The long-term measures included requesting revisions to SETS; Status per GAO: Open. During our fiscal year 2008 audit, we continued to identify technical limitations and weaknesses with the SETS database. In addition, we found 248 instances where SETS was not updated in a timely manner or correctly for new-hire employees resulting in errors in the database. We will continue to assess IRS's actions during our fiscal year 2009 audit. ID no.: 04-08; Recommendation: Enforce policies and procedures to ensure that service center campus security guards respond to alarms (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls and Accounting Procedures (GAO-04-553R, April 26, 2004); Status per IRS: Closed. IRS performs monthly unannounced testing of guard response to alarms and test results are reviewed by the Security Programs Office to enforce and ensure compliance. Test results on guard response to alarms are consistently 98 percent or higher, indicating substantial compliance with IRS guidelines. Test procedures were formalized in IRM 10.2.14 Methods of Providing Protection, issued on October 1, 2008. In addition, the Guard Program Specialists from the Security Programs Office conduct unannounced alarm tests whenever they visit a site to do a Quality Assurance check of security posture and programs. Physical Security and Emergency Preparedness (PSEP) continues to utilize the Audit Management Checklist as a repeatable process where service center campuses (SCC) quarterly validate the performance and documentation of monthly unannounced alarm testing; Status per GAO: Open. During our fiscal year 2008 audit, we identified instances at two of the three SCCs we visited in which security guards did not respond to alarms within the time limit outlined in the IRM. In addition, at another SCC we visited, we identified an instance in which security guards did not fully investigate the source of an alarm. We will continue to evaluate IRS's enforcement of these policies and procedures during our fiscal year 2009 audit. ID no.: 05-11; Recommendation: Enforce adherence to existing instructions on safeguarding taxpayer receipts and information, such as securing access and candling procedures, at service center campuses selected for significant reductions in their submission processing functions (short- term); Source report: Management Report: Review of Controls over Safeguarding Taxpayer Receipts and Information at the Brookhaven Service Center Campus (GAO-05-319R, Mar 10, 2005); Status per IRS: Closed. W&I Accounts Management continues to enforce the restricted area access through periodic training. Candling procedures are reinforced through monthly internal control reviews of the process. In January 2008, Accounts Management increased management oversight of internal controls by implementing formal monthly internal control reviews at the former Submission Processing rampdown sites. A revised review template was developed to evaluate the quality of IRS's internal control performance, identify potential deficiencies, and allow corrective actions to be taken immediately. The monthly results from each field director are forwarded to the Director, Accounts Management, and GAO. AWSS provides training when notified by W&I that a new monitor has been selected or when an existing monitor requires refresher training. Each campus badge office provides training to the restricted area door monitors as it pertains to the control, issuance, and inventory of the non-photo badges that are assigned at each site; Status per GAO: Closed. Accounts Management implemented a monthly review to monitor internal controls over taxpayer receipts and information at campuses selected for reductions in their submission processing functions. ID no.: 05-13; Recommendation: Enforce its existing requirement that appropriate background investigations be completed for contractors before they are granted staff-like access to service centers (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-05-247R, Apr 27, 2005); Status per IRS: Closed. The Program, Planning, and Policy Office finalized and issued IRM 10.2.5 Identification Card on September 30, 2008. Section 10.2.5.6.2(2)a specifies that red photo ID cards may be issued to IRS contract employees who have a daily need on a continuing basis to be on site at a facility over a period of time, and who have been granted interim or final staff-like access to a facility/work area with sensitive systems or information. Before a red photo ID card may be issued, the contracting officer's technical representative must provide the Physical Security Office with a copy of the Personnel Security & Investigation background investigation letter approving interim or final staff-like access. PSEP continues to utilize the Audit Management Checklist as a repeatable process where SCCs quarterly validate the filing of contractor background investigation documentation; Status per GAO: Closed. We verified that IRS finalized and issued IRM 10.2.5 and continues to utilize the Audit Management Checklist to ensure that proper documentation is received and on file for contractors before they are granted staff-like access to service centers. During our fiscal year 2008 audit, we found no exceptions relating to SCCs granting contractors staff-like access before appropriate background investigations were completed. ID no.: 05-14; Recommendation: Require that background investigation results for contractors (or evidence thereof) be on file where necessary, including at contractor worksites and security offices responsible for controlling access to sites containing taxpayer receipts and information (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-05-247R, Apr 27, 2005); Status per IRS: Closed. The Program, Planning, and Policy Office finalized and issued IRM 10.2.5 Identification Card on September 30, 2008. IRM 10.2.5.6.2(2)a specifies that the Form 5519, 13716-A or similar identification request Form 13760, and the interim or final background investigation letter must be retained and filed in the identification media file for each contractor for the life of the identification card. PSEP continues to utilize the Audit Management Checklist as a repeatable process where SCCs quarterly validate the filing of contractor background investigation documentation; Status per GAO: Closed. We verified that IRS finalized and issued IRM 10.2.5 and continues to utilize the Audit Management Checklist to ensure that proper documentation is received and on file for contractors before they are granted staff-like access to service centers. During our fiscal year 2008 audit, we found no exceptions. ID no.: 05-32; Recommendation: Establish policies and procedures to require appropriate segregation of duties in small business/self-employed units of field offices with respect to preparation of Payment Posting Vouchers, Document Transmittal forms, and transmittal packages (short- term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-05-247R, Apr 27, 2005); Status per IRS: Open. IRS revised IRM 5.1.2.4, Daily Report of Collection Activity-Form 795/795A, to establish segregation of duties procedures with respect to the preparation of Payment Posting Vouchers, Document Transmittal forms, and transmittal packages in the Collection Field function; Status per GAO: Open. During our fiscal year 2008 audit, we identified instances at four SB/SE units we visited where duties involving the preparation of payment posting vouchers, document transmittal forms, and transmittal packages were not segregated. Employees informed us that they were unaware of a related requirement in the IRM. We will continue to assess IRS's actions during our fiscal year 2009 audit. ID no.: 05-33; Recommendation: Enforce the requirement that a document transmittal form listing the enclosed Daily Report of Collection Activity forms be included in transmittal packages, using such methods as more frequent inspections or increased reliance on error reports compiled by the service center teller units receiving the information (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-05-247R, Apr 27, 2005); Status per IRS: Closed. W&I Field Assistance continues to take actions to emphasize the requirement for including a document transmittal form listing the Daily Report of Collection Activity forms in transmittal packages. Operational reviews were conducted at all levels during fiscal years 2007 and 2008 to ensure that field offices comply with the requirement to prepare Form 3210, which lists all Forms 795 shipped to the SP Center. Further, IRM 1.4.11-11 was revised on October 7, 2008, to include the purpose, frequency, and documentation required for managerial reviews, which includes a review of Form 3210s, and trends and error reports. The outcome of the operational reviews revealed that managers are complying with the IRM procedures outlined for document transmittal; Status per GAO: Open. During our fiscal year 2008 audit, we identified instances at four SB/SE units where a document transmittal form was not prepared when transmitting multiple Daily Report of Collection Activity forms to the SP Center. We will continue to evaluate this issue during our fiscal year 2009 audit. ID no.: 05-37; Recommendation: Enforce documentation requirements relating to authorizing officials charged with approving manual refunds (short- term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-05-247R, Apr 27, 2005); Status per IRS: Closed. The IRS enforces documentation requirements relating to authorizing officials charged with approving manual refunds. IRS created a standard authorization memorandum in September 2008 for all offices to use. This will negate the disparity among the campuses in creating local authorization forms. IRS issued its annual solicitation memorandum for authorizing officials charged with approving manual refunds in August 2008 and received the annual list of authorized signatures by October 31, 2008, per IRM 3.17.79.3.5(4) (d). SP completed a sample review as part of the Monthly Security Review Checklist per IRM 3.17.79.3.5(3), and completed a 100 percent review of the new annual list by December 31, 2008; Status per GAO: Open. During our fiscal year 2008 audit, we continued to find that the documentation requirements on memorandums, which are submitted to the manual refund units listing officials authorized to approve manual refunds, were not always complete. For example, some of the memorandums did not contain the signatures of the Heads of Office that delegated officials the authority to approve manual refunds while others did not contain the authorizing official's campus or field office organization information as required by the IRM. We verified that IRS created a standard authorization memorandum in September 2008. However, IRS implemented this corrective action and completed its review of the new annual list subsequent to our fiscal year 2008 field work. We will evaluate IRS's corrective actions during our fiscal year 2009 audit. ID no.: 05-38; Recommendation: Enforce requirements for monitoring accounts and reviewing monitoring of accounts for manual refunds (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-05-247R, Apr 27, 2005); Status per IRS: Open. IRS continued to enforce the requirements for monitoring accounts and reviewing monitoring of accounts for manual refunds in fiscal year 2008. SB/SE Campus Compliance Services covered this topic in both Filing & Payment Compliance and Campus Reporting Compliance Operations during fiscal year 2008 reviews to ensure compliance with all IRM provisions for manual refunds. Submission Processing conducted refresher training at all sites by September 30, 2008, in team meetings and annual continuing professional education classroom training using IRM 21.4.4 and 3.17.79 as reference materials to reinforce the monitoring requirements. As a result of recent findings and quarterly review of the manual refund process in Accounts Management, both the monitoring and supervisory review process are being examined to identify means for improvement. Once the review is complete, consideration will be given to implementing any recommendations. Accounts Management continues its quarterly reviews of the manual refund process; Status per GAO: Open. During our fiscal year 2008 audit, we found instances where the manual refund initiators did not monitor accounts to prevent duplicate refunds and supervisors did not review the monitoring of accounts. IRS's review of the monitoring and supervisory review process for manual refunds has not been completed. We will continue to evaluate IRS's corrective actions during our fiscal year 2009 audit. ID no.: 05-39; Recommendation: Enforce requirements for documenting monitoring actions and supervisory review for manual refunds (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-05-247R, Apr 27, 2005); Status per IRS: Open. IRS continued to enforce the requirements for documenting monitoring actions and supervisory review for manual refunds in fiscal year 2008. SB/SE Campus Compliance Services covered this topic in both Filing & Payment Compliance and Campus Reporting Compliance Operations during their fiscal year 2008 campus reviews to ensure all campuses continue to comply with all IRM provisions for manual refunds. Submission Processing conducted refresher training at all sites by September 30, 2008, in team meetings and annual continuing professional education classroom training using IRM 21.4.4 and 3.17.79 as reference materials to reinforce the monitoring requirements. As a result of recent findings and quarterly review of the manual refund process in Accounts Management, both the monitoring and supervisory review process are being examined to identify means for improvement. Once the review is complete, consideration will be given to implementing any recommendations. Accounts Management continues its quarterly reviews of the manual refund process; Status per GAO: Open. During our fiscal year 2008 audit, we continued to find instances where the manual refund initiators did not document their monitoring of accounts to prevent duplicate refunds. IRS's review of the monitoring and supervisory review process for manual refunds has not been completed. We will continue to evaluate IRS's corrective actions during our fiscal year 2009 audit. ID no.: 06-01; Recommendation: Require that Refund Inquiry Unit managers or supervisors document their review of all forms used to record and transmit returned refund checks prior to sending them for final processing (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-06-543R, May 12, 2006); Status per IRS: Closed. Accounts Management has procedures in place for the periodic supervisory review and documentation of the Form 3210 reconciliation process, which is designed to follow up on unacknowledged forms. This process is designed to provide a timely account of any discrepancy between the documents listed on the Form 3210 and those received. For the last 3 years, conference calls have been conducted with each directorate to reinforce the correct processing of Form 3210s. Recent actions to address the recommendation include having "Form 3210 Processing" as an agenda item on the Refund Inquiry Units' conference call. In addition, the quarterly Accounts Management internal control Form 3210 review now requires that the Refund Inquiry Unit be included in the review; Status per GAO: Open. During our fiscal year 2008 audit, we identified an instance at one SCC where the Refund Inquiry Unit manager did not perform or document periodic reviews of forms used to transmit returned refund checks. We will continue to evaluate IRS's actions during our fiscal year 2009 audit. ID no.: 06-02; Recommendation: Enforce compliance with existing requirements that all IRS units transmitting taxpayer receipts and information from one IRS facility to another, including SCCs, TACs, and units within Large and Mid-sized Business (LMSB) and Tax-Exempt and Government Entities (TE/GE), establish a system to track acknowledged copies of document transmittals (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-06-543R, May 12, 2006); Status per IRS: Open. IRS has procedures in place to ensure compliance with tracking acknowledgement copies of document transmittals. W&I Account Management continues to analyze the results of its quarterly reviews. Field Assistance revised the IRM provisions during 2007 to provide procedures for requiring TACs to follow up with SP Centers when acknowledgments are not received within 10 days. Field Assistance revised other IRM provisions to include more detail for processing Form 3210. The IRM provides guidance to maintain centralized files for acknowledged Form 3210 for three years, and provides guidance for handling unacknowledged Form 3210. Offices transmitting receipts have a system to track acknowledged copies of document transmittals. All TE/GE Division Directors continue to use the Quick Reference Guide for Processing Checks, including a check sheet and flowchart developed for the TE/GE Exam Managers to use when performing operational reviews to ensure their subordinate groups are properly processing all checks. TE/GE will also implement by September 2009 requirements for each Examination Area Manager to verify tracking measures are in place in all their groups. LMSB has completed all its planned actions with regard to this recommendation and will continue to issue an annual executive memorandum on Form 3210 procedures around July 2009; Status per GAO: Open. During our fiscal year 2008 audit, we identified instances at three SB/SE units and two TACs where there was no system in place to monitor acknowledged/unacknowledged transmittals to the SP Center. We will continue to assess IRS's actions during our fiscal year 2009 audit. ID no.: 06-04; Recommendation: Require that managers or supervisors document their reviews of document transmittals to ensure that taxpayer receipts and/or taxpayer information mailed between IRS locations are tracked according to guidelines (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-06-543R, May 12, 2006); Status per IRS: Closed. IRS revised the IRM on October 1, 2008, to include more detail for processing Form 3210. IRM 1.4.11.19.1 provides guidance to maintain centralized files for acknowledged Form 3210 for 3 years. Operational Reviews revealed that managers are in compliance with conducting and documenting the document transmittal review that includes the reconciliation process of Forms 3210 and 795. All managers were reminded to conduct these reviews at the Filing Season Readiness Workshop completed by December 15, 2008. The Refund Inquiry Unit continues to be included in the Accounts Management quarterly internal control review of document transmittal procedures. The review checklist includes the timely follow-up and documentation of Form 3210 acknowledgements as well as the required periodic managerial review. For TE/GE, each front line Examination group manager will ensure they complete reviews of document transmittals, and TE/GE is adding an additional question to TE/GE's 2009 Annual Assurance Review to certify all managers addressed this issue by June 2009; Status per GAO: Open. During our fiscal year 2008 audit, we identified instances at five SB/SE units and eight TACs where there was no evidence of managerial review of document transmittals and one instance at a SCC where the Refund Inquiry Unit manager did not perform or document periodic reviews of forms used to transmit returned refund checks. Moreover, the corrective actions cited by IRS were implemented after our fiscal year 2008 fieldwork. We will continue to evaluate IRS's corrective actions during our fiscal year 2009 audit. ID no.: 06-05; Recommendation: Equip all TACs with adequate physical security controls to deter and prevent unauthorized access to restricted areas or office space occupied by other IRS units, including those TACs that are not scheduled to be reconfigured to the "new TAC" model in the near future. This includes appropriately separating customer service waiting areas from restricted areas in the near future by physical barriers, such as locked doors marked with signs barring entrance by unescorted customers (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-06-543R, May 12, 2006); Status per IRS: Open. IRS continues to work to improve security and control access issues in the TACs. Of the 401 TAC locations, 183 have been built to design standard, with another 14 scheduled for completion by the end of January 2009. Forty-five projects have been approved to implement the TAC model in 2009, with another 30 projects pending final approval and funding. Forty-four projects are in development for implementation from 2010 through 2014. IRS will work to address any concerns with the space design/layout of TAC space and continue to roll out the TAC Design Model in the remaining locations. While implementation of the TAC Model Design is the ideal solution, implementation of compensating controls such as theater ropes or other barriers, signage and minor alterations/reconfigurations have been incorporated in many TAC locations as an interim measure. Using a variety of criteria including security, safety and health concerns, IRS has identified priority locations for the implementation of the TAC Design Model; Status per GAO: Open. We will continue to evaluate IRS's actions during our fiscal year 2009 audit. ID no.: 06-07; Recommendation: Document supervisory visits by offsite managers to TACs not having a manager permanently on-site. This documentation should be signed by the manager and should (1) record the time and date of the visit, (2) identify the manager performing the visit, (3) indicate the tasks performed during the visit, (4) note any problems identified, and (5) describe corrective actions planned (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-06-543R, May 12, 2006); Status per IRS: Open. Field Assistance uses the TAC Security Remittance Review Database, which requires managers to conduct and document their reviews to ensure the protection of data and compliance with remittance and security procedures. Field Assistance implemented the TAC Security Remittance Review Database during the first quarter of fiscal year 2007. Since implementation, IRS has had numerous problems with the system due to technological limitations. Some of the problems IRS encountered include erroneously deleted information and an inability to save and transmit reports. IRS has attempted to secure funding and assistance to convert the database to a user-friendly Web version. The system was converted to a Web-modified application effective the second quarter of fiscal year 2009. This is only a temporary resolution until funding is secured. While the database was being revised, the area offices were still responsible for completing the reviews using Data Collection Instruments for the first quarter. In addition, IRS also tested the Web design prior to its implementation and has initiated a review process to engage headquarters, areas and territory management staff to identify and correct the database entries. The process will include sampling and conducting operational reviews as assurance of the database integrity. To enhance everyone's understanding of the process, talking points will be developed for discussions between the territory and group managers; Status per GAO: Open. IRS continues to implement its new process for providing oversight of TACs not having a manager permanently on-site during our fiscal year 2008 audit. Because the process was not fully functional, we were unable to test its implementation during our audit fieldwork. We will continue to assess IRS's actions during our fiscal year 2009 audit. ID no.: 06-08; Recommendation: Enforce the requirement that all security or other responsible personnel at SCCs and lockbox banks record all instances involving the activation of intrusion alarms, regardless of the circumstances that may have caused the activation (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-06-543R, May 12, 2006); Status per IRS: Open. IRM 10.2.14 Methods of Providing Protection will be revised by September 30, 2009, to state: "A record of all instances involving the activation of any alarm regardless of the circumstances that may have caused the activation, must be documented in a Daily Activity Report/Event Log, or other log book and maintained for 2 years;" Status per GAO: Open. During our review and evaluation, we found that IRS's corrective actions relating to the recordation of all instances involving alarm activations in the Daily Activity Report/Event Log, or other log book, were not included in the final version of the IRM. We will continue to assess IRS's corrective actions during our fiscal year 2009 audit. ID no.: 06-15; Recommendation: Revise the physical security procedures in the IRM to require that all SCCs and any respective annex facilities processing taxpayer receipts and/or information perform and document monthly tests of the facility's intrusion detection alarms. At a minimum, these procedures should (1) outline the type of test to be conducted, (2) include criteria for assessing whether the controls used to respond to the alarm were effective, and (3) require that a logbook be maintained to document the test dates, results, and response information (short- term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-06-543R, May 12, 2006); Status per IRS: Closed. IRS performs monthly unannounced testing of guard response to alarms, and test results are reviewed by the Security Programs Office to enforce and ensure compliance. According to IRS, test results on guard response to alarms are consistently 98 percent or higher, indicating substantial compliance with IRS guidelines. Test procedures were formalized in IRM 10.2.14 Methods of Providing Protection issued on October 1, 2008. PSEP continues to utilize the Audit Management Checklist as a repeatable process, and SCCs validate quarterly the performance and documentation of monthly unannounced alarm testing; Status per GAO: Closed. IRS revised IRM 10.2.14 to include requirements to perform and document monthly tests of intrusion detection alarms, including guard responses to alarms. Also, IRS's Audit Management Checklist contains review steps for physical security analysts to determine whether SCCs and respective annex facilities that process taxpayer receipts and/or information perform and document monthly tests of intrusion alarms. ID no.: 06-22; Recommendation: Direct Facilities Management Branch managers to research and resolve the aging reports (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-06-543R, May 12, 2006); Status per IRS: Closed. This item remains closed since fiscal year 2006, with AWSS continuing to regularly follow up on disposal actions. During fiscal year 2008, IRS implemented a new wizard tool that caused a system glitch which prevented IRS from updating all disposals within 10 work days. Several IRS staff were aware of the glitch and were working on the issue. As a result, the disposal action that should have been updated in 10 days was actually updated in 15 work days; Status per GAO: Open. In fiscal year 2006, IRS re-engineered the P&E asset retirement and disposal process to generate exception reports that enable management to regularly monitor the aging of transactions during the disposal process. However, our testing in fiscal years 2007 and 2008 noted that disposals shown on the exception report were not always being recorded in a timely manner. During our fiscal year 2009 audit, we will verify that the new software enhancement is operating as intended. ID no.: 07-01; Recommendation: Enforce the existing policy requiring that all lockbox banks encrypt backup media containing federal taxpayer information (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Closed. IRS revised the language in Lockbox Security Guidelines (LSG) 2.17.8 (9) to mitigate the risk as outlined in the Lockbox Electronic Bulletin issued on July 17, 2008. As of September 1, 2008, all lockbox sites use file encryption, and are in compliance with the requirements as outlined in the Lockbox Electronic Bulletin; Status per GAO: Closed. IRS revised its LSG to require lockbox banks to encrypt backup media containing taxpayer information. IRS has included this issue as one of the areas tested during its annual reviews of information technology security at its lockbox banks. During our fiscal year 2008 internal control testing, we did not identify any instances where lockbox banks were not encrypting backup media containing federal taxpayer information. ID no.: 07-02; Recommendation: Ensure that lockbox banks store backup media containing federal taxpayer information at an off-site location as required by the 2006 LSG (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Closed. IRS revised the language in LSG 2.17.8 (9) to mitigate the risk as outlined in the Lockbox Electronic Bulletin issued on July 17, 2008. As of September 1, 2008, all lockbox sites store backup media containing federal taxpayer information at an off-site location and are in compliance with the requirements as outlined in the Lockbox Electronic Bulletin; Status per GAO: Closed. IRS revised its LSG to require lockbox banks to store backup media containing taxpayer information at an off-site location. IRS has included this issue as one of the areas tested during its annual information technology security reviews at lockbox banks. ID no.: 07-03; Recommendation: Revise instructions for the annual reviews of lockbox banks to encompass routine monitoring of backup media containing personally identifiable information to ensure that this information is (1) encrypted prior to transmission and (2) stored in an appropriate off-site location (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Closed. IRS revised the Information Technology Data Collection Instruments, which are used during the annual reviews of lockbox banks, and the related instructions (1) to ensure that the data/image transmissions sent through the Lockbox Electronic Network are encrypted prior to transmission and (2) to validate that all backup media containing personally identifiable information is stored and protected as required in the Lockbox Electronic Bulletin; Status per GAO: Closed. IRS revised its Information Technology Data Collection Instrument to test whether lockbox banks are (1) encrypting personally identifiable information prior to transmission and (2) storing backup media containing personally identifiable information at an appropriate off-site location. ID no.: 07-04; Recommendation: Develop and implement appropriate corrective actions for any gaps in closed circuit television (CCTV) camera coverage that do not provide an unobstructed view of the entire exterior of the SCC's perimeter, such as adding or repositioning existing CCTV cameras or removing obstructions (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Closed. PSEP developed and implemented an action plan requiring all SCCs to (1) perform and validate completion of an assessment of their CCTV to ascertain if it provided an unobstructed view of the exterior of the campus perimeter, and (2) identify problems and planned corrective actions to mitigate the identified problems. All SCCs validated completion of the CCTV assessment and a total of 16 problems were identified. Progress on corrective actions was monitored and reported to PSEP management on a monthly basis. All corrective actions were addressed: 14 were resolved by the installation of CCTV cameras and/or removal of obstructions, and 2 were determined by management to meet an acceptable level of risk. PSEP continues to utilize the Audit Management Checklist as a repeatable process where SCCs quarterly validate CCTV coverage of the campus fence line and perimeter. The reported corrective actions were completed January 10, 2008. PSEP will continue to place emphasis on CCTV camera coverage, as well as perform regularly scheduled risk assessments of IRS facilities; Status per GAO: Open. On January 10, 2008, IRS completed an assessment of its CCTVs in all SCCs to ascertain whether they provided an unobstructed view of its campuses' exterior perimeter. However, IRS's assessment did not account for the CCTV weaknesses that were reported in the Fresno SCC's January 2007 risk assessment, which continued to exist during our April 2009 visit. During our visit, we found that the CCTVs did not provide an unobstructed view of the building exterior or fence line, many of the CCTVs were not wired properly and could not be used to their full potential. While these weaknesses were reported in the January 2007 risk assessment, Fresno was one of the four SCCs that did not report any specific weaknesses to the PSEP management that requested the assessment of the CCTVs. In view of the weaknesses we observed, it is unclear how the Fresno campus reached its conclusion that no CCTV problems were reportable to the PSEP requestors performing the assessment. We will continue to assess IRS's actions during our fiscal year 2009 audit. ID no.: 07-08; Recommendation: Require that managers or supervisors provide the manual refund initiators in their units with training on the most current requirements to help ensure that they fulfill their responsibilities to monitor manual refunds and document their monitoring actions to prevent the issuance of duplicate refunds (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Open. All W&I functions, except Accounts Management, conducted training during 2007 and 2008 for manual refund initiators to ensure they fulfill their responsibilities to monitor manual refunds and document their monitoring actions to prevent the issuance of duplicate refunds. W&I Compliance completed its training for manual refund initiators in the W&I campuses in April 2008. SP conducted refresher training during fiscal years 2007 and 2008 (continuing professional education) and will include again in the fiscal year 2009 continuing professional education. SP management reviews history sheets annotated with taxpayer identification numbers, tax period, transaction code, date, and initials of initiator. Accounts Management manual refund training has been delayed due to the Economic Stimulus Package workload. Accounts Management is re-examining manual refund monitoring procedures and will reschedule the training in fiscal year 2009 once the review is complete and any changes implemented; Status per GAO: Open. During our fiscal year 2008 audit, we found instances where the manual refund initiators did not receive training on the most current requirements to help ensure that they fulfill their responsibilities to monitor manual refunds. We will continue to evaluate IRS's corrective actions during our fiscal year 2009 audit. ID no.: 07-09; Recommendation: Enhance its computer program to check for outstanding tax liabilities associated with both the primary and secondary Social Security numbers shown on a joint tax return and apply credits to those balances before issuing any refund (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Closed. On January 20, 2008, SB/SE implemented the programming to check for outstanding liabilities associated with both the primary and secondary Social Security numbers on a joint tax return for offsetting to any outstanding TFRP liability before issuance of a refund; Status per GAO: Closed. We verified that IRS implemented the programming change to check for outstanding liabilities associated with both the primary and secondary Social Security numbers on a joint tax return for offsetting to any outstanding TFRP liability before issuance of a refund. We reviewed the accounts of a number of taxpayers who (1) were assessed a TFRP, (2) filed a joint personal income tax return with a spouse, (3) listed her or his Social Security number as the second one on the tax return, and (4) had credits on the personal income tax account. In each of these cases, we verified that IRS's computer program identified the outstanding TFRP and applied the credits to the TFRP balance before sending any refund to the taxpayer. Additionally, according to IRS, their analysis identified over $10 million of refund offsets that have occurred from January 2008 to March 2009 as a result of this corrective action. ID no.: 07-11; Recommendation: Correct the penalty calculation programs in the master file so that penalties are calculated in accordance with the applicable Internal Revenue Code and implementing IRM guidance (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Closed. SB/SE implemented a system change in January 2007 to correct the failure-to-pay (FTP) penalty calculation program. In June 2008, SB/SE conducted a review of the programming change and determined the program is correctly charging the reduced rate on subsequent assessments. There was a small subpopulation of accounts that the system change did not correct. IRS worked on an additional system change to correct penalty calculation programming affecting the remainder of the cases and completed its corrective action in August 2008; Status per GAO: Closed. We verified that IRS's system corrected the FTP penalty calculation program. We reviewed the accounts of a number of taxpayers for whom: (1) IRS increased the FTP penalty rate assessed against the taxpayer for failing to pay taxes owed from 0.5 percent to 1 percent when the taxpayer failed to pay following repeated notification of the taxes due, (2) the taxpayer subsequently paid off the balance for the specific tax period, and (3) following its system change, IRS assessed the taxpayer additional taxes owed for the same tax period and a related FTP penalty. In each of these cases, we verified that the FTP penalties were calculated in accordance with the applicable IRM guidance. ID no.: 07-12; Recommendation: Research each of the taxpayer accounts that may have been affected by the penalty programming errors to determine whether they contain overassessed penalties and correct the accounts as needed (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Closed. IRS implemented in January 2007 and August 2008 the change to the FTP penalty calculation program and also recalculated the FTP amount using the correct rate on all open taxpayer accounts with this penalty; Status per GAO: Closed. We verified that IRS's system change resulted in FTP penalties being calculated in accordance with the applicable IRM guidance on open taxpayer accounts. We reviewed the accounts of a number of taxpayers from IRS's unpaid assessment inventory for whom: (1) IRS had increased the FTP penalty rate assessed against the taxpayer for failing to pay taxes owed from 0.5 percent to 1 percent when the taxpayer failed to pay following repeated notification of the taxes due, (2) the taxpayer subsequently paid off the balance for the specific tax period, and (3) IRS assessed the taxpayer additional taxes owed for the same tax period, with related FTP penalties. In each of these cases, we verified that the total recorded FTP penalty assessments on the account were in accordance with the applicable IRM guidance. ID no.: 07-13; Recommendation: Establish procedures and specify in the IRM that at the time of receipt, employees recording taxpayer payments should (1) determine if the payment is more than sufficient to cover the tax liability of the tax period specified on the payment or earliest outstanding tax period, (2) perform additional research to resolve any outstanding issues on the account, (3) determine whether the taxpayer has outstanding balances in other tax periods, and (4) apply available credits to satisfy the outstanding balances in other tax periods (short- term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Closed. SB/SE published IRM 5.1.2.5.3 in September 2008 with revisions to 5.1.2.5.3.1(1) through (7) directing employees to make the specific determinations and to take the specific actions contained in this recommendation; Status per GAO: Closed. IRS revised its IRM in September 2008 to include instructions specifically addressing this recommendation. The IRM now instructs IRS employees to (1) determine if the payment is sufficient to cover the tax liability of the tax period specified on the payment, (2) perform additional research and resolve any outstanding issues on the account, including determining if there are any freeze codes that will delay credit posting, (3) determine whether the taxpayer has outstanding balances in other tax periods, and (4) apply available credits to satisfy the outstanding balances in other tax periods. ID no.: 07-14; Recommendation: Establish procedures and specify in the IRM that employees review taxpayer accounts with freeze codes that contain credits weekly to (1) research and resolve any outstanding issues on the account, (2) determine whether the taxpayer has outstanding balances in other tax periods, and (3) apply available credits to satisfy the outstanding balances in other tax periods (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Closed. SB/SE published IRM 5.1.2.5.3 in September 2008 with revisions to 5.1.2.5.3.1(1) through (7) directing employees to make the specific determinations and to take the specific actions contained in this recommendation; Status per GAO: Closed. IRS revised its IRM in September 2008 to include instructions specifically addressing this recommendation. The IRM now instructs IRS employees to (1) determine if the payment is sufficient to cover the tax liability of the tax period specified on the payment, (2) perform additional research and resolve any outstanding issues on the account, including determining if there are any freeze codes that will delay credit posting, (3) determine whether the taxpayer has outstanding balances in other tax periods, and (4) apply available credits to satisfy the outstanding balances in other tax periods. ID no.: 07-15; Recommendation: Issue a memorandum to employees in the Centralized Insolvency Office reiterating the IRM requirement to timely record bankruptcy discharge information onto taxpayer accounts in the master file or to manually release the liens in the Automated Lien System (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Open. SB/SE has requested Counsel guidance related to lien releases after discharge to determine if a memorandum is needed. SB/SE will issue a memorandum to employees by May 2009, if necessary; Status per GAO: Open. As part of its own fiscal year 2008 OMB A-123 testing of lien releases, IRS tested a statistical sample of taxpayer accounts requiring a lien release during 2008. In its testing, IRS again identified a case in which it did not release the applicable federal tax lien within the statutory 30-day period because it did not update the taxpayer's account in a timely manner to reflect that the taxpayer had been discharged of the taxes in a bankruptcy court. The untimely recording of bankruptcy discharges results in the untimely release of tax liens and is directly related to IRS's noncompliance with Internal Revenue Code Section 6325 which requires IRS to release its tax liens within 30 days of the date the related tax liability is fully satisfied. We will continue to review IRS's corrective actions to address this recommendation during our fiscal year 2009 audit. ID no.: 07-17; Recommendation: Monitor installment agreement user fee activity on a regular basis (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Closed. W&I Compliance continues to use the Installment Agreement Account Listings (IAAL) report to monitor user fee activity. In January 2008, IRS implemented enhancements to the report and increased the frequency of the sweep process from quarterly to weekly; Status per GAO: Closed. IRS runs edit checks to test the validity of recorded installment agreements, including the user fees, which results in the identification of potential errors that are then listed on the IAAL. We verified that IRS improved its IAAL report process by grouping items that appear on the IAAL into tiers based on priority and establishing time frames by tier for investigating and resolving these potential errors. In addition, we confirmed that IRS now performs managerial reviews on IAAL cases processed by its collection operations. IRS also increased the frequency of its computer sweep recovery process, which is intended to identify unrecorded user fees, from a few times a year to once a week, thus increasing the timeliness and accuracy of recorded individual taxpayer user fees. ID no.: 07-18; Recommendation: Adjust errors in recorded installment agreement user fees as necessary to correctly reflect the user fees IRS earned and collected from taxpayers (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Closed. W&I Compliance uses a weekly sweep process to reconcile installment agreement payments and adjusts those with discrepancies or errors to ensure that fees are accurately posted to the user fee account; Status per GAO: Closed. W&I Compliance's weekly sweep process is designed to identify and correct for unrecorded user fees collected with the initial installment agreement payment. We verified that IRS's improvements to its installment agreement user fees monitoring process will help ensure that errors in recorded installment agreement user fees are identified and corrected in a more timely manner. Additionally, we did not identify any instances of errors in recorded installment agreement user fees during our fiscal year 2008 audit. ID no.: 07-19; Recommendation: Establish sufficient review procedures to help ensure that adjustments to installment agreement user fees collected from taxpayers are accurately and timely recorded (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Closed. W&I Compliance uses the Installment Agreement Account Listings report to identify accounts with user fee errors, underpayments, and overpayments that require adjustments. W&I consolidated the report listing at one location to provide improved oversight of the process. Both W&I and SB/SE program analysts, managers, operations management, and headquarters staff conduct reviews of the report listing. In January 2008, IRS implemented enhancements to the report and increased the frequency of the sweep process used to correct accounts from quarterly to weekly. IRS also updated IRM 5.19.1 in January 2008 to include requirements for case analysis and documentation; Status per GAO: Closed. We verified that IRS conducts managerial and operational reviews on its W&I Compliance Service Collection Operations, the division responsible for making the appropriate adjustments for errors in recorded installment agreement user fees. Additionally, we did not identify any errors in recorded installment agreement user fees tested during our fiscal year 2008 audit. ID no.: 07-20; Recommendation: Establish and maintain sufficient secured storage space to properly secure and safeguard property and equipment inventory, including in-stock inventories, assets from incoming shipments, and assets that are in the process of being excessed and/or shipped out (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Open. The IRS plans to implement the following procedures to ensure that sufficient secured space is maintained for Automated Data Processing (ADP) and Non-ADP assets: Requesters needing space are to initiate an Employee Resource Center ticket requesting "Property Consultation" services, which initiates Real Estate and Facilities Management (REFM) activity to work with the requester on obtaining the needed secured storage space. When Modernization & Information Technology Services property managers need secure storage, narrative associated with the Employee Resource Center work ticket must state: "Need to consult with local REFM staff on providing a secure storage alternative for ADP equipment." This procedure is to be used for asset distribution staging or when assets are to be excessed. This policy is effective March 30, 2009; Status per GAO: Open. IRS completed its corrective action plan after the end of our fiscal year 2008 audit. We will review IRS's corrective actions during our fiscal year 2009 audit. ID no.: 07-21; Recommendation: Develop and implement procedures to require that separate individuals place orders with vendors and perform receipt and acceptance functions when the orders are delivered (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-07-689R, May 11, 2007); Status per IRS: Closed. AWSS Procurement issued policy Change Notice 07- 08, which contains a revision to Policy and Procedure Memorandum 46.5, Receipt, Quality Assurance and Acceptance. The revision limits situations in which contracting officers may perform receipt and acceptance. In addition to the Policy and Procedure Memorandum 46.5, the IRS Acquisition Procedure Subpart 1003.90--Separation of Duties and Management Controls--requires separation of duties for requisition approval, certification of funds, contract award, and receipt and acceptance. Procurement runs Web Request Tracking System reports to review the instances where contracting officers performed receipt and acceptance to ensure that the receipt and acceptance falls within exceptions/procedures outlined in the Policy and Procedure Memorandum 46.5; Status per GAO: Open. During our fiscal year 2008 audit, we noted that IRS revised its policy to reflect the situations under which contracting officers may perform receipt and acceptance functions. In addition, the IRS Acquisition procedures require that no employee shall perform more than one of the following four functions: (1) requisition approval for supplies and/or services, (2) certify the availability of funds, (3) conduct the procurement and execute the contractual document, and (4) receive the supplies or services. However, during our fiscal year 2008 audit testing, we continued to find instances where individuals were performing incompatible functions. We will continue to review actions taken by IRS during our fiscal year 2009 audit. ID no.: 07-22; Recommendation: Document the results of internal control tests conducted in a manner sufficiently clear and complete to explain how control procedures were tested, what results were achieved, and how conclusions were derived from those results, without reliance on supplementary oral explanation (short-term); Source report: Management Report: IRS's First Year Implementation of the Requirements of the Office of Management and Budget's (OMB) Revised Circular No. A-123 (GAO-07-692R, May 18, 2007); Status per IRS: Closed. IRS revised its A-123 guidance to include templates and procedures for compiling, referencing, and reviewing audit working papers to ensure that the results of internal control tests are clear and complete to explain how control procedures were tested, what results were achieved, and how conclusions were derived from those results. During the fiscal year 2008 cycle, the Office of Corporate Planning and Internal Control assigned test team leaders and independent Office of Corporate Planning and Internal Control reviewers to examine workpapers to ensure the test team sufficiently documented their work to support their conclusions. The A-123 guidance requires that each set of work papers include a summary of findings statement setting out the conclusion reached after performing the transaction testing; Status per GAO: Closed. During our fiscal year 2008 IRS financial audit, we verified that IRS revised its A-123 guidance to include templates that clearly outline how to document and explain what control tests were performed, the scope of control tests, and the results of internal control tests performed. IRS's A-123 guidance also requires that each set of workpapers include a summary of findings statement that clearly concludes on results of test procedures performed by staff. We verified that IRS's workpapers documenting A-123 testing substantially conformed to the A-123 guidance. ID no.: 07-23; Recommendation: Clearly document how IRS considered existing reviews and audits in determining the nature, scope, and timing of procedures it planned to conduct under its OMB Circular No. A-123 process (short- term); Source report: Management Report: IRS's First Year Implementation of the Requirements of the Office of Management and Budget's (OMB) Revised Circular No. A-123 (GAO-07-692R, May 18, 2007); Status per IRS: Closed. During the development of fiscal year 2008 A- 123 internal control test plans, IRS analyzed and documented open recommendations related to the internal control process/transaction being tested. IRS considered the open recommendation findings while developing the process/transaction test plan. IRS will continue to incorporate the open recommendation findings while planning A-123 testing; Status per GAO: Closed. During fiscal year 2008, we verified that IRS included a requirement in its A-123 guidance to determine the adequacy and value of management actions taken in response to audits performed by GAO and the Treasury Inspector General for Tax Administration relating to financial reporting. We also verified that IRS review staff followed the A-123 guidance in performing internal control reviews. ID no.: 07-24; Recommendation: To the extent that IRS intends to use the information security work conducted under the Federal Information Security Management Act of 2002 (FISMA) to meet related A-123 requirements, identify the areas where the work conducted under FISMA does not meet the requirements of OMB Circular No. A-123 and, considering the findings and recommendations of our work on IRS's information security, expand FISMA procedures or perform additional procedures as part of the A-123 reviews to augment FISMA work (short-term); Source report: Management Report: IRS's First Year Implementation of the Requirements of the Office of Management and Budget's (OMB) Revised Circular No. A-123 (GAO-07-692R, May 18, 2007); Status per IRS: Open. IRS will continue to work with Treasury and Modernization & Information Technology Services to fully implement A- 123 requirements for evaluating controls over information technology relating to financial statement reporting. IRS will identify areas where the work conducted under FISMA does not meet A-123 requirements and consider information security findings and recommendations to ensure testing procedures meet A-123 requirements; Status per GAO: Open. We will follow up during future audits to assess IRS's progress in implementing this recommendation. ID no.: 07-25; Recommendation: Revise A-123 test plans to include appropriate consideration of the design of internal controls in addition to implementation of controls over individual transactions (short-term); Source report: Management Report: IRS's First Year Implementation of the Requirements of the Office of Management and Budget's (OMB) Revised Circular No. A-123 (GAO-07-692R, May 18, 2007); Status per IRS: Open. IRS revised a limited set of fiscal year 2008 test plans to pilot the requirement to include an analysis of the design for each transaction control set tested. This project is planned for completion during the fiscal year 2009 A-123 cycle; Status per GAO: Open. We verified that IRS revised a limited number of A-123 test plans to include an analysis of the design of internal controls tested. During our fiscal year 2009 audit, we will continue to review the remaining test plans as IRS revises them. ID no.: 07-26; Recommendation: Work with Treasury to identify laws and regulations that are significant to financial reporting, test controls over compliance with those laws and regulations, and evaluate and report on the results of such control reviews (short-term); Source report: Management Report: IRS's First Year Implementation of the Requirements of the Office of Management and Budget's (OMB) Revised Circular No. A-123 (GAO-07-692R, May 18, 2007); Status per IRS: Closed. In fiscal year 2007, IRS established an internal crosswalk between A-123 tests and laws and regulations significant to financial reporting. In fiscal year 2008, IRS updated the crosswalk to a listing of laws and regulations which were expanded to include all specific public laws and took the additional step of incorporating GAO audit methodology into the linkage; Status per GAO: Closed. We obtained and reviewed IRS's laws and regulations crosswalk and verified that IRS had identified and planned appropriate procedures to test controls over laws and regulations considered significant to financial reporting. ID no.: 07-27; Recommendation: Begin devising appropriate A-123 follow-up procedures for the last 3 months of the fiscal year to be implemented once the material weaknesses identified through the annual financial statement audits have been resolved (short-term); Source report: Management Report: IRS's First Year Implementation of the Requirements of the Office of Management and Budget's (OMB) Revised Circular No. A-123 (GAO-07-692R, May 18, 2007); Status per IRS: Open. IRS is considering alternative procedures for testing transactions to provide assurance for the last 3 months of the fiscal year. Although implementation of such procedures is not necessary until elimination of the outstanding material weaknesses, IRS intends to propose follow-up procedures before the end of the fiscal year; Status per GAO: Open. We will follow up during future audits to assess IRS's progress in implementing this recommendation. ID no.: 07-28; Recommendation: Provide A-123 review staff appropriate training, such as that available for financial auditors, to enhance their skills in workpaper documentation, identification and testing of internal controls, and evaluation and documentation of results (short-term); Source report: Management Report: IRS's First Year Implementation of the Requirements of the Office of Management and Budget's (OMB) Revised Circular No. A-123 (GAO-07-692R, May 18, 2007); Status per IRS: Closed. Members of the IRS A-123 workgroup completed the United States Department of Agriculture Graduate School course, Audit Evidence and Working Papers, covering methods for collecting and documenting types of evidence needed to support audit reports and to meet professional standards, during the fall of 2007. IRS used concepts from this course and best practices from previous cycles to improve the curriculum over previous years for the annual IRS A-123 Training Workshop to improve proficiency in documentation and analysis in the transactional testing. The training also covers the process to be followed when reviewing or performing tests of internal controls, developing a determination as to whether or not the controls are functioning properly, and evaluating the materiality of errors. The Office of Corporate Planning and Internal Control is currently developing an IRM provision for reference to reinforce the A-123 guidance provided during the training; Status per GAO: Closed. We verified that IRS developed an appropriate annual training workshop designed to ensure that their A-123 review staff enhance their skills in workpaper documentation, identification and testing of internal controls, and evaluation and documentation of test results. ID no.: 08-01; Recommendation: As IRS proceeds with its implementation of the Custodial Detail Data Base (CDDB), it should verify that CDDB, when it becomes fully operational and is used in conjunction with the Interim Revenue and Accounting Control System (IRACS), will provide IRS with the direct transaction traceability for all of its tax-related transactions as required by the U.S. Standard General Ledger (SGL), Federal Financial Management System Requirements (FFMSR), and the Federal Financial Management Improvement Act of 1996 (FFMIA) (long- term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Open. IRS instituted the use of trace identification numbers for revenue and refund transactions in fiscal year 2008 to provide traceability from the general ledger for tax transactions back to source documentation and throughout IRS financial management systems. IRS is currently developing additional internal controls for tax revenue transactions processed outside of the Electronic Federal Tax Payment System, and for transactions recorded into IRACS requiring manual transcription. IRS is working to revise each appropriate IRM provision and requested programming to implement system controls in payment systems to prevent, detect, and correct such transcription and input errors by fiscal year 2010. IRS is also developing the Redesign Revenue Accounting Control System, an enhancement of IRACS that will incorporate the United States Standard General Ledger. IRS plans to implement Redesign Revenue Accounting Control System in January 2010; Status per GAO: Open. During our future audits, we will continue to evaluate IRS's progress in achieving transaction traceability for tax revenues processed outside of the Electronic Funds Transaction Payment System and taxes receivable transactions. ID no.: 08-02; Recommendation: Document and implement the specific procedures to be performed by the IRS statistician in each step of the unpaid assessment estimation process (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Open. Revenue Financial Management documented the procedures the statistician performs in each step of the unpaid assessments estimation process by June 2008. Revenue Financial Management is enhancing each of these procedures to include additional steps based on the fiscal year 2008 audit. Revenue Financial Management will provide the new procedures by May 2009; Status per GAO: Open. During our fiscal year 2008 audit, we continued to find errors in IRS's unpaid assessment estimates that were not detected by IRS's internal reviews. IRS corrected these errors after we brought them to its attention. However, until IRS fully documents the specific procedures performed by its statistician in each step of the unpaid assessment estimation process and the specific procedures for reviewers to follow in their reviews, IRS faces increased risk that errors in this process will not be prevented or detected and corrected. We will continue to review IRS's corrective actions to address this recommendation during our fiscal year 2009 audit. ID no.: 08-03; Recommendation: Document and implement specific detailed procedures for reviewers to follow in their review of unpaid assessments statistical estimates. Specifically, IRS should require that a detailed supervisory review be performed to ensure (1) the statistical validity of the sampling plans, (2) data entered into the sample selection programs agree with the sampling plans, (3) data entered into the statistical projection programs agree with IRS's sample review results, (4) data on the spreadsheets used to compile the interim projections and roll- forward results trace back to supporting statistical projection results, and (5) the calculations on these spreadsheets are mathematically correct (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Open. In June 2008, Revenue Financial Management documented the procedures reviewers should follow during their review of the statistical estimates. Revenue Financial Management is adding additional levels of review and oversight for fiscal year 2009 and is finalizing a Memorandum of Understanding with the Office of Program Evaluation and Risk Analysis to perform an independent review; Status per GAO: Open. During our fiscal year 2008 audit, we continued to find errors in IRS's unpaid assessment estimates that were not detected by IRS's internal reviews. IRS corrected these errors after we brought them to its attention. However, until IRS fully documents the specific procedures performed by its statistician in each step of the unpaid assessment estimation process and the specific procedures for reviewers to follow in their reviews, IRS faces increased risk that errors in this process will not be prevented or detected and corrected. We will continue to review IRS's corrective actions to address this recommendation during our fiscal year 2009 audit. ID no.: 08-04; Recommendation: To address the inconsistency in assigning the effective date of an accuracy-related penalty, modify the Business Master File computer program so that the date of the deficiency assessment is used as the effective date of any associated accuracy-related penalty (long- term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. In January 2009, IRS implemented programming changes to the Business Master File computer program where accuracy- related penalties assessed subsequent to the programming change will carry the same date as the related deficiency assessment; Status per GAO: Open. IRS completed its corrective action after the end of our fiscal year 2008 audit. We will review IRS's corrective action to address this recommendation during our fiscal year 2009 audit. ID no.: 08-05; Recommendation: Complete and document the review of existing programs in the master files that affect penalty calculations to identify any instances in which programs are not functioning in accordance with the intent of the IRM (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. IRS assembled a team of interest and penalty subject matter experts to perform a review of master file programming of penalty and interest computations. The review included a general random sample of open modules as well as a sample of modules impacted by recent implementation of programming changes. SB/SE performed the review the week of May 19, 2008. SB/SE will continue to perform these reviews periodically and implement any necessary changes to programming as a result; Status per GAO: Closed. We confirmed that IRS completed its review of existing master file computer programs that affect penalty calculations and documented a listing of instances in which programs are not functioning in accordance with the intent of the IRM. ID no.: 08-06; Recommendation: In instances where computer programs are not functioning in accordance with the intent of the IRM, take appropriate action to correct the programs so that they function in accordance with the IRM (long-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. IRS formed a cross-functional working group to address penalty and interest programming issues in August 2007. This group meets biweekly and continues to identify and assess penalty and interest issues. When issues that need correction are identified, programming changes are requested and IRS performs subsequent testing to ensure that the programming change resolved the issue. Resolutions of these identified issues are in various stages. Other issues are being discussed with Modernization & Information Technology Services to determine the most effective way to implement programming changes, and on certain cases an impact analysis determined correction is not cost effective at this time. Solutions to identified systemic differences between IRS systems that cannot be fixed under the current processing system are being addressed by modernization efforts; Status per GAO: Open. Although IRS completed its review of master file computer programs that affect penalty calculations and has planned a series of corrective actions, it has not yet completed all of the required programming corrections. We will continue to review IRS's corrective actions to address this recommendation during our fiscal year 2009 and future audits. ID no.: 08-07; Recommendation: Develop and provide comprehensive guidance to assist TAC managers in conducting reviews of outlying TACs and documenting the results. This guidance should include a description of the key controls that should be in place at outlying TACs, specify how often these key controls should be reviewed, and specify how the results of each review should be documented, including follow-up on issues identified in previous TAC reviews (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. Managers follow IRM 1.4.11 as comprehensive guidance for conducting reviews at all TACs. TAC managers use the one- day receipt per TAC per quarter process to ensure at least once per quarter, the manager performs a one day review of all payment receipts as well as the documents associated with the receipts for all employees with payment receipts on the date chosen for review. Area directors are responsible for the oversight of all TAC activities including outlying post of duties. IRM 1.4.11.6.2 outlines the scheduled routine visit requirement for each TAC and Exhibit 1.4.11-11 gives a description of all required reviews for each TAC, including the frequency. Validation of completion is documented through operational reviews. The results of the operational reviews indicate a summary of findings, which included a corrective action report, completed annually; Status per GAO: Open. IRM 1.4.11 provides guidance for managerial reviews and frequency of these reviews at outlying TACs. Also, the IRM outlines the TAC Security Remittance Review Database process and requires managers to input the results of their reviews into the database. However, the database was not fully implemented in fiscal year 2008. As a result, we were unable to fully test its implementation during our audit fieldwork. We will review IRS's corrective actions during our fiscal year 2009 audit. ID no.: 08-08; Recommendation: Establish a process to periodically update and communicate the specific required reviews for all off-site TAC managers (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. The Director of Field Assistance issued a quarterly reminder to managers to conduct required reviews on September 30, 2008. Field Assistance continues to review the monthly reports received from field offices, including the status of corrective actions noted during operational reviews, to ensure completion of needed improvements; Status per GAO: Open. We will review IRS's corrective actions during our fiscal year 2009 audit. ID no.: 08-09; Recommendation: Establish a mechanism to monitor compliance with existing requirement that TAC employees responsible for accepting taxpayer payments in cash have their computer system access appropriately restricted to limit their ability to adjust taxpayer accounts (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. IRM 1.4.11.19.4.1.1 was revised in April 2008 to mandate the use of the "restrict" command code in all cases. Group managers will continue to be reminded of the existing requirements to restrict command codes as part of the Form 809 Annual Reconciliation Review. During this review, group managers use a check sheet as shown in IRM 3.8.45.29.15, which includes this validity check. The result of the review is sent to territory managers and Submission Processing. Furthermore, restricted IDRS command codes are addressed in ongoing operational reviews. IRM 1.4.11.19.4 guidance is provided to restrict the 809 book holders profile when ordering the initial 809 receipt book. IRM 1.4.11.19.4.1.1 establishes the requirement for group managers to use restrict command codes from an 809 book holders profile. IRM 1.4.11-15 TAC Payment Processing Checklist is completed as part of the payment processing review conducted quarterly, which includes a question addressing restrict command codes. Finally, IRM 1.4.11.19.4.1.1.1 covers the annual reconciliation of official receipts, which managers can use as an annual monitoring process in addition to operational reviews; Status per GAO: Closed. IRS mandated the use of the restrict command codes to TAC employees accepting cash payments to limit their IDRS access rights and ability to adjust taxpayer accounts. These procedures are monitored during operational reviews conducted by area and territory managers, at which time group managers are reminded of the existing requirements to restrict command codes. ID no.: 08-10; Recommendation: Establish procedures requiring periodic verification that all individuals designated as first responders to TAC duress alarms are appropriately qualified and geographically located to respond to the potentially dangerous situations in an effective and timely manner (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. Guidance concerning armed first responders to TAC duress alarms was reissued via email to area directors for distribution on August 19, 2008, and subsequently finalized in IRM 10.2.14, Methods of Providing Protection, issued October 1, 2008. The IRM specifies, "An armed 'First Responder' (guard police) must be listed as the first responder, as the shortest possible response time is critical with priority notification. The alarm notification priority protocols are: (1) First Priority: on-site guards are notified; (2) Second Priority, Federal Protective Service is notified, and (3) Third Priority, local police who will be notified last." The TAC Scheduled Duress Alarm Test Report was revised to include a section to indicate the date the notification list for first responders was last updated. The reports are rolled up from the Areas/Territories to the Security Programs office quarterly. The revised report was instituted via e-mail on July 24, 2008. PSEP continues to utilize the Audit Management Checklist as a repeatable process where Territory offices validate that proper first responders are listed for notification; Status per GAO: Closed. IRS established procedures in the IRM requiring quarterly verification that individuals designated as first responders to TAC duress alarms are appropriately qualified and geographically located to respond to the potentially dangerous situations in an effective and timely manner. ID no.: 08-11; Recommendation: Modify the IRM to specify qualifications and geographical proximity requirements for individuals designated as first responders to duress alarms at IRS facilities, and to require that the responsibilities and qualifications of all designated first responders be periodically reviewed to verify that over time, they continue to be qualified and appropriately located, and to make any necessary adjustments (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. IRS finalized and issued IRM 10.2.14, Methods of Providing Protection on October 1, 2008. IRM 10.2.14.9.2(7)a specifies: "An armed 'First Responder' (guard police) must be listed as the first responder, as the shortest possible response time is critical with priority notification. The alarm notification priority protocols are: (1) First Priority: on-site guards are notified; (2) Second Priority, Federal Protective Service is notified, and (3) Third Priority, local police who will be notified last." The TAC Scheduled Duress Alarm Test Report was revised to include a section to indicate the date the notification list for first responders was last updated. The reports are rolled up from the Areas/Territories to the Security Programs office quarterly. The revised report form was instituted via e- mail on July 24, 2008. PSEP continues to utilize the Audit Management Checklist as a repeatable process where Territory offices validate that proper first responders are listed for notification; Status per GAO: Closed. IRS revised the IRM to specify the qualifications and geographical proximity requirements for individuals designated as first responders and included a provision for PSEP to conduct quarterly reviews of this issue. ID no.: 08-12; Recommendation: Establish procedures to require documentation demonstrating that favorable background checks have been completed for all contractors prior to allowing them access to TAC and other field offices (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Open. AWSS has been working with the General Services Administration (GSA) since March 2008 to implement a process for procuring services from GSA to perform contractor background investigations. AWSS prepared and submitted a draft interagency agreement to GSA for consideration in June 2008. IRS received and reviewed the GSA comments, and is finalizing the interagency agreement for pricing and services. GSA has submitted a draft three-phase schedule for completion of the background investigations that would complete enter-on-duty determinations for all facilities by November 2009. Implementation is contingent upon GSA successfully completing its actions; Status per GAO: Open. During our fiscal year 2008 audit, we identified instances at three TACs where IRS did not have documentary evidence demonstrating the completion of favorable background investigations for contractors performing janitorial services during non-operating hours. We will review IRS's corrective actions during our fiscal year 2009 audit. ID no.: 08-13; Recommendation: Require including, in all shredding service contracts, provisions requiring (1) completed background investigations for contractor employees before they are granted access to sensitive IRS information, and (2) periodic, unannounced inspections at off-site shredding facilities by IRS to verify ongoing compliance with IRS safeguards and security requirements (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Open. IRS developed a Performance Work Statement for a National Document Destruction Contract. IRS expects full contract implementation by October 1, 2009. Implementing a national contract will standardize these requirements and ensure consistency. In the interim, the current contracts require a review of contractor performance through site visits and to ensure that contractors comply with all security requirements for employee clearance prior to performing the work. AWSS distributed a message to the Real Estate and Facilities Management Territory Managers and Logistics Chiefs on January 23, 2009, reinforcing the requirement to review their existing shred contracts to ensure they comply with the security requirements stated in their respective contracts; Status per GAO: Open. As stated in IRS's response, the Performance Work Statement for a National Document Destruction Contract will not be fully implemented until the first quarter of fiscal year 2010. We will review IRS's corrective actions during future audits. ID no.: 08-14; Recommendation: Revise the IRM to include a requirement that IRS conduct periodic, unannounced inspections at off-site contractor facilities entrusted with sensitive IRS information; document the results, including identification of any security issues; and verify that the contractor has taken appropriate corrective actions on any security issues observed (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Open. IRS developed a Performance Work Statement for a National Document Destruction Contract. IRS expects full contract implementation by October 1, 2009. Implementing a national contract will standardize these requirements and ensure consistency. In the interim, the current contracts require a review of contractor performance through site visits and to ensure that contractors comply with all security requirements for employee clearance prior to performing the work. IRS distributed a message on January 23, 2009, reinforcing the requirement to review their existing shred contracts to ensure they comply with the security requirements stated in their respective contracts; Status per GAO: Open. As stated in IRS's response, the Performance Work Statement for a National Document Destruction Contract will not be fully implemented until the first quarter of fiscal year 2010. We will review IRS's corrective actions during future audits. ID no.: 08-15; Recommendation: Establish procedures to require obtaining and reviewing documentation of completed background investigations for all shredding contractors before granting them access to taxpayer or other sensitive IRS information (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Open. IRS developed a Performance Work Statement for a National Document Destruction Contract. IRS expects full contract implementation by October 1, 2009. Implementing a national contract will standardize these requirements and ensure consistency. In the interim, the current contracts require a review of contractor performance through site visits, in order to ensure that contractors comply with all security requirements for employee clearance prior to performing the work. IRS distributed a message on January 23, 2009, reinforcing the requirement to review their existing shredding contracts to ensure they comply with the security requirements stated in their respective contracts; Status per GAO: Open. As stated in IRS's response, the Performance Work Statement for a National Document Destruction Contract will not be fully implemented until the first quarter of fiscal year 2010. In addition, during our fiscal year 2008 audit, we identified an instance at one of three SCCs we visited where shredding service contractor employees did not go through background investigations before they were granted access to taxpayer or other sensitive information. We will review IRS's corrective actions during future audits. ID no.: 08-16; Recommendation: Reinforce existing policies requiring the use of the revised Form 13094 when hiring juveniles (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. The Human Capital Office issued a notice in September 2007 to each Employment Branch Chief to reinforce this policy; and the office also sends periodic reminders to the Employment Offices during monthly calls with the employment staffs. The Human Capital Office also issued Alert 731-2 on September 29, 2008, to all Employment Offices clarifying the guidance provided in Policy No. 15. In October 2008, Policy and Programs received written confirmation from every Employment Office that Policy No. 15 was being followed and that the correct Form 13094 was being used; Status per GAO: Open. During our fiscal year 2008 audit, we identified four juveniles hired in fiscal year 2008 who were not provided a revised Form 13094. We will review IRS's corrective actions during our fiscal year 2009 audit. ID no.: 08-17; Recommendation: Reinforce existing policies requiring verification of the information on Form 13094 by contacting the reference directly and documenting the details of this contact (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. The Human Capital Office revised Form 13094 in December 2007 and provided the form and accompanying instructions to the employment staff in January 2008. The Human Capital Office also issued Alert 731-2 on September 29, 2008, to all Employment Offices clarifying the guidance provided in Policy No. 15. In October 2008, Policy and Programs received written confirmation from every Employment Office that Policy No. 15 was being followed and that the correct Form 13094 was being used; Status per GAO: Open. During our fiscal year 2008 audit, we identified five instances where the IRS employment office staff did not verify the information on Form 13094 by contacting the reference directly and documenting the details of that contact. We will review IRS's corrective actions during our fiscal year 2009 audit. ID no.: 08-18; Recommendation: Issue a memorandum to Receipt Control Operations Unit staff reiterating existing requirements for (1) supervisory reviews of the processing of TE/GE user fee deposits and (2) key documentation to be signed and dated by the supervisor as evidence of that review (short- term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. W&I Submission Processing issued a memorandum in April 2008 to the operations manager of Receipt and Control, reiterating the requirement to follow procedures in IRM 3.45.1 to conduct supervisory reviews of the deposit encoding tapes and the recapitulation of remittances, deposit tickets, and to sign or initial the documents as evidence that the reviews were completed. Receipt and Control is also following IRM 3.45.1 to conduct and document supervisory reviews of the TE/GE deposits; Status per GAO: Closed. We verified that IRS issued a memorandum to its operations manager of Receipt and Control to reinforce procedures in its IRM requiring signed supervisory review of TE/GE user fee deposits. Additionally, during our fiscal year 2008 audit, we did not identify any instances where IRS did not document supervisory review of the TE/GE user fee deposits tested. ID no.: 08-19; Recommendation: Modify existing guidelines to provide for detailed internal control procedures requiring that purchase card approving officials and purchase cardholders sign and date monthly account statements attesting to their review and completion of the required reconciliation process (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. The electronic Purchase Card Module eliminated the paper statement of accounts being mailed to purchase cardholders using the Purchase Card Module. The purchase cardholder and approving official electronically reconcile and approve the transactions, which is evidence of their signature approving the transactions. The system maintains history on the user login name and date of the action; Status per GAO: Closed. We confirmed that IRS modified its existing guidelines and fully implemented the Purchase Card Module. During our fiscal year 2008 audit, we noted that the purchase card approving official's signature attesting to the review and reconciliation of the monthly statement is now captured electronically by the Purchase Card Module. However, we also noted that the purchase card approving officials were not always electronically reconciling and approving transactions within the required timeframes documented in IRS's existing guidelines. Timely reconciliation and approval of transactions is necessary to help ensure that purchase card transactions are valid and appropriate. Thus, we are closing this recommendation and opening a new recommendation to address this additional issue in our June 2009 management report. See GAO-09-513R and recommendation 09-10 in this report. ID no.: 08-20; Recommendation: Modify existing guidelines to provide for detailed internal control procedures requiring that purchase cardholders obtain funding approval or verify that funds are available for the intended purpose prior to making a purchase (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. IRS provides purchase cardholders with funding approval requirements during initial and refresher training. The guidelines outlining funding requirements are also available online in the Purchase Card Guide and on the program specific Web site. As IRS converted purchase cardholders to the Purchase Card Module, it highlighted this requirement in the transition guidelines; Status per GAO: Closed. We confirmed that IRS modified its existing guidelines and fully implemented the Purchase Card Module. During our fiscal year 2008 audit, we noted that purchase cardholders obtained funding approval electronically through the Purchase Card Module prior to making a purchase. The Purchase Card Module directly interfaces with the funding requisition function of IRS's Web-based Requisition Tracking System to verify funds availability. ID no.: 08-21; Recommendation: Modify existing guidelines to provide for detailed internal control procedures requiring that purchase card approving officials update and maintain appropriate supporting documentation (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. Citibank reports previously received by purchase card approving officials were eliminated with implementation of the Purchase Card Module. All documentation for purchase card activity is maintained electronically in the Purchase Card Module with the exception of packing slips/receipts, which are maintained by the cardholder. The documentation is available for review by the approving official, but approving officials are not required to maintain copies of documentation already maintained by the cardholder; Status per GAO: Closed. Even though IRS did not modify its existing guidelines to require the purchase card approving official to maintain copies of the purchase cardholder's supporting documentation, we confirmed that IRS now has compensating internal control procedures in place to close this recommendation. IRS's existing guidelines require the purchase cardholder to maintain the supporting documentation and for approving officials to ensure that the cardholders have all required documentation. During our fiscal year 2008 audit, we noted that the purchase cardholders maintained appropriate supporting documentation. ID no.: 08-22; Recommendation: Modify existing guidelines to provide for detailed internal control procedures requiring that purchase cardholders and purchase card approving officials retain copies of all supporting documents for a reasonable period of time, such as 3 years (short- term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. The requirement to maintain supporting documentation for all purchase card activity for 3 years is outlined in current guidance and training material provided to cardholders. The documentation is available for review by the approving official, but is maintained by the cardholder; Status per GAO: Closed. Even though IRS did not modify its existing guidelines, we confirmed that the current guidelines require cardholders to maintain supporting documentation for 3 years. IRS's existing guidelines require the purchase cardholder to maintain the supporting documentation and for approving officials to ensure that the cardholders have all required documentation. During our fiscal year 2008 audit, we noted that the purchase cardholders maintained appropriate supporting documentation. ID no.: 08-23; Recommendation: Issue a memorandum addressed to all personnel responsible for updating inventory records that reiterates IRS's existing policy requiring that new assets be inputted into the inventory system within 10 days of receipt (short-term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. Modernization & Information Technology Services issued a memorandum dated September 5, 2008, and Directive (Asset Management Policy Directive AM 034) dated August 18, 2008, to all organizations reiterating the IRS policy that new assets must be inputted into the inventory system within 10 days of receipt; Status per GAO: Closed. During our fiscal year 2008 audit, IRS's Associate Chief Information Officer for End User Equipment Services, in response to our recommendations, issued a memorandum to all personnel responsible for updating inventory. The memorandum reiterated IRS's existing policy requiring that new assets be inputted into the inventory system within 10 days of receipt. ID no.: 08-24; Recommendation: Issue a memorandum to employees that reiterates IRS policy requiring all employees to obtain appropriate approvals of travel authorizations prior to the initiation of their travel (short- term); Source report: Management Report: Improvements Needed in IRS's Internal Controls (GAO-08-368R, June 2008); Status per IRS: Closed. AWSS issued communications to all employees reiterating the policy requiring all employees to obtain approval of travel authorizations before the initiation of travel through periodic notices on the IRS intranet with links to Travel Times. In Travel Times, IRS has issued: Travel Authorization Reminders (October 2007 and February 2008) and Travel Authorization Reminder News from the business units (December 2007, February 2008, and May 2008). Furthermore, IRS is continuing to implement GovTrip and as of January 1, 2009, has 25,775 GovTrip users. All users must file a travel authorization before travel begins, and GovTrip will not allow a voucher to be created without a signed/approved authorization; Status per GAO: Open. We confirmed that IRS issued communications to staff reiterating the policy that all employees receive travel authorization before commencing travel, and that IRS continues to implement its GovTrip system with full implementation expected by approximately July 2009. However, during our fiscal year 2008 audit, we continued to identify instances where IRS staff did not obtain approval of travel authorizations in advance of travel. We will continue to review actions being taken by IRS to address this recommendation during our fiscal year 2009 audit. ID no.: 09-01; Recommendation: Correct the Integrated Data Retrieval System (IDRS) computer program for identifying individual taxpayers who have entered into an installment agreement so that except in situations where the taxpayer did not file the tax return timely, failure-to-pay penalty assessments made after the date of the installment agreement are calculated using the monthly one-quarter of one percent penalty rate on all of the taxpayer's accounts covered by the installment agreement (short-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-02; Recommendation: Add specific requirements to the IRM to require that manual refund units assign back up staff to perform manual refund monitoring activities whenever a manual refund initiator is absent for an extended period of time (short-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-03; Recommendation: Document in the IRM minimum requirements for establishing criteria for time discrepancies or other inconsistencies, which if noted as part of the required monitoring of Form 10160, Receipt for Transport of IRS Deposit, would require off-site surveillance of couriers (short-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-04; Recommendation: Document in the IRM minimum requirements for conducting off-site surveillance of couriers entrusted with taxpayer receipts and information (short-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-05; Recommendation: Establish procedures to track and routinely report the total dollar amounts and volumes of receipts collected by individual TAC location, group, territory, area, and nationwide (long-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-06; Recommendation: Establish procedures to ensure that an inventory of all duress alarms is documented for each location and is readily available to individuals conducting duress alarm tests before each test is conducted (short-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-07; Recommendation: Establish procedures to periodically update the inventory of duress alarms at each TAC location to ensure that the inventory is current and complete as of the testing date (short-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-08; Recommendation: Provide instructions for conducting quarterly duress alarm tests to ensure that IRS officials conducting the test (1) document the test results for each duress alarm listed in the inventory, including date, findings, and planned corrective action and (2) track the findings until they are properly resolved (short-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-09; Recommendation: Establish procedures requiring that each physical security analyst conduct a periodic documented review of the Emergency Signal History Report and emergency contact list for its respective location to ensure that (1) appropriate corrective actions have been planned for all incidents reported by the central monitoring station and (2) the emergency contact list for each location is current and includes only appropriate contacts (short-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-10; Recommendation: Develop, document, and implement procedures to regularly monitor the timeliness of purchase card approvals. This should include establishing procedures and responsibility for identifying and following up on instances of non-compliance with required approval timeframes (short-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-11; Recommendation: Revise the IRM section related to the limited use of expired appropriations to provide additional guidance to help employees distinguish between procurement actions that constitute new obligations and those that merely adjust or liquidate prior obligations that the IRS incurred during an expired appropriation's original period of availability (short-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-12; Recommendation: Reiterate IRS's existing policy requiring that transactions be recorded accurately to the undelivered orders obligation accounts (short-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-13; Recommendation: Perform existing reviews of transactions recorded in undelivered orders obligation accounts in a more timely manner in an effort to detect and correct errors, such as duplicate receipt and acceptance charges, earlier in the process (short-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-14; Recommendation: Establish a formal, documented process for identifying over time the full range of IRS's programs and underlying activities, outputs, and services for which IRS believes full cost information would be useful to executives and program managers. Such a process should (1) be formally established and documented through policies, procedures, guidance, meeting minutes, and other appropriate means; (2) define the roles and responsibilities of the CFO and other business units in the process; and (3) be focused on the goal of determining what cost information would be useful and the most appropriate means of developing and reporting it for both existing programs and new programs as they are initiated (short-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-15; Recommendation: For each of the IRS programs, activities, outputs, and services identified for which full cost information would be useful to IRS executives and program managers, complete the development of full cost methodologies to routinely accumulate and report on their full costs, including down to the activity level where appropriate. Such full cost data should be readily accessible to IRS program managers whenever they are needed and should include both personnel costs based on time spent on specific activities as well as all associated non- personnel costs and be drawn from or reconcilable to IRS's financial accounting system (long-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. ID no.: 09-16; Recommendation: Develop outcome-oriented performance measures and related performance goals for IRS's enforcement programs and activities that include measures of the full cost of, and the revenue collected from, those programs and activities (return on investment) to assist IRS's managers in optimizing resource allocation decisions and evaluating the effectiveness of their activities (long-term); Source report: Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness (GAO-09-513R, June 2009); Status per IRS: Because this is a recent recommendation, GAO did not obtain information on IRS's status in addressing it; Status per GAO: Open: This is a recent recommendation. We will verify IRS's corrective actions during future audits. Source: IRS updates detailing actions to address GAO's recommendations and GAO's analysis of IRS's actions. [End of table] [End of section] Appendix II: Open Recommendations Arranged by Control or Compliance Issue: Financial Reporting: The Internal Revenue Service (IRS) does not have financial management systems adequate to enable it to accurately generate and report, in a timely manner, the information needed to both prepare financial statements and manage operations on an ongoing basis. To overcome these systemic deficiencies with respect to preparation of its annual financial statements, IRS was compelled to employ compensating procedures. Specifically, IRS (1) did not have an adequate general ledger system for tax-related transactions, and (2) was unable to readily determine the costs of its activities and programs and did not have cost-based performance information to assist in making or justifying resource allocation decisions. As a result, IRS does not have data to assist in managing operations on a day-to-day basis and to provide an informed basis for making or justifying resource allocation decisions. Table 12: Material Weakness: Controls over Financial Reporting: ID no.: 01-39; Recommendation: Develop a mechanism to track and report the actual costs associated with reimbursable activities (long-term); Control activity: Accurate and timely recording of transactions and events. ID no.: 08-01; Recommendation: As IRS proceeds with its implementation of the Custodial Detail Data Base (CDDB), it should verify that CDDB, when it becomes fully operational and is used in conjunction with the Interim Revenue and Accounting Control System (IRACS), will provide IRS with the direct transaction traceability for all of its tax-related transactions as required by the U.S. Standard General Ledger (SGL), Federal Financial Management System Requirements (FFMSR), and the Federal Financial Management Improvement Act of 1996 (FFMIA) (long- term); Control activity: Appropriate documentation of transactions and internal controls. Source: GAO analysis of financial management recommendations made to IRS. [End of table] Unpaid Tax Assessments: IRS has serious internal control issues that affected its management of unpaid tax assessments. Specifically, IRS (1) lacked a subsidiary ledger for unpaid tax assessments that would allow it to produce accurate, useful, and timely information with which to manage and report externally, and (2) experienced errors and delays in recording taxpayer information, payments, and other activities. Table 13: Material Weakness: Controls over Unpaid Assessments: ID No.: 94-02; Recommendation: Monitor implementation of actions to reduce the errors in calculating and reporting manual interest on taxpayer accounts, and test the effectiveness of these actions (short-term); Control activity: Accurate and timely recording of transactions and events. ID No.: 99-01; Recommendation: Manually review and eliminate duplicate or other assessments that have already been paid off to assure that all accounts related to a single assessment are appropriately credited for payments received (short-term); Control activity: Accurate and timely recording of transactions and events. ID No.: 99-03; Recommendation: Ensure that IRS's modernization blueprint includes developing a subsidiary ledger to accurately and promptly identify, classify, track, and report all IRS unpaid assessments by amount and taxpayer. This subsidiary ledger must also have the capability to distinguish unpaid assessments by category in order to identify those assessments that represent taxes receivable versus compliance assessments and write-offs. In cases involving trust fund recovery penalties, the subsidiary ledger should ensure that (1) the trust fund recovery penalty assessment is appropriately tracked for all taxpayers liable but counted only once for reporting purposes and (2) all payments made are properly credited to the accounts of all individuals assessed for the liability (short-term); Control activity: Accurate and timely recording of transactions and events. ID No.: 99-20; Recommendation: Analyze and determine the factors causing delays in processing and posting Trust Fund Recovery Penalty (TFRP) assessments. Once these factors have been determined, IRS should develop procedures to reduce the impact of these factors and to ensure timely posting to all applicable accounts and proper offsetting of refunds against unpaid assessments before issuance (long-term); Control activity: Accurate and timely recording of transactions and events. ID No.: 09-01; Recommendation: Correct the Integrated Data Retrieval System (IDRS) computer program for identifying individual taxpayers who have entered into an installment agreement so that except in situations where the taxpayer did not file the tax return timely, failure-to-pay penalty assessments made after the date of the installment agreement are calculated using the monthly one-quarter of one percent penalty rate on all of the taxpayer's accounts covered by the installment agreement (short-term); Control activity: Accurate and timely recording of transactions and events. Source: GAO analysis of financial management recommendations made to IRS. [End of table] Information Security: Significant information security weaknesses continue to jeopardize the confidentiality, availability, and integrity of information processed by IRS's key systems, increasing the risk of material misstatement for financial reporting. For example, sensitive information, such as user identification and passwords for mission-critical applications, continued to be readily available to any user on IRS's internal network. These IDs and passwords could be used by a malicious user to compromise data flowing to and from IFS. Other continuing weaknesses included the existence of passwords that were not complex enough to avoid being guessed or cracked. In addition, although IRS had improved its application of vendor-supplied system patches that protect against known vulnerabilities, it still had not patched systems in a timely manner. The agency's procurement system, which processed approximately $1.8 billion of obligations in fiscal year 2008, also remained at risk because previously reported weaknesses had not been corrected. These weaknesses included (1) not restricting user's ability to bypass application controls, (2) continuing to use unencrypted protocols, and (3) not removing separated employees' access in a timely manner. These outstanding weaknesses increase the risk that data processed by the agency's financial management systems are not reliable. Material Weakness: Controls over Information Systems Security: Although IRS has made some progress in addressing previous weaknesses we identified in its information systems security controls and physical security controls, these and new weaknesses in information systems security continue to impair IRS's ability to ensure the confidentiality, integrity, and availability of financial and tax- processing systems. As of January 2009, there were 74 open recommendations from our information systems security work designed to help IRS improve its information systems security controls. Those recommendations are reported separately and are not included in this report primarily because of the sensitive nature of some of the issues. Tax Revenue and Refunds: Weaknesses in control over tax revenue and refunds continue to hamper IRS's ability to optimize the use of its limited resources to collect unpaid taxes and minimize payment of improper refunds. Specifically, IRS has not (1) developed performance metrics and goals on the cost of, and the revenue collected from, IRS's various enforcement programs and activities, with the exception of the Earned Income Tax Credit program; or (2) fully established and implemented the financial management structure and processes to provide IRS key financial management data on costs and enforcement tax revenue. These deficiencies inhibit IRS's ability to appropriately assess and routinely monitor the relative merits of its various enforcement initiatives and adjust its strategies as needed. This, in turn, can significantly affect both the level of enforcement tax revenue collected and improper refunds disbursed. Table 14: Significant Deficiency: Controls over Revenues and Issuing Refunds: ID no.: 09-02; Recommendation: Add specific requirements to the Internal Revenue Manual (IRM) to require that manual refund units assign back up staff to perform manual refund monitoring activities whenever a manual refund initiator is absent for an extended period of time (short-term); Control activity: Reviews by management at the functional or activity level. ID no.: 09-14; Recommendation: Establish a formal, documented process for identifying over time the full range of IRS's programs and underlying activities, outputs, and services for which IRS believes full cost information would be useful to executives and program managers. Such a process should (1) be formally established and documented through policies, procedures, guidance, meeting minutes, and other appropriate means; (2) define the roles and responsibilities of the CFO and other business units in the process; and (3) be focused on the goal of determining what cost information would be useful and the most appropriate means of developing and reporting it for both existing programs and new programs as they are initiated (short-term); Control activity: Establishment and review of performance measures and indicators. ID no.: 09-15; Recommendation: For each of the IRS programs, activities, outputs, and services identified for which full cost information would be useful to IRS executives and program managers, complete the development of full cost methodologies to routinely accumulate and report on their full costs, including down to the activity level where appropriate. Such full cost data should be readily accessible to IRS program managers whenever they are needed and should include both personnel costs based on time spent on specific activities as well as all associated non- personnel costs and be drawn from or reconcilable to IRS's financial accounting system (long-term); Control activity: Establishment and review of performance measures and indicators. ID no.: 09-16; Recommendation: Develop outcome-oriented performance measures and related performance goals for IRS's enforcement programs and activities that include measures of the full cost of, and the revenue collected from, those programs and activities (return on investment) to assist IRS's managers in optimizing resource allocation decisions and evaluating the effectiveness of their activities (long-term); Control activity: Establishment and review of performance measures and indicators. Source: GAO analysis of financial management recommendations made to IRS. [End of table] Release of Federal Tax Liens: IRS did not always release the applicable federal tax lien within 30 days of the tax liability being either paid off or abated, as required by the Internal Revenue Code (section 6325). The Internal Revenue Code grants IRS the power to file a lien against the property of any taxpayer who neglects or refuses to pay all assessed federal taxes. The lien serves to protect the interest of the federal government and as a public notice to current and potential creditors of the government's interest in the taxpayer's property. Table 15: Compliance with Laws and Regulations: Timely Release of Liens: ID no.: 01-06; Recommendation: Implement procedures to closely monitor the release of tax liens to ensure that they are released within 30 days of the date the related tax liability is fully satisfied. As part of these procedures, IRS should carefully analyze the causes of the delays in releasing tax liens identified by our work and prior work by IRS's former internal audit function and ensure that such procedures effectively address these issues (short-term); Control activity: Reviews by management at the functional or activity level. ID no.: 07-15; Recommendation: Issue a memorandum to employees in the Centralized Insolvency Office reiterating the IRM requirement to timely record bankruptcy discharge information onto taxpayer accounts in the master file or to manually release the liens in the Automated Lien System (short-term); Control activity: Appropriate documentation of transactions and internal controls. Source: GAO analysis of financial management recommendations made to IRS. [End of table] Other Control Issues: The recommendations listed below pertain to issues that do not rise individually or in the aggregate to the level of a significant deficiency or a material weakness. However, these issues do represent weaknesses in various aspects of IRS's control environment that should be addressed. Table 16: Other Control Issues Not Associated with a Material Weakness or Significant Deficiency: ID no.: 99-22; Recommendation: Expand IRS's current review of campus deterrent controls to include similar analyses of controls at IRS field offices in areas such as courier security, safeguarding of receipts in locked containers, requirements for fingerprinting employees, and requirements for promptly overstamping checks made out to "IRS" with "Internal Revenue Service" or "United States Treasury." Based on the results, IRS should make appropriate changes to strengthen its physical security controls (short-term); Control activity: Reviews by management at the functional or activity level. ID no.: 99-36; Recommendation: Make enhancements to IRS financial systems to include recording plant and equipment (P&E) and capital leases as assets when purchased and to generate detailed records for P&E that reconcile to the financial records (long-term); Control activity: Accurate and timely recording of transactions and events. ID no.: 01-17; Recommendation: Develop a subsidiary ledger for leasehold improvements and implement procedures to record leasehold improvement costs as they occur (long-term); Control activity: Accurate and timely recording of transactions and events. ID no.: 02-16; Recommendation: Ensure that field office management complies with existing receipt control policies that require a segregation of duties between employees who prepare control logs for walk-in payments and employees who reconcile the control logs to the actual payments (short- term); Control activity: Segregation of duties. ID no.: 02-18; Recommendation: Work with the National Finance Center (NFC) to resolve the technical limitations that exist within the Security Entry and Tracking System (SETS) database and continue to periodically review SETS data to detect and correct errors (short-term); Control activity: Controls over Information processing. ID no.: 04-08; Recommendation: Enforce policies and procedures to ensure that service center campus security guards respond to alarms (short-term); Control activity: Physical control over vulnerable assets. ID no.: 05-32; Recommendation: Establish policies and procedures to require appropriate segregation of duties in small business/self-employed units of field offices with respect to preparation of Payment Posting Vouchers, Document Transmittal forms, and transmittal packages (short- term); Control activity: Segregation of duties. ID no.: 05-33; Recommendation: Enforce the requirement that a document transmittal form listing the enclosed Daily Report of Collection Activity forms be included in transmittal packages, using such methods as more frequent inspections or increased reliance on error reports compiled by the service center teller units receiving the information (short-term); Control activity: Reviews by management at the functional or activity level. ID no.: 05-37; Recommendation: Enforce documentation requirements relating to authorizing officials charged with approving manual refunds (short- term); Control activity: Proper execution of transactions and events. ID no.: 05-38; Recommendation: Enforce requirements for monitoring accounts and reviewing monitoring of accounts for manual refunds (short-term); Control activity: Reviews by management at the functional or activity level. ID no.: 05-39; Recommendation: Enforce requirements for documenting monitoring actions and supervisory review for manual refunds (short-term); Control activity: Appropriate documentation of transactions and internal controls. ID no.: 06-01; Recommendation: Require that Refund Inquiry Unit managers or supervisors document their review of all forms used to record and transmit returned refund checks prior to sending them for final processing (short-term); Control activity: Appropriate documentation of transactions and internal controls. ID no.: 06-02; Recommendation: Enforce compliance with existing requirements that all IRS units transmitting taxpayer receipts and information from one IRS facility to another, including service center campuses (SCC), taxpayer assistance centers (TAC), and units within Large and Mid-sized Business (LMSB) and Tax-Exempt and Government Entities (TE/GE), establish a system to track acknowledged copies of document transmittals (short- term); Control activity: Appropriate documentation of transactions and internal controls. ID no.: 06-04; Recommendation: Require that managers or supervisors document their reviews of document transmittals to ensure that taxpayer receipts and/or taxpayer information mailed between IRS locations are tracked according to guidelines (short-term); Control activity: Appropriate documentation of transactions and internal controls. ID no.: 06-05; Recommendation: Equip all TACs with adequate physical security controls to deter and prevent unauthorized access to restricted areas or office space occupied by other IRS units, including those TACs that are not scheduled to be reconfigured to the "new TAC" model in the near future. This includes appropriately separating customer service waiting areas from restricted areas in the near future by physical barriers such as locked doors marked with signs barring entrance by unescorted customers (short-term); Control activity: Physical control over vulnerable assets. ID no.: 06-07; Recommendation: Document supervisory visits by offsite managers to TACs not having a manager permanently on site. This documentation should be signed by the manager and should (1) record the time and date of the visit, (2) identify the manager performing the visit, (3) indicate the tasks performed during the visit, (4) note any problems identified, and (5) describe corrective actions planned (short-term); Control activity: Appropriate documentation of transactions and internal controls. ID no.: 06-08; Recommendation: Enforce the requirement that all security or other responsible personnel at SCCs and lockbox banks record all instances involving the activation of intrusion alarms, regardless of the circumstances that may have caused the activation (short-term); Control activity: Physical control over vulnerable assets. ID no.: 06-22; Recommendation: Direct Facilities Management Branch managers to research and resolve the aging reports (short-term); Control activity: Accurate and timely recording of transactions and events. ID no.: 07-04; Recommendation: Develop and implement appropriate corrective actions for any gaps in closed circuit television (CCTV) camera coverage that do not provide an unobstructed view of the entire exterior of the SCC's perimeter, such as adding or repositioning existing CCTV cameras or removing obstructions (short-term); Control activity: Physical control over vulnerable assets. ID no.: 07-08; Recommendation: Require that managers or supervisors provide the manual refund initiators in their units with training on the most current requirements to help ensure that they fulfill their responsibilities to monitor manual refunds and document their monitoring actions to prevent the issuance of duplicate refunds (short-term); Control activity: Management of human capital. ID no.: 07-20; Recommendation: Establish and maintain sufficient secured storage space to properly secure and safeguard property and equipment inventory, including in-stock inventories, assets from incoming shipments, and assets that are in the process of being excessed and/or shipped out (short-term); Control activity: Physical control over vulnerable assets. ID no.: 07-21; Recommendation: Develop and implement procedures to require that separate individuals place orders with vendors and perform receipt and acceptance functions when the orders are delivered (short-term); Control activity: Segregation of duties. ID no.: 07-24; Recommendation: To the extent that IRS intends to use the information security work conducted under the Federal Information Security Management Act of 2002 (FISMA) to meet related A-123 requirements, identify the areas where the work conducted under FISMA does not meet the requirements of Office of Management and Budget (OMB) Circular No. A-123 and, considering the findings and recommendations of our work on IRS's information security, expand FISMA procedures or perform additional procedures as part of the A-123 reviews to augment FISMA work (short-term); Control activity: Reviews by management at the functional or activity level. ID no.: 07-25; Recommendation: Revise A-123 test plans to include appropriate consideration of the design of internal controls in addition to implementation of controls over individual transactions (short-term); Control activity: Reviews by management at the functional or activity level. ID no.: 07-27; Recommendation: Begin devising appropriate A-123 follow-up procedures for the last 3 months of the fiscal year to be implemented once the material weaknesses identified through the annual financial statement audits have been resolved (short-term); Control activity: Reviews by management at the functional or activity level. ID no.: 08-02; Recommendation: Document and implement the specific procedures to be performed by the IRS statistician in each step of the unpaid assessment estimation process (short-term); Control activity: Appropriate documentation of transactions and internal controls. ID no.: 08-03; Recommendation: Document and implement specific detailed procedures for reviewers to follow in their review of unpaid assessments statistical estimates. Specifically, IRS should require that a detailed supervisory review be performed to ensure (1) the statistical validity of the sampling plans, (2) data entered into the sample selection programs agree with the sampling plans, (3) data entered into the statistical projection programs agree with IRS's sample review results, (4) data on the spreadsheets used to compile the interim projections and roll- forward results trace back to supporting statistical projection results, and (5) the calculations on these spreadsheets are mathematically correct (short-term); Control activity: Management of human capital. ID no.: 08-04; Recommendation: To address the inconsistency in assigning the effective date of an accuracy-related penalty, modify the Business Master File computer program so that the date of the deficiency assessment is used as the effective date of any associated accuracy-related penalty (long- term); Control activity: Reviews by management at the functional or activity level. ID no.: 08-06; Recommendation: In instances where computer programs are not functioning in accordance with the intent of the IRM, take appropriate action to correct the programs so that they function in accordance with the IRM (long-term); Control activity: Accurate and timely recording of transactions and events. ID no.: 08-07; Recommendation: Develop and provide comprehensive guidance to assist TAC managers in conducting reviews of outlying TACs and documenting the results. This guidance should include a description of the key controls that should be in place at outlying TACs, specify how often these key controls should be reviewed, and specify how the results of each review should be documented, including follow-up on issues identified in previous TAC reviews (short-term); Control activity: Appropriate documentation of transactions and internal controls. ID no.: 08-08; Recommendation: Establish a process to periodically update and communicate the specific required reviews for all off-site TAC managers (short-term); Control activity: Reviews by management at the functional or activity level. ID no.: 08-12; Recommendation: Establish procedures to require documentation demonstrating that favorable background checks have been completed for all contractors prior to allowing them access to TAC and other field offices (short-term); Control activity: Access restrictions to and accountability for resources and records. ID no.: 08-13; Recommendation: Require including, in all shredding service contracts, provisions requiring (1) completed background investigations for contractor employees before they are granted access to sensitive IRS information and (2) periodic, unannounced inspections at off-site shredding facilities by IRS to verify ongoing compliance with IRS safeguards and security requirements (short-term); Control activity: Access restrictions to and accountability for resources and records. ID no.: 08-14; Recommendation: Revise the IRM to include a requirement that IRS conduct periodic, unannounced inspections at off-site contractor facilities entrusted with sensitive IRS information; document the results, including identification of any security issues; and verify that the contractor has taken appropriate corrective actions on any security issues observed (short-term); Control activity: Reviews by management at the functional or activity level. ID no.: 08-15; Recommendation: Establish procedures to require obtaining and reviewing documentation of completed background investigations for all shredding contractors before granting them access to taxpayer or other sensitive IRS information (short-term); Control activity: Access restrictions to and accountability for resources and records. ID no.: 08-16; Recommendation: Reinforce existing policies requiring the use of the revised Form 13094 when hiring juveniles (short-term); Control activity: Access restrictions to and accountability for resources and records. ID no.: 08-17; Recommendation: Reinforce existing policies requiring verification of the information on Form 13094 by contacting the reference directly and documenting the details of this contact (short-term); Control activity: Access restrictions to and accountability for resources and records. ID no.: 08-24; Recommendation: Issue a memorandum to employees that reiterates IRS policy requiring all employees to obtain appropriate approvals of travel authorizations prior to the initiation of their travel (short- term); Control activity: Proper execution of transactions and events. ID no.: 09-03; Recommendation: Document in the IRM minimum requirements for establishing criteria for time discrepancies or other inconsistencies, which if noted as part of the required monitoring of Form 10160, Receipt for Transport of IRS Deposit, would require off-site surveillance of couriers (short-term); Control activity: Physical control over vulnerable assets. ID no.: 09-04; Recommendation: Document in the IRM minimum requirements for conducting off-site surveillance of couriers entrusted with taxpayer receipts and information (short-term); Control activity: Physical control over vulnerable assets. ID no.: 09-05; Recommendation: Establish procedures to track and routinely report the total dollar amounts and volumes of receipts collected by individual TAC location, group, territory, area, and nationwide (long-term); Control activity: Reviews by management at the functional or activity level. ID no.: 09-06; Recommendation: Establish procedures to ensure that an inventory of all duress alarms is documented for each location and is readily available to individuals conducting duress alarm tests before each test is conducted (short-term); Control activity: Physical control over vulnerable assets. ID no.: 09-07; Recommendation: Establish procedures to periodically update the inventory of duress alarms at each TAC location to ensure that the inventory is current and complete as of the testing date (short-term); Control activity: Physical control over vulnerable assets. ID no.: 09-08; Recommendation: Provide instructions for conducting quarterly duress alarm tests to ensure that IRS officials conducting the test (1) document the test results for each duress alarm listed in the inventory, including date, findings, and planned corrective action and (2) track the findings until they are properly resolved (short-term); Control activity: Physical control over vulnerable assets. ID no.: 09-09; Recommendation: Establish procedures requiring that each physical security analyst conduct a periodic documented review of the Emergency Signal History Report and emergency contact list for its respective location to ensure that (1) appropriate corrective actions have been planned for all incidents reported by the central monitoring station and (2) the emergency contact list for each location is current and includes only appropriate contacts (short-term); Control activity: Physical control over vulnerable assets. ID no.: 09-10; Recommendation: Develop, document, and implement procedures to regularly monitor the timeliness of purchase card approvals. This should include establishing procedures and responsibility for identifying and following up on instances of noncompliance with required approval timeframes (short-term); Control activity: Proper execution of transactions and events. ID no.: 09-11; Recommendation: Revise the IRM section related to the limited use of expired appropriations to provide additional guidance to help employees distinguish between procurement actions that constitute new obligations and those that merely adjust or liquidate prior obligations that the IRS incurred during an expired appropriation's original period of availability (short-term); Control activity: Reviews by management at the functional or activity level. ID no.: 09-12; Recommendation: Reiterate IRS's existing policy requiring that transactions be recorded accurately to the undelivered orders obligation accounts (short-term); Control activity: Accurate and timely recording of transactions and events. ID no.: 09-13; Recommendation: Perform existing reviews of transactions recorded in undelivered orders obligation accounts in a more timely manner in an effort to detect and correct errors, such as duplicate receipt and acceptance charges, earlier in the process (short-term); Control activity: Accurate and timely recording of transactions and events. Source: GAO analysis of financial management recommendations made to IRS. [End of table] [End of section] Appendix III: Comments from the Internal Revenue Service: Department Of The Treasury: Internal Revenue Service: Commissioner: Washington, D.C. 20224: June 11, 2009: Mr. Steven J. Sebastian: Director: Financial Management and Assurance: U.S. Government Accountability Office: 441 G Street, N.W. Washington, D.C. 20548: Dear Mr. Sebastian: I am writing in response to the Government Accountability Office (GAO) draft report titled, IRS: Status of GAO Financial Audit and Related Financial Management Report Recommendations (GAO-09-514). As GAO noted in the report, IRS continues to make significant progress in improving our internal controls and financial management as evidenced by nine consecutive years of clean audit opinions on our financial statements. We are pleased that you acknowledged our progress in addressing our financial management challenges and agreed to close 35 prior year financial management recommendations. We are committed to implementing appropriate improvements to ensure that the IRS maintains sound financial management practices. If you have any questions, please contact Alison Doone, Chief Financial Officer, at (202) 622-6400. Sincerely, Signed by: Douglas H. Shulman: [End of section] Appendix IV: GAO Contact and Staff Acknowledgments: GAO Contact: Steven J. Sebastian, (202) 512-3406 or sebastians@gao.gov: Staff Acknowledgments: In addition to the contact named above, the following individuals made major contributions to this report: William J. Cordrey, Assistant Director; Ray Bush; Stephanie Chen; Nina Crocker; Oliver Culley; Charles Ego; Doreen Eng; Charles Fox; Valerie Freeman; Ted Hu; Richard Larsen; Delores Lee; Gail Luna; Julie Phillips; John Sawyer; Christopher Spain; Cynthia Teddleton; Lien To; LaDonna Towler; and Gary Wiggins. [End of section] Footnotes: [1] Management is responsible for establishing and maintaining internal control to achieve the objectives of effective and efficient operations, reliable financial reporting, and compliance with applicable laws and regulations. See 31 U.S.C. § 3512(c), (d), commonly known as the Federal Managers' Financial Integrity Act of 1982 (FMFIA); see [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1], Standards for Internal Control in the Federal Government, at 4-5 (November 1999). The actions required by agencies and individual federal managers includes taking proactive measures to develop and implement appropriate, cost-effective internal control for results- oriented management; to assess the adequacy of internal control in federal programs and operations; to identify needed improvements; and to take corresponding corrective actions. [2] A material weakness is a significant deficiency, or combination of significant deficiencies, that results in more than a remote likelihood that a material misstatement of the financial statements will not be prevented or detected. A significant deficiency is a control deficiency, or combination of deficiencies, that adversely affects the entity's ability to initiate, authorize, record, process, or report financial data reliably in accordance with generally accepted accounting principles such that there is more than a remote likelihood that a misstatement of the entity's financial statements that is more than inconsequential will not be prevented or detected. A control deficiency exists when the design or operation of a control does not allow management or employees, in the course of performing their assigned functions, to prevent or detect misstatements on a timely basis. [3] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1]. [4] The circular requires agencies and individual federal managers to take systematic and proactive measures to (1) develop and implement appropriate, cost-effective internal control for results-oriented management; (2) assess the adequacy of internal control in federal programs and operations; (3) separately assess and document internal control over financial reporting consistent with the process defined in appendix A of the circular; (4) identify needed improvements; (5) take corresponding corrective action; and (6) report annually on internal control through management assurance statements. [5] GAO, Internal Control Standards: Internal Control Management and Evaluation Tool, [hyperlink, http://www.gao.gov/products/GAO-01-1008G] (Washington, D.C.: August 2001). [6] GAO, Federal Information System Controls Audit Manual (FISCAM), [hyperlink, http://www.gao.gov/products/GAO-09-232G] (Washington, D.C.: February 2009). FISCAM contains guidance for reviewing information system controls that affect the security of computerized data. [7] GAO, Financial Audit: IRS's Fiscal Years 2008 and 2007 Financial Statements, [hyperlink, http://www.gao.gov/products/GAO-09-119] (Washington, D.C.: Nov. 10, 2008). [8] GAO, Internal Revenue Service: Status of Financial Audit and Related Financial Management Report Recommendations, [hyperlink, http://www.gao.gov/products/GAO-08-693] (Washington, D.C.: July 2, 2008). [9] GAO, Management Report: Improvements Are Needed to Enhance IRS's Internal Controls and Operating Effectiveness, [hyperlink, http://www.gao.gov/products/GAO-09-513R] (Washington, D.C.: June 24, 2009). [10] We define short-term recommendations as those that we believe could be addressed within 2 years at the time we made the recommendation. We define long-term recommendations as those we expected to require 2 years or more to implement at the time we made the recommendation. [11] [hyperlink, http://www.gao.gov/products/GAO-09-119]. [12] Table 1 does not include the 11th control activity, "top-level reviews of actual performance," because we do not have any recommendations related to this internal control activity. [13] The vast majority of federal tax payments are made for both businesses and individuals via the Electronic Federal Tax Payment System. [14] Information security controls include electronic access controls, software change controls, physical security, segregation of duties, and service continuity. These controls are designed to ensure that access to data is appropriately restricted, only authorized changes to computer programs are made, physical access to sensitive computing resources and facilities is protected, computer security duties are segregated, and backup and recovery plans are adequate to ensure the continuity of essential operations. [15] GAO, Information Security: Continued Efforts Needed to Address Significant Weaknesses at IRS, [hyperlink, http://www.gao.gov/products/GAO-09-136] (Washington, D.C.: Jan. 9, 2009). [16] Most refunds are generated automatically. However, under certain circumstances, IRS processes refunds manually to expedite payment. Such refunds include those over $10 million, those requested by taxpayers for immediate payment due to hardship or emergency, those to beneficiaries of deceased taxpayers, and those that need to be expedited because IRS is in jeopardy of paying interest for exceeding the 45-day limit for processing a return. [17] [hyperlink, http://www.gao.gov/products/GAO-09-119]. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO‘s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO‘s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.