Veterans Affairs

Continued Action Needed to Reduce IT Equipment Losses and Correct Control Weaknesses Gao ID: GAO-08-918 July 31, 2008

In July 2004, GAO reported that the six Department of Veterans Affairs (VA) medical centers it audited lacked a reliable property control database and effective inventory policies and procedures. In July 2007, GAO reported that continuing internal control weaknesses over IT equipment at four case study locations at VA resulted in an increased risk of theft, loss, and misappropriation of IT equipment assets. GAO's two reports included 18 recommendations to improve internal control over IT equipment. GAO was asked to perform a follow-up audit to determine (1) whether VA has made progress in implementing GAO's prior recommendations for improving internal control over IT equipment and (2) the effectiveness of VA's current internal controls to prevent theft, loss, or misappropriation of IT equipment. GAO reviewed policies and other pertinent documentation, statistically tested IT equipment inventory controls at four geographically disparate locations, and interviewed VA officials.

VA has made significant progress in addressing prior GAO recommendations to improve controls over IT equipment. Of the 18 recommendations GAO made in its two earlier reports, VA completed action on 14 recommendations, partially implemented action on 2 recommendations, and is working to address the 2 remaining open recommendations. These recommendations focused on strengthening policies and procedures to establish a framework for accountability and control of IT equipment. If effectively implemented, VA's July 2008 policy changes would address many of the control weaknesses GAO identified. Mandated early implementation of this new policy addresses user-level accountability and requirements for strengthening physical security. In addition, to determine the extent of inventory control weaknesses over its IT equipment, VA performed a departmentwide physical inventory in 2007. However, as of May 15, 2008, VA reported that it could not locate about 62,800 IT equipment items, of which 9,800 could have stored sensitive information. Because VA does not know what, if any, sensitive information resided on the equipment, potentially affected individuals could not be notified. GAO's statistical tests of IT equipment inventory controls from February through May 2008 at four locations identified continuing control weaknesses, including missing items, lack of accountability, and errors in IT equipment inventory records. Although these control weaknesses may be addressed through early implementation of the July 2008 policies, the fact that GAO identified missing items only a few months after these locations had completed their physical inventories is an indication that underlying weaknesses in accountability over IT equipment have not yet been corrected. GAO's tests identified 50 missing items, of which 34 could have stored sensitive data, but again, notifications to individuals could not be made. Further, the lack of user-level accountability and inaccurate records on status, location, and item description of IT equipment items at the four case study locations make it difficult to determine the extent to which actual theft, loss, or misappropriation of IT equipment may have occurred. In addition, the four locations had weaknesses in controls over hard drives in the property disposal process as well as physical security weaknesses at IT storage facilities. These control weaknesses present a risk that VA could lose control over new, used, and excess IT equipment and that any sensitive personal and medical information residing on hard drives in this equipment could be compromised.

Recommendations

Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.

Director: Team: Phone:


GAO-08-918, Veterans Affairs: Continued Action Needed to Reduce IT Equipment Losses and Correct Control Weaknesses This is the accessible text file for GAO report number GAO-08-918 entitled 'Veterans Affairs: Continued Action Needed to Reduce IT Equipment Losses and Correct Control Weaknesses' which was released on August 1, 2008. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Subcommittee on Oversight and Investigations, Committee on Veterans' Affairs, House of Representatives: United States Government Accountability Office: GAO: July 2008: Veterans Affairs: Continued Action Needed to Reduce IT Equipment Losses and Correct Control Weaknesses: VA IT Inventory Controls: GAO-08-918: GAO Highlights: Highlights of GAO-08-918, a report to the Subcommittee on Oversight and Investigations, Committee on Veterans' Affairs, House of Representatives. Why GAO Did This Study: In July 2004, GAO reported that the six Department of Veterans Affairs (VA) medical centers it audited lacked a reliable property control database and effective inventory policies and procedures. In July 2007, GAO reported that continuing internal control weaknesses over IT equipment at four case study locations at VA resulted in an increased risk of theft, loss, and misappropriation of IT equipment assets. GAO‘s two reports included 18 recommendations to improve internal control over IT equipment. GAO was asked to perform a follow-up audit to determine (1) whether VA has made progress in implementing GAO‘s prior recommendations for improving internal control over IT equipment and (2) the effectiveness of VA‘s current internal controls to prevent theft, loss, or misappropriation of IT equipment. GAO reviewed policies and other pertinent documentation, statistically tested IT equipment inventory controls at four geographically disparate locations, and interviewed VA officials. What GAO Found: VA has made significant progress in addressing prior GAO recommendations to improve controls over IT equipment. Of the 18 recommendations GAO made in its two earlier reports, VA completed action on 14 recommendations, partially implemented action on 2 recommendations, and is working to address the 2 remaining open recommendations. These recommendations focused on strengthening policies and procedures to establish a framework for accountability and control of IT equipment. If effectively implemented, VA‘s July 2008 policy changes would address many of the control weaknesses GAO identified. Mandated early implementation of this new policy addresses user-level accountability and requirements for strengthening physical security. In addition, to determine the extent of inventory control weaknesses over its IT equipment, VA performed a departmentwide physical inventory in 2007. However, as of May 15, 2008, VA reported that it could not locate about 62,800 IT equipment items, of which 9,800 could have stored sensitive information. Because VA does not know what, if any, sensitive information resided on the equipment, potentially affected individuals could not be notified. GAO‘s statistical tests of IT equipment inventory controls from February through May 2008 at four locations identified continuing control weaknesses, including missing items, lack of accountability, and errors in IT equipment inventory records. Although these control weaknesses may be addressed through early implementation of the July 2008 policies, the fact that GAO identified missing items only a few months after these locations had completed their physical inventories is an indication that underlying weaknesses in accountability over IT equipment have not yet been corrected. Table: IT Inventory Control Test Results at Four Case Study Locations: Control failures: Missing items; North Texas HCS: 6%; Boston HCS: 3%; Puget Sound HCS: 1%; VA headquarters: 12%. Control failures: Incorrect user organization; North Texas HCS: 91%; Boston HCS: 60%; Puget Sound HCS: 76%; VA headquarters: 12%. Control failures: Incorrect location; North Texas HCS: 46%; Boston HCS: 17%; Puget Sound HCS: 14%; VA headquarters: 33%. Control failures: Recordkeeping errors; North Texas HCS: 9%; Boston HCS: 41%; Puget Sound HCS: 9%; VA headquarters: 4%. Source: GAO analysis. Note: Each of these estimates has a margin of error, based on a two- sided, 95 percent confidence interval, of +/- 10 percent or less. [End of table] GAO‘s tests identified 50 missing items, of which 34 could have stored sensitive data, but again, notifications to individuals could not be made. Further, the lack of user-level accountability and inaccurate records on status, location, and item description of IT equipment items at the four case study locations make it difficult to determine the extent to which actual theft, loss, or misappropriation of IT equipment may have occurred. In addition, the four locations had weaknesses in controls over hard drives in the property disposal process as well as physical security weaknesses at IT storage facilities. These control weaknesses present a risk that VA could lose control over new, used, and excess IT equipment and that any sensitive personal and medical information residing on hard drives in this equipment could be compromised. What GAO Recommends: GAO makes five recommendations to VA for additional actions to strengthen the overall control environment and improve specific internal control activities and safeguard IT equipment. VA‘s initial response stated that it generally agreed with four of GAO‘s five recommendations. After further clarification, VA officials stated that they agreed with the intent of all of GAO‘s recommendations and were taking steps to address them. To view the full product, including the scope and methodology, click on [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-08-918]. For more information, contact Kay L. Daly at (202) 512-9095 or dalykl@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: VA Has Made Significant Progress in Addressing GAO Recommendations and Completing a VA-Wide IT Equipment Inventory: Tests of IT Inventory Controls at Case Study Locations Identified Continuing Weaknesses: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Objectives, Scope, and Methodology: Appendix II: Status of VA Actions on Recommendations in GAO's July 2007 and 2004 Reports: Appendix III: Comments from the Department of Veterans Affairs: Appendix IV: Reports of Survey on Missing IT Equipment for VA Case Study Locations: Appendix V: GAO Contact and Staff Acknowledgments: Tables: Table 1: Overview of Key Controls in VA's IT Property Management Process: Table 2: Status of VA's Actions on Prior Recommendations: Table 3: Summary of VA-Wide Fiscal Year 2007 IT Equipment Physical Inventory Results as of May 15, 2008: Table 4: Numbers of Missing IT Equipment Items at Four Test Locations That Were Identified during the 2007 VA-Wide IT Physical Inventory: Table 5: Estimated IT Equipment Inventory Control Failure Rates at Four Test Locations: Table 6: Number of Missing IT Equipment Items by Headquarters Organization and Missing Items That Could Have Stored Sensitive Personal Data: Table 7: Estimated IT Inventory Control Failure Rates Related to Correct User and Location at the Four Test Locations: Table 8: Estimated Percentages of Other IT Inventory Recordkeeping Failures at Four Test Locations: Table 9: Population of VA IT Equipment at Locations Selected for Testing: Table 10: GAO's 2007 Report Recommendations and Status of VA Actions as of July 2008: Table 11: GAO's 2004 Report Recommendations and Status of VA Actions as of July 2008: Table 12: Summary of Reports of Survey as of May 15, 2008, for Case Study Locations Covered in GAO Audits: Abbreviations: AEMS/MERS: Automated Engineering Management System/Medical Equipment Repair Service: CFR: Code of Federal Regulations: CIO: Chief Information Officer: EIL: equipment inventory listing: ELF: Equipment Loan Form: FMFIA: Federal Managers' Financial Integrity Act of 1982: HCS: health care system: HHS: Department of Health and Human Services: HIPAA: Health Information Portability and Accountability Act of 1996: IT: information technology: NARA: National Archives and Records Administration: NCA: National Cemetery Administration: OAL: Office of Acquisitions and Logistics: OIT: Office of Information and Technology: OMB: Office of Management and Budget: SMC: Security Management Committee: USC: United States Code: VA: Department of Veterans Affairs: VBA: Veterans Benefits Administration: VHA: Veterans Health Administration: VISN: Veterans Integrated Service Network: [End of section] United States Government Accountability Office: Washington, DC 20548: July 31, 2008: The Honorable Harry E. Mitchell: Chairman: The Honorable Ginny Brown-Waite: Ranking Member: Subcommittee on Oversight and Investigations: Committee on Veterans' Affairs: House of Representatives: This report responds to your request that we perform a follow-up audit to assess the Department of Veterans Affairs (VA) progress in strengthening controls over information technology (IT) equipment. Past reports of thefts of laptop computers and data breaches raised concerns about the adequacy of controls over VA IT equipment. In July 2004, we reported[Footnote 1] that the six VA medical centers we audited lacked a reliable property control database and had problems with implementation of VA inventory policies and procedures. In July 2007, we reported[Footnote 2] that a weak overall control environment and pervasive weaknesses in inventory control and accountability at four locations we audited put IT equipment at risk of theft, loss, and misappropriation, including sensitive personal and medical information maintained on this equipment. For example, our statistical tests of IT equipment inventory controls at the four VA case study locations identified a total of 123 missing IT equipment items, including 53 computers that could have stored sensitive information. Our 2004 and 2007 audits found that some medical centers did not account for IT equipment valued under $5,000 during physical inventories. Our 2004 report made 6 recommendations and our 2007 report made 12 recommendations for VA actions to improve accountability of IT equipment inventory and reduce the risk of disclosure of sensitive personal and medical information. VA's mission is to promote the health, welfare, and dignity of all veterans in recognition of their service to the nation by ensuring they receive medical care, benefits, social support, and lasting memorials. The department's three major components are the Veterans Health Administration (VHA), the Veterans Benefits Administration (VBA), and the National Cemetery Administration (NCA). During 2007, VA employed over 230,000 individuals and relied on an undetermined number of contractors, volunteers, and students in carrying out its operations. VA provided these individuals with a wide range of IT equipment, including desktop and laptop computers, monitors and printers, personal digital assistants, unit-level workstations, local area networking equipment, and medical equipment capable of storing sensitive personal and medical information.[Footnote 3] By the start of fiscal year 2008, VA had centralized its IT function at all locations within its Office of Information and Technology (OIT). OIT staff share responsibility for management of IT equipment inventory with property management personnel. Accordingly, it is crucial for the department's Assistant Secretary for Information and Technology, who serves as the Chief Information Officer (CIO), to have the cooperation of property managers to ensure that well-established integrated processes exist for controlling IT inventory. Given the continuing nature of IT equipment inventory control problems and their significance, you asked us to perform additional follow-up work to determine (1) whether VA has made progress in implementing our prior recommendations for improving internal control over IT equipment and (2) the effectiveness of VA's current internal controls to prevent theft, loss, or misappropriation of IT equipment. To achieve our first objective, we conducted interviews and obtained documentation from VA property management and OIT officials on the actions taken to address the 12 recommendations in our July 2007 report and the 6 property-related recommendations in our July 2004 report. As you requested, we also reviewed the process and results of VA's 2007 departmentwide physical inventory of IT equipment and actions taken to resolve discrepancies, including VA inventory results for locations tested in our current and prior audits.[Footnote 4] In addition, we reviewed policy revisions related to IT equipment controls based on our prior recommendations. To achieve our second objective and determine the effectiveness of current internal controls for preventing theft, loss, or misappropriation of IT equipment, we used a case study approach, selecting three geographically disparate VA health care systems[Footnote 5] (HCS) located in Dallas, Texas; Seattle, Washington; and Boston, Massachusetts. We also selected VA headquarters organizations[Footnote 6] as a means of assessing the overall control environment, or "tone at the top," as we did in our 2007 audit. At each of the four case study locations, we statistically tested IT equipment inventory control attributes for existence (meaning IT equipment items listed in inventory records exist and can be located), user-level accountability, and inventory record accuracy. As in our 2007 audit, at each of our case study locations we also evaluated (1) VA's Reports of Survey[Footnote 7] on lost and stolen items, (2) controls over computer hard drives in the excess property disposal process,[Footnote 8] and (3) physical security controls for IT storage facilities. We performed sufficient procedures to determine that inventory data at the test locations were reliable for the purpose of our audit,[Footnote 9] including data analysis, interviews of key officials, and review of VA procedures for assuring the reliability of data generated by key property inventory systems. We conducted this performance audit from January 2008 through July 2008 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We performed our investigative procedures in accordance with quality standards as set forth by the President's Council on Integrity and Efficiency. A detailed discussion of our objectives, scope, and methodology is included in appendix I. Results in Brief: VA has made significant progress in addressing our previous recommendations. These recommendations focused on strengthening policies and procedures to establish a framework for accountability and control of IT equipment. As of the end of our field work in July 2008, VA had completed action on 10 of the 12 recommendations in our July 2007 report[Footnote 10] and partially implemented actions on 1 other recommendation. VA also has actions under way to address the remaining recommendation in our 2007 report. Further, VA completed action on 4 of 6 property-related recommendations in our 2004 report,[Footnote 11] partially completed action on a fifth recommendation, and has plans to address the remaining 2004 recommendation. Details of VA's actions on our recommendations to strengthen controls over IT equipment are presented in appendix II. Importantly, VA's Assistant Secretary for Management and the CIO have worked together to draft a revised property management policy in a new VA Handbook 7002, Logistics Management Procedures, which includes requirements for user-level accountability, time frames for completing Reports of Survey[Footnote 12] on missing and stolen property, and requirements for strengthening physical security. On July 3, 2008, VA's Assistant Secretary for Management mandated early implementation of the handbook.[Footnote 13] If effectively implemented, the handbook changes would address many of the control weaknesses we identified. Further, in 2007 VA performed a departmentwide physical inventory of IT equipment at the Subcommittee's direction. Commensurate with the centralization of IT functions under the CIO, including IT asset management, OIT monitored the inventory effort. Initially VA's physical inventory determined that approximately 79,000 IT equipment items were missing. After several months of searching and research of property records, as of May 15, 2008, OIT reported that approximately 62,800 recorded IT equipment items could not be located, of which over 9,800 could have stored sensitive information. Because VA does not know what, if any, sensitive information resided on the equipment, notifications to potentially affected individuals could not be made.[Footnote 14] Facility personnel were continuing to search for missing items, and the CIO formed a quick response team to help ensure that Reports of Survey on lost and stolen items are completed in a timely manner. Our tests of IT equipment inventory controls conducted from February through May 2008 at four case study locations, including three VA HCS and VA headquarters, identified continuing control weaknesses related to missing items, lack of accountability, and errors in IT equipment inventory records. Our Standards for Internal Control in the Federal Government[Footnote 15] requires agencies to establish physical control to secure and safeguard vulnerable assets, such as equipment that might be vulnerable to risk of loss or unauthorized use, including periodically counting the assets and comparing the results to control records. Our statistical tests of IT inventory controls excluded thousands of IT equipment items identified as missing at the four case study locations during VA's 2007 IT equipment inventory effort. Therefore, if adequate controls were in place at our test locations, we would not have expected to identify any additional missing items, blank data fields, or inaccurate inventory records. However, our statistical tests and data analysis at the four locations found significant control failures related to (1) missing items, (2) blank serial numbers, (3) inaccurate information on user organization, (4) inaccurate information on user location, and (5) other recordkeeping errors related to item description information (e.g., model number and manufacturer). Our statistical tests identified a total of 50 missing items, of which 34 could have stored sensitive information. As with missing items identified in VA's departmentwide physical inventory of IT equipment, because VA does not know what, if any, sensitive information resided on the equipment, notifications to potentially affected individuals could not be made. We estimate the percentage of inventory control failures related to these missing items to be 1 percent at the Puget Sound HCS, 3 percent at the Boston HCS, 6 percent at the North Texas HCS, and 12 percent for VA headquarters organizations.[Footnote 16] Although these control weaknesses may be addressed through VA's early implementation of the July 2008 policies, the fact that we identified missing items only a few months after these locations had completed their physical inventories is an indication that the locations had not yet corrected underlying control weaknesses related to accountability over their IT equipment. We also found that medical equipment with data storage and processing capabilities was not included in VA's physical inventory of IT equipment.[Footnote 17] The lack of user-level accountability and inaccurate records on status, location, and item descriptions found at our case study locations make it difficult to determine the extent to which actual theft, loss, or misappropriation of IT equipment may have occurred. Moreover, our follow-up work at the four case study locations found weaknesses in controls over hard drives in the property disposal process as well as physical security weaknesses at IT storage facilities. These control weaknesses present a risk that VA could lose control over new, used, and excess IT equipment and that any sensitive personal and medical information residing on hard drives in this equipment could be compromised. This report contains five recommendations to VA on additional actions needed to strengthen the overall control environment and improve key internal control activities to help ensure accountability and safeguard IT equipment. In initially commenting on our draft report, VA stated that it generally agreed with all but one of our five recommendations. VA was concerned that our recommendation to develop a list of medical equipment with data storage capabilities that should be considered as IT equipment for inventory control purposes intended that this equipment should be redefined (i.e., reclassified) as IT equipment. In a follow-up meeting with VA officials, we clarified that our recommendation was intended to provide the CIO visibility over this equipment for purposes of assuring accountability and information security. Following our discussion and clarifications, VA officials said they agreed with the intent of all five of our recommendations and noted actions they are taking to address them. VA's comments and our analysis are discussed in the Agency Comments and Our Evaluation section of this report. VA's comments are reprinted in appendix III. Background: VA's mission is to serve America's veterans and their families and to be their principal advocate in ensuring that they receive medical care, benefits, and social support in recognition of their service to our nation. VA, headquartered in Washington, D.C., is the second largest federal department and reported it had over 230,000 employees as of September 30, 2007, including physicians, nurses, counselors, statisticians, computer specialists, architects, and attorneys. VA has three major line organizations--VHA, VBA, and NCA--and field facilities throughout the United States. VHA has 21 Veterans Integrated Service Networks (VISN) that oversee medical center activities within their areas, which may cover one or more states. VA provides employees, contractors, volunteers, and students with a wide range of IT equipment,[Footnote 18] including desktop and laptop computers, monitors and printers, personal digital assistants, unit-level workstations, local area networking equipment, and medical equipment with memory and data processing/communication capabilities. By the start of fiscal year 2008, VA had centralized its IT function at all locations within the realigned OIT. VA's IT Property Management Process: The Assistant Secretary for Information and Technology heads VA's OIT, serves as the CIO for the department, and is the principal advisor to the Secretary on matters relating to IT management in the department. OIT staff share responsibility for management of IT equipment inventory with property management personnel. Accordingly, it is crucial for the department's CIO to have the cooperation of property managers to ensure that well-established integrated processes exist for controlling IT inventory. The steps in the IT property management process are key events, which should be documented by an inventory transaction, a financial transaction, or both, as appropriate. Federal records management law, as codified in Title 44 of the U.S. Code and implemented through National Archives and Records Administration (NARA) guidance, requires federal agencies to adequately document and maintain proper records of essential transactions and have effective controls for creating, maintaining, and using records of these transactions.[Footnote 19] Table 1 provides an overview of VA's IT property management process. Table 1: Overview of Key Controls in VA's IT Property Management Process: Receipt, deployment, and inventory control of items in service: Document receipt of new IT equipment items and update financial and property records; Upon receipt of IT equipment, property management personnel record receipt and acceptance for financial reporting and payment. Property personnel also affix bar code labels and create property records[A] for new IT equipment by entering in the automated property systems serial number, description, model number, manufacturer, and original acquisition value, among other elements. Timely recording of new IT equipment in the central property records reduces the risk of misappropriation and lessens the opportunity for undetected loss or theft. Deploy IT equipment and record user and location information; Upon deployment of new IT equipment or deployment of existing equipment for reuse, OIT personnel record the property location. OIT personnel also record organization and user information. Recording organization and user-level information creates an environment of accountability and helps ensure that individuals take responsibility for the IT equipment items assigned to them. Perform physical inventory of IT equipment; VA personnel confirm IT equipment existence during annual physical inventories. Personnel use handheld scanners to capture IT item bar code information and to update location information which helps achieve segregation of duties. In addition, VA Handbook 7127/4 requires that all completed inventories have a 5 percent verification inventory conducted by an accountable officer or designee, a disinterested party, and the custodial officer or designee. Comparing those items physically identified to the inventory records presents an opportunity to identify missing items and to update inventory records for changes in user, location, and status, as appropriate. Update property records; Once personnel have completed physical inventories they update the central property records to reflect current information. Missing items are reported to VA Police or security officers, as appropriate, and to a Board of Survey[B] for further investigation and write-off, if necessary. Updating information on a timely basis provides an organization with accurate information on the location, quantity, and status of its IT equipment for management accountability and decision making. Turn-in, hard drive cleansing, and disposal of excess IT equipment: Document turn-ins of excess IT equipment items; Once an IT item has been identified for turn-in or disposal, the user or OIT will complete VA Form 2237, "Request, Turn-In, and Receipt for Property or Services" or use an electronic turn-in process. Property management personnel are responsible for updating the status of the item in the inventory records. Accurate status information provides asset visibility over items that are in service (in use) and those that have been removed from service. Secure and remove data from hard drives in the property disposal process; OIT personnel are responsible for the physical security of computer hard drives during the disposal process. Physical security of hard drives during the disposal process mitigates the risk of theft or loss or compromise of sensitive information. As part of the disposal process, OIT personnel either cleanse the hard drives using VA-approved software or ship the hard drives to a vendor for physical destruction. Recording hard drive serial numbers and the corresponding item bar code and serial numbers of the host computers creates an audit trail that can be used to determine the system from which a hard drive originated. Since hard drives have the capability to store sensitive information, control of computer hard drives during the property disposal process is essential to safeguarding personal information that may be stored on the hard drives.[C] Redeploy or dispose excess IT equipment items and update inventory status; OIT personnel may redeploy IT equipment that is determined to be excess to the turn-in user's needs. Ultimately, VA will dispose of items excess to its needs by donating them to schools, transferring them to the General Services Administration for reuse within the federal government or resale, or transferring them to disposal (or scrap) vendors. Timely recording of turn-ins and disposal of excess IT equipment helps ensure that VA maintains accountability for IT equipment throughout its life cycle as well as the accuracy of its IT equipment inventory records. Source: GAO analysis of VA policies and procedures. [A] Medical center personnel use the Automated Equipment Management System/Medical Equipment Repair Service (AEMS/MERS) for new IT equipment acquisitions. AEMS/MERS is a general inventory management system that is local to each VA medical center. Headquarters personnel enter records of new IT equipment in the Inte-GreatTM Property Manager system. [B] VA Handbook 7125, Materiel Management Procedures, mandates that a Board of Survey be appointed when there is a possibility that a VA employee may be assessed a pecuniary (financial) liability or disciplinary action as a result of loss, damage, or destruction of property valued at $5,000 or more. The Board of Survey reviews the Report of Survey, which identifies IT equipment that is unaccounted for and explains efforts to account for missing items. The Board of Survey approves final Reports of Survey, including write-offs of missing items and determines if disciplinary action is warranted. [C] Federal agencies, such as VA, are required to protect sensitive data stored on their IT equipment against the risk of data breaches and thus the improper disclosure of personal identification information, such as names and social security numbers. Such information is regulated by privacy protections under the Privacy Act of 1974, codified, as amended, at 5 U.S.C. § 552a and, when information concerns an individual's health, the Health Insurance Portability and Accountability Act of 1996 (HIPAA). See Pub. L. No. 104-191, § 264, 110 Stat. 1936, 2033-34 (Aug. 21, 1996), and implementing regulations at 45 C.F.R. pt. 164. [End of table] VA Has Made Significant Progress in Addressing GAO Recommendations and Completing a VA-Wide IT Equipment Inventory: VA has made significant progress in addressing our previous recommendations directed at improving policies and procedures for control of IT equipment and reducing the risk of disclosure of sensitive personal and medical information. As of the end of our field work in July 2008, VA had completed action on 10 of our 12 recommendations from our July 2007 report.[Footnote 20] VA's Assistant Secretary for Management and the CIO worked together to draft a revised property management policy in a new VA Handbook 7002, Logistics Management Procedures, which addresses 7 of our 2007 recommendations. This revised policy is an important step in establishing a framework for control of IT equipment. On July 3, 2008, the Assistant Secretary for Management mandated early implementation of this policy, which includes requirements for user-level accountability, time frames for completing Reports of Survey on missing and stolen property, and requirements for strengthening physical security. VA also partially implemented action on one other recommendation and has actions under way to address the remaining recommendation from our 2007 report. Successful implementation of these efforts will be key to improving controls over VA's IT equipment. VA also made progress implementing recommendations from our 2004 report[Footnote 21] related to personal property and equipment management. VA completed action on four of six property-related recommendations in our 2004 report and partially completed action on a fifth recommendation. VA has plans to address the remaining 2004 recommendation. In addition, in response to your concerns about VA-wide controls based on our previous audits, VA required departmentwide physical inventories of IT equipment to be completed by December 31, 2007. OIT monitored the 2007 physical inventory effort for IT equipment and reported that as of May 15, 2008, VA was unable to locate approximately 62,800 recorded IT equipment items, of which over 9,800 could have stored sensitive information. The CIO formed a "tiger team"[Footnote 22] to monitor efforts under the Report of Survey[Footnote 23] system and to help ensure that Reports of Survey are completed in a timely manner. VA Has Made Significant Progress in Addressing GAO Recommendations: To address recommendations in our July 2007 report, VA completed action on 10 of our 12 recommendations, partially implemented actions on one other recommendation, and has actions under way to address the remaining recommendation. VA actions on our 2007 report recommendations included the establishment of specific time frames for finalizing Reports of Survey, granting OIT personnel access to the central property database, and holding employees financially liable for lost IT equipment. In addition, VA completed action on four of the six recommendations in our July 2004 report, partially completed action on a fifth recommendation, and has plans to address the remaining recommendation. For example, VA revised its policy through VA Handbook 7127/4, Materiel Management Procedures, to state that sensitive items include IT equipment and named several types of IT equipment items. VA's revised policy also stated that IT equipment items valued under $5,000 are to be included in physical inventories. Further, VA has drafted policies that provide a framework for strengthening controls over IT equipment, including VA Handbook 7002, Logistics Management Procedures.[Footnote 24] On July 3, 2008, VA's Assistant Secretary for Management mandated early implementation of this handbook. Effective implementation of this new policy will be essential to ensuring adequate control and accountability of VA's IT equipment and any sensitive information residing on that equipment. Table 2 provides a summary of our 2007 and 2004 recommendations and the current status of VA actions. For a more detailed explanation of VA's actions taken and planned on our recommendations, see appendix II. Table 2: Status of VA's Actions on Prior Recommendations: 2007 GAO recommendations: VA-wide recommendations: 1. Revise VA property management policy and procedures to include detailed requirements for what transactions must be recorded to document inventory events and to clearly establish individual responsibility for recording all essential transactions in the property management process; Status: Fully implemented. 2. Revise VA purchase card policy to require purchase card holders to notify property management officials of IT equipment and other property items acquired with government purchase cards at the time the items are received so that they can be recorded in property management systems; Status: Fully implemented. 3. Establish procedures to require specific, individual user-level accountability for IT equipment. In implementing this recommendation, consideration should be given to making the unit head, or a designee, accountable for shared IT equipment; Status: Fully implemented. 4. Enforce user-level accountability and IT coordinator responsibility by taking appropriate disciplinary action, including holding employees financially liable, as appropriate, for lost or missing IT equipment; Status: Fully implemented. 5. Establish specific time frames for finalizing a Report of Survey once an inventory has been completed so that research on missing items is completed expeditiously and does not continue indefinitely without meeting formal reporting requirements; Status: Fully implemented. 6. Establish a mechanism to monitor adherence by the San Diego and Houston medical centers and other VA organizations, as appropriate, to VA policy for performing annual inventories of sensitive items under $5,000, including IT equipment; Status: Fully implemented. 7. Require that information resource management and IT Services personnel at the various medical centers be given access to the central property database and be furnished with hand scanners so they can electronically update the property control records, as appropriate, during installation, repair, replacement, and relocation or disposal of IT equipment; Status: Partially implemented. 8. Require physical security personnel to perform inspections of buildings and storage facilities to identify informal and undesignated IT storage locations so that security assessments are performed and corrective actions are implemented, where appropriate; Status: Fully implemented. 2007 GAO recommendations: Recommendations for the CIO: 9. Establish a formal policy requiring a review of the results of annual inventories to ensure that IT equipment inventory records are properly updated and no blank fields remain; Status: Fully implemented. 10. Establish a process for reviewing Reports of Survey for lost, missing, and stolen IT equipment items to identify systemic weaknesses for appropriate corrective action; Status: Open. 11. Establish and implement a policy requiring information resource management personnel and IT coordinators to inform physical security officers of the site of all IT equipment storage locations so that these store rooms can be subjected to required inspections; Status: Fully implemented. 12. Establish and implement a policy for reviewing the results of physical security inspections of IT equipment storerooms and ensure that needed corrective actions are completed; Status: Fully implemented. 2007 GAO recommendations: 2004 GAO recommendations related to personal property and equipment: 1. Clarify existing guidance and establish consistent parameters for personal property that is required to be accounted for in the property control records and that is subject to physical inventory to include sensitive property; Status: Fully implemented. 2. Provide a more comprehensive list of the type of personal property assets that are considered sensitive for accountability purposes; Status: Fully implemented. 3. Direct that physical inventories of personal property be performed by the Acquisition and Materiel Management staff or other parties who are independent of those with property custodian responsibilities; Status: Partially implemented. 4. Reinforce VA's requirement to attach bar code labels to agency personal property; Status: Fully implemented. 5. At the six VA medical centers we visited, determine the location or disposition of personal property items not found during our site visits; Status: Fully implemented. 6. At the six VA medical centers we visited, review property records to identify and correct erroneous or incomplete data fields; Status: Open. Source: GAO interviews of agency officials and analysis of VA documentation. [End of table] VA's 2007 Physical Inventory Effort Demonstrated Continuing Problems with Controls over IT Equipment: VA's 2007 departmentwide inventory initially identified approximately 79,000 missing IT equipment items, underscoring the need to effectively implement the new policies and procedures mandated on July 3, 2008. In the 6 months following completion of the physical inventory, VA facilities undertook efforts to locate or determine reasons for missing items. VA was able to locate several thousand of the missing equipment items. However, as summarized in table 3, on May 15, 2008, OIT reported that VA was unable to locate approximately 62,800 recorded IT equipment items, of which over 9,800 could have stored sensitive information. Because VA does not know what, if any, sensitive information resided on the equipment and when the equipment was lost, notifications to potentially affected individuals could not be made in accordance with OMB guidance.[Footnote 25] We interviewed VA officials and obtained documentation on the VA-wide inventory; however, we did not validate the results. According to VA, many of the missing items were old equipment and may have been disposed of through VA's excess property program. However, because VA facilities had not always documented IT equipment disposal for many years, there was no way to determine whether any of the missing items were lost or stolen. Further, during our work, we discovered that not all IT equipment items were included in the departmentwide inventory. Consequently, the numbers of missing items could be higher. For example, VA's 2007 physical inventory did not include medical equipment with data storage or processing capabilities. In addition, IT equipment items not accounted for in the OIT equipment inventory listing (EIL) were not subject to the 2007 physical inventory at some VA facilities. Further, limited completeness tests we performed as part of our data reliability procedures at case study locations identified some IT equipment items recorded to EILs for organizations other than OIT. Prior to the establishment of OIT, EILs were aligned organizationally and some IT equipment assigned to other EILs had not yet been reassigned to the OIT EIL and, therefore, were omitted from the 2007 physical inventory. We discussed our finding with OIT officials, and they told us that they had met in June 2008 to develop strategies for moving all IT equipment items assigned to other EILs to the OIT EIL. Table 3: Summary of VA-Wide Fiscal Year 2007 IT Equipment Physical Inventory Results as of May 15, 2008: VA location: Region 1; (VISNs 18 - 22); Total missing items: 10,004; Open Reports of Survey items that could have stored sensitive data: 1,429; Types of missing items on open Reports of Survey that could have stored sensitive data: Desktop computers: 1,207; Types of missing items on open Reports of Survey that could have stored sensitive data: Main frame systems: 0; Types of missing items on open Reports of Survey that could have stored sensitive data: Laptop computers: 153; Types of missing items on open Reports of Survey that could have stored sensitive data: Personal digital assistants: 4; Types of missing items on open Reports of Survey that could have stored sensitive data: Other: 65. VA location: Region 2; (VISNs 12, 15-17, and 23); Total missing items: 18,966; Open Reports of Survey items that could have stored sensitive data: 3,089; Types of missing items on open Reports of Survey that could have stored sensitive data: Desktop computers: 2,899; Types of missing items on open Reports of Survey that could have stored sensitive data: Main frame systems: 20; Types of missing items on open Reports of Survey that could have stored sensitive data: Laptop computers: 140; Types of missing items on open Reports of Survey that could have stored sensitive data: Personal digital assistants: 3; Types of missing items on open Reports of Survey that could have stored sensitive data: Other: 27. VA location: Region 3; (VISNs 6 - 11); Total missing items: 18,623; Open Reports of Survey items that could have stored sensitive data: 2,736; Types of missing items on open Reports of Survey that could have stored sensitive data: Desktop computers: 2,038; Types of missing items on open Reports of Survey that could have stored sensitive data: Main frame systems: 72; Types of missing items on open Reports of Survey that could have stored sensitive data: Laptop computers: 593; Types of missing items on open Reports of Survey that could have stored sensitive data: Personal digital assistants: 22; Types of missing items on open Reports of Survey that could have stored sensitive data: Other: 11. VA location: Region 4; (VISNs 1 - 5); Total missing items: 13,475; Open Reports of Survey items that could have stored sensitive data: 2,037; Types of missing items on open Reports of Survey that could have stored sensitive data: Desktop computers: 1,688; Types of missing items on open Reports of Survey that could have stored sensitive data: Main frame systems: 12; Types of missing items on open Reports of Survey that could have stored sensitive data: Laptop computers: 281; Types of missing items on open Reports of Survey that could have stored sensitive data: Personal digital assistants: 22; Types of missing items on open Reports of Survey that could have stored sensitive data: Other: 43. VA location: Veterans Benefits Administration; Total missing items: 8; Open Reports of Survey items that could have stored sensitive data: 4; Types of missing items on open Reports of Survey that could have stored sensitive data: Desktop computers: 4; Types of missing items on open Reports of Survey that could have stored sensitive data: Main frame systems: 0; Types of missing items on open Reports of Survey that could have stored sensitive data: Laptop computers: 0; Types of missing items on open Reports of Survey that could have stored sensitive data: Personal digital assistants: 0; Types of missing items on open Reports of Survey that could have stored sensitive data: Other: 0. VA location: Field Program Offices; Total missing items: 490; Open Reports of Survey items that could have stored sensitive data: 1; Types of missing items on open Reports of Survey that could have stored sensitive data: Desktop computers: 0; Types of missing items on open Reports of Survey that could have stored sensitive data: Main frame systems: 0; Types of missing items on open Reports of Survey that could have stored sensitive data: Laptop computers: 0; Types of missing items on open Reports of Survey that could have stored sensitive data: Personal digital assistants: 0; Types of missing items on open Reports of Survey that could have stored sensitive data: Other: 1. VA location: VA Headquarters Organizations; Total missing items: 1,314; Open Reports of Survey items that could have stored sensitive data: 570; Types of missing items on open Reports of Survey that could have stored sensitive data: Desktop computers: 157; Types of missing items on open Reports of Survey that could have stored sensitive data: Main frame systems: 0; Types of missing items on open Reports of Survey that could have stored sensitive data: Laptop computers: 197; Types of missing items on open Reports of Survey that could have stored sensitive data: Personal digital assistants: 119; Types of missing items on open Reports of Survey that could have stored sensitive data: Other: 97. VA location: Total; Total missing items: 62,880; Open Reports of Survey items that could have stored sensitive data: 9,866; Types of missing items on open Reports of Survey that could have stored sensitive data: Desktop computers: 7,993; Types of missing items on open Reports of Survey that could have stored sensitive data: Main frame systems: 104; Types of missing items on open Reports of Survey that could have stored sensitive data: Laptop computers: 1,364; Types of missing items on open Reports of Survey that could have stored sensitive data: Personal digital assistants: 170; Types of missing items on open Reports of Survey that could have stored sensitive data: Other: 244. Source: VA OIT data. Notes: According to VA officials, the "main frame systems" category refers to mini computers (a largely obsolete term for a class of multi user, middle range computers). The "other" category includes thumb drives (small, lightweight, removable data storage devices) and servers. VA officials also stated that the mathematical differences for Region 4 data may be due to minor reporting variations. [End of table] In compliance with VA Handbook 7125, General Procedures, VA personnel submitted Reports of Survey for IT equipment items that were not located during the departmentwide physical inventory and subsequent follow-up investigation. A CIO tiger team was responsible for monitoring the Report of Survey process and helping to ensure that it was completed in a timely manner. Local Boards of Survey were responsible for investigating missing items and approving write-offs of IT equipment items that could not be located during the departmentwide physical inventory. However, as of May 15, 2008, VA had over 43,000 items that were listed on open Reports of Survey and facility personnel were continuing to search for missing items. The 2007 physical inventories were a massive undertaking and required significant effort over several months to resolve discrepancies. Although we would have expected the VA locations that we previously tested to have few, if any, missing items, as of May 15, 2008, 6 of the 12 locations reported from 1,269 to 6,427 missing IT items; 4 locations had from 115 to 863 missing IT items; and only 2 locations had fewer than 100 missing items. A summary of Reports of Survey data on missing IT equipment and the reported original acquisition cost identified in VA's 2007 physical inventory related to sites we tested in our 2004, 2007, and 2008 audits are presented in appendix IV. Tests of IT Inventory Controls at Case Study Locations Identified Continuing Weaknesses: Our tests of IT equipment inventory controls at four case study locations, including three VA HCS and VA headquarters, identified continuing control weaknesses related to missing items, lack of accountability, and errors in IT equipment inventory records. VA's 2007 departmentwide physical inventory effort was intended to establish a reliable IT equipment inventory baseline going forward. Accordingly, our tests excluded from the population of IT equipment thousands of items identified as missing during VA's 2007 IT physical inventory effort. Given the new baseline, if adequate controls had been in place by the end of this inventory process, we would not have expected to identify missing items, blank data fields, or inaccurate inventory records at our test locations. As previously noted, in July 2008 VA mandated early implementation of revised policy related to control of IT equipment. Although the early implementation of July 2008 policy changes may address IT equipment control weaknesses, this policy was not in effect at the time of our tests. Our Standards for Internal Control in the Federal Government[Footnote 26] states that a positive control environment provides discipline and structure as well as the climate that influences the quality of internal control. Further, these standards require agencies to establish physical control to secure and safeguard vulnerable assets, such as equipment that might be vulnerable to risk of loss or unauthorized use, including periodically counting the assets and comparing the results to control records. However, our tests of IT equipment inventory controls at the four case study locations, including three VA HCS and VA headquarters, identified continuing problems with (1) inventory control and accountability, (2) control over computer hard drives in the excess property disposal process, and (3) physical security of IT equipment storage locations. For example, our statistical tests at the four locations from February through May of 2008 identified significant numbers of missing items, several of which could have stored sensitive personal and medical information. Overall, our statistical tests and data analysis at the four locations found significant failures related to IT inventory control and accountability including (1) missing items, (2) blank serial numbers, (3) inaccurate information on user organization, (4) inaccurate information on user location, and (5) other recordkeeping errors. We also identified weaknesses in the controls over computer hard drives in the property disposal process at the four test locations, involving (1) lack of timely sanitization and disposal, (2) inadequate recordkeeping, and (3) physical security. In addition, we found physical security weaknesses at IT storage facilities at all four locations. These weaknesses increase the risk that sensitive personal and medical information could be compromised. GAO's IT Inventory Control Tests Found Continuing Problems: Our 2008 statistical tests of key IT equipment inventory controls and data analysis found significant inventory control failures related to (1) missing items, (2) blank serial numbers, (3) inaccurate information on user organization, (4) inaccurate information on user location, and (5) other recordkeeping errors. As noted previously, VA performed a 2007 physical inventory of IT equipment. We excluded from our populations the missing items identified during VA's physical inventory at the four case study locations. Table 4 shows the 2007 VA-wide inventory results related to missing items at our four case study locations. Table 4: Numbers of Missing IT Equipment Items at Four Test Locations That Were Identified during the 2007 VA-Wide IT Physical Inventory: Inventory results: Date of VA inventory[A]; North Texas HCS: December 2007; Puget Sound HCS: December 2007; Boston HCS: December 2007; VA headquarters: January 2008. Inventory results: Missing items as of December 31, 2007; North Texas HCS: 5,309; Puget Sound HCS: 1,383; Boston HCS: 3,663; VA headquarters: 1,595. Inventory results: Missing items located as of May 15, 2008; North Texas HCS: 1; Puget Sound HCS: 114; Boston HCS: 437; VA headquarters: 281. Inventory results: Missing items not located as of May 15, 2008; North Texas HCS: 5,308; Puget Sound HCS: 1,269; Boston HCS: 3,226; VA headquarters: 1,314. Inventory results: Missing items as of May 15, 2008, that could have stored sensitive information; North Texas HCS: 3,351; Puget Sound HCS: 443; Boston HCS: 725; VA headquarters: 608. Source: GAO analysis of VA 2007 inventory results at four case study locations. [A] The dates of the VA inventories are completion dates. [End of table] Given our exclusions of missing items from the VA inventories, if adequate controls had been in place by the end of this inventory process, we would not have expected to identify missing items, blank data fields, or inaccurate inventory records at our test locations. Table 5 shows the results of our statistical tests at the four case study locations. We present our results as point estimates of control failure rates. Each point estimate has a margin of error, based on a two-sided, 95 percent confidence interval, of plus or minus 10 percent or less. Table 5: Estimated IT Equipment Inventory Control Failure Rates at Four Test Locations: Control failures: Missing items in sample; North Texas HCS: 6%; Boston HCS: 3%; Puget Sound HCS: 1%; VA headquarters: 12%. Control failures: Blank serial numbers (actual); North Texas HCS: 59%; Boston HCS: 17%; Puget Sound HCS: 1%; VA headquarters: 1%. Control failures: Incorrect user organization; North Texas HCS: 91%; Boston HCS: 60%; Puget Sound HCS: 76%; VA headquarters: 12%. Control failures: Incorrect user location; North Texas HCS: 46%; Boston HCS: 17%; Puget Sound HCS: 14%; VA headquarters: 33%. Control failures: Recordkeeping errors; North Texas HCS: 9%; Boston HCS: 41%; Puget Sound HCS: 9%; VA headquarters: 4%. Source: GAO analysis of statistical test results. Notes: The blank serial number failure rate represents the actual blank data field in the population of recorded IT equipment items in each location's property system. Each of the other estimates is based on our statistical tests, which have a margin of error based on a two-sided, 95 percent confidence internal of +/-10 percent or less. The details of our statistical testing are explained in appendix I. Because the four test locations did not record all IT equipment items in their inventory records, our estimated failure rates relate to current (recorded) inventory in the OIT EIL and not the population of all IT equipment at those locations. [End of table] Serial number control is essential to accountability for sensitive items, such as IT equipment, because it identifies unique items. The property bar code label alone is not a sufficient identifier for sensitive items because these labels are removable and can be replaced, if lost or damaged. In addition, because VA has not yet put in place a control for user-level accountability, accurate information on user organization and user location is key to maintaining accountability for IT equipment items. Further, recordkeeping errors impair the reliability of IT inventory information for management decision making. For example, inaccurate inventory records on item name, model number, and manufacturer impair asset visibility and affect decision making on timing of IT equipment upgrades. As discussed previously, limited completeness testing performed as part of our data reliability procedures identified IT equipment that was not included in the populations of recorded IT equipment used for our control tests. For example, our completeness tests at two of the four locations we tested identified three IT equipment items that were recorded to EILs for Psychology, Radiology, and Acquisition and Material Management rather than the OIT EIL. Our completeness tests also identified one item not recorded to an EIL. VA officials could not tell us the quantity of IT equipment items that were not included in the four case study IT equipment populations from which we selected our samples for testing. GAO Tests Identified Significant Numbers of Missing IT Equipment Items: Our tests of physical inventory controls from February through May of 2008 identified 50 missing IT equipment items, including 9 medical equipment items. Of the 50 missing items, 34 items could have stored sensitive personal and medical information. Because VA does not know what, if any, sensitive information resided on the equipment, notifications to potentially affected individuals could not be made. Following the recent completion of VA inventories of IT equipment and adjustment of inventory records at the four test locations, we would not have expected to identify any additional missing items. The continuing occurrences of missing items indicate that underlying control weaknesses have not yet been corrected. Lost and missing IT equipment pose both a financial risk as well as a security risk associated with sensitive information maintained on computer hard drives. The scope of our IT equipment inventory tests was broader than VA's IT inventory because we included medical items with data storage capability. Medical equipment with data storage capability is not currently included in VA's definition of IT equipment. VA CIO officials told us they are aware of the need to control medical equipment with data storage capability and plan to address control of IT components of this equipment. The following discussion summarizes the results of our inventory control tests at the four case study locations. * North Texas HCS. As noted in table 5, our physical inventory testing of the North Texas HCS--which covered the Dallas VA Medical Center and Fort Worth Outpatient Clinic components--found high control failure rates for all of our inventory control tests. Our existence test identified seven missing items, including two that had the capability to store sensitive information. One of the missing items was a piece of medical equipment. As noted in table 5, we estimated a 6 percent failure rate related to the missing items in the recorded population of 12,172 IT equipment items from which we selected our sample. In addition, our analysis of the population of recorded IT equipment found that 7,164, or about 59 percent, did not have their serial numbers recorded in the physical inventory records. Serial numbers are essential to proper identification of sensitive computer equipment. * Boston HCS. Our physical inventory testing of the Boston HCS--which covered the Brockton, Jamaica Plain, and West Roxbury Campuses-- identified 10 missing items, including 7 that had the capability to store sensitive information. The 7 missing items included four medical analyzers, two microcomputers, and a radiology equipment item. As noted in table 5, we estimated a 3 percent failure rate related to the missing items in the recorded population of 15,706 IT equipment items from which we selected our sample. * Puget Sound HCS. The Puget Sound HCS had an estimated failure rate of 1 percent related to missing items in the recorded population of 11,474 IT equipment items, allowing us to conclude that the HCS's controls over existence of IT equipment inventory are effective. Further, the one item we determined to be missing related to a computer monitor which did not have the capability to store data. However, the Puget Sound HCS had high failure rates for the user information and recordkeeping tests. * VA Headquarters Organizations. Our physical inventory testing of VA headquarters organizations IT equipment items identified an estimated failure rate of 12 percent related to missing items in the recorded population of 34,735 items. Our population included strata for VHA, VBA, OIT, Acquisition and Materiel Management, General Counsel, Policy and Planning, and a seventh strata with all other headquarters organizations. Table 6 identifies missing IT equipment items in our stratified sample by VA headquarters organization. Table 6: Number of Missing IT Equipment Items by Headquarters Organization and Missing Items That Could Have Stored Sensitive Personal Data: Test location: Acquisition and Material Management; Number of missing IT items in stratified sample: 0 of 10; Missing items with data storage capability: 0. Test location: General Counsel; Number of missing IT items in stratified sample: 0 of 10; Missing items with data storage capability: 0. Test location: Information and Technology; Number of missing IT items in stratified sample: 21 of 96; Missing items with data storage capability: 17 of 21. Test location: Policy and Planning; Number of missing IT items in stratified sample: 0 of 10; Missing items with data storage capability: 0. Test location: Veterans Health Administration; Number of missing IT items in stratified sample: 6 of 95; Missing items with data storage capability: 5 of 6. Test location: Veterans Benefits Administration; Number of missing IT items in stratified sample: 2 of 94; Missing items with data storage capability: 1 of 2. Test location: All other[A]; Number of missing IT items in stratified sample: 3 of 34; Missing items with data storage capability: 2 of 3. Source: GAO analysis of statistical test results. [A] All other includes 13 additional VA headquarters organizations. The missing items are from the Construction & Facilities Management Office, the Human Resource Management Office, and the Resolution Management Office. The missing items with data storage capability are from the Human Resource Management Office and the Resolution Management Office. [End of table] Lack of User-Level Accountability for IT Equipment at Case Study Locations: As was the case with our 2007 audit of VA IT equipment inventory controls, we found a lack of user-level accountability at the four case study locations in our current tests. As shown in table 7, VA has not yet assured accurate IT inventory records with regard to user organization and location. Information on organization and location are key to maintaining visibility and accountability for IT equipment items. VA property management policy[Footnote 27] and VA Handbook 7002 include guidelines for holding employees and supervisors pecuniarily (financially) liable for loss, damage, or destruction because of negligence or misuse of government property. Several VA facilities have provided us with current examples where VA employees have been held liable for lost and missing IT equipment. Since the completion of our tests, VA has mandated early implementation of Handbook 7002 which also requires assignment of user-level accountability for most IT equipment items. To be effective, the new policy will need to be adequately implemented and enforced. Table 7: Estimated IT Inventory Control Failure Rates Related to Correct User and Location at the Four Test Locations: Test location: North Texas HCS; Incorrect user organization: 91%; (85% to 95%); Incorrect user location: 46%; (36% to 56%). Test location: Boston HCS; Incorrect user organization: 60%; (50% to 70%); Incorrect user location: 17%; (10% to 25%). Test location: Puget Sound HCS; Incorrect user organization: 76%; (66% to 84%); Incorrect user location: 14%; (8% to 22%). Test location: VA headquarters organizations; Incorrect user organization: 12%; (8% to 17%); Incorrect user location: 33%; (26% to 40%). Source: GAO analysis of statistical test results. Note: The percentages represent point estimates and the two-sided, 95 percent confidence intervals. [End of table] The following discussion summarizes the results of our tests for user- level accountability. * North Texas HCS. The North Texas HCS components we tested had very high failure rates related to accountability--an estimated 91 percent for correct user organization and an estimated 46 percent for correct user location. North Texas HCS staff provided us with evidence of sign- out sheets and hand receipts for some IT equipment items such as pagers, cellular telephones, and personal digital assistants. However, for a majority of IT equipment items, the North Texas HCS did not assign user-level accountability through hand receipts or record user information in the inventory system. For medical IT equipment items, the inventory system included user organizations (e.g., radiology or anesthesiology), but did not assign the items to unit heads. * Boston HCS. The Boston HCS campuses we tested also had high failure rates related to accountability--an estimated 60 percent for correct user organization and an estimated 17 percent for correct user location. At our exit briefing in May 2008, Boston HCS staff reported that they are working with engineering personnel to better identify physical locations to aid in the tracking of mobile IT equipment items. For traditional IT equipment items, the Boston HCS generally did not record user organization in its IT equipment inventory records. Further, the Boston HCS generally did not assign user-level accountability through recorded user information or hand-receipts with the exception of pagers, cell phones, and laptops that have been assigned to specific users. For medical IT equipment items, the inventory system included user organizations (e.g., radiology or anesthesiology). However, the inventory records for some of the equipment listed the user as "Medical" or "Nursing" and did not specify what unit in the hospital was accountable for the equipment. * Puget Sound HCS. The Puget Sound HCS components we tested also had high failure rates related to accountability--an estimated 76 percent for correct user organization and an estimated 14 percent for correct user location. The Puget Sound HCS staff provided us with evidence of a locally developed supplemental application for AEMS/MERS, known as the Equipment Loan Form (ELF). Puget Sound HCS staff use the ELF to record user-level information for mobile IT equipment items (e.g., laptop computers) or IT equipment items taken off-site (e.g., a desktop computer at an employee's home). However, for traditional IT equipment items (e.g., desktop computers, printers, and monitors at HCS facilities), the HCS did not assign user-level accountability with recorded user information or hand-receipts. For traditional IT equipment items, the inventory records generally did not identify the user organizations. For medical IT equipment items, the inventory system included user organizations (e.g., radiology or anesthesiology), but did not assign accountability for shared items to unit heads. * VA Headquarters Organizations. Our statistical tests for accurate user organization information identified an estimated 12 percent error rate for VA headquarters organizations. In addition, our statistical tests for correct user information identified an estimated 52 percent error rate. Out tests included IT equipment coordinators--who are responsible for control of equipment shared by multiple users--and individual user employees. In situations where equipment, such as a printer, was shared by multiple employees, we based our tests on whether the inventory records correctly listed the equipment coordinator. In other situations where equipment was in possession and use by an individual employee, we tested to see if that employee was listed in the property record. Overall, we found 147 errors out of a sample of 349 records tested. Regarding user location, our statistical tests found an estimated 33 percent error rate related to situations where inventory records were not updated to reflect the transfer or relocation of IT equipment. We also identified inconsistencies in the use of hand receipts for assigning user-level accountability of mobile IT equipment that can be removed from VA offices for use by employees who are on travel or are working at home. For example, we requested hand receipts for 38 mobile IT equipment items in our statistical sample that were being used by VA headquarters employees. These items either could be or were taken off- site. We received 20 hand receipts--4 that were dated after the date of our request and 16 that were valid. We did not receive hand receipts for the other 18 devices. Recordkeeping Errors in IT Equipment Inventory Status and Item Description Information: As shown in table 8, we found some problems with the accuracy of IT equipment inventory records, ranging from an estimated 4 percent at VA headquarters to an estimated 41 percent at the Boston HCS. Recordkeeping errors included inaccurate information on the status (in use, turned-in, disposal), serial numbers, and item descriptions. Although the estimated overall failure rates for these tests were lower than the failure rates for the other control attributes we tested, they were significant for the various recordkeeping attributes we tested at the four locations. Table 8: Estimated Percentages of Other IT Inventory Recordkeeping Failures at Four Test Locations: Test location: North Texas HCS; Inventory status: 2%; (0% to 7%); Serial number: 1%; (0% to 6%); Item description: 6%; (3% to 12%); Total recordkeeping failures: 9%; (5% to 16%). Test location: Boston HCS; Inventory status: 8%; (4% to 16%); Serial number: 15%; (8% to 24%); Item description: 26%; (17% to 36%); Total recordkeeping failures: 41%; (32% to 51%). Test location: Puget Sound HCS; Inventory status: 1%; (0% to 6%); Serial number: 3%; (1% to 9%); Item description: 5%; (2% to 12%); Total recordkeeping failures: 9%; (4% to 16%). Test location: VA headquarters organizations; Inventory status: 0%; (0% to 2%); Serial number: 1%; (0% to 3%); Item description: 3%; (1% to 7%); Total recordkeeping failures: 4%; (1% to 7%). Source: GAO analysis of statistical test results. Notes: The percentages represent point estimates and the two-sided, 95 percent confidence intervals. Inventory status includes items in use, turned-in, and disposed. The item description includes name, model number, and manufacturer. [End of table] Accurate IT equipment inventory records are important to management decision making because these records are used to determine the types, quantities, and age of equipment as well as life cycle and replacement time frames. Inaccurate information on the status of items--in service, sent for repair, turned in for disposal--masks visibility of items that are not available for use and may need to be replaced. Serial number errors, such as typographical errors, can impair accountability. Further, inaccurate inventory information can cause significant waste and inefficiency during physical inventories because it may require additional time to locate and verify the status of the items. Our review of the data submissions from all four test locations we visited identified data consistency and standardization issues with recorded names, models, and manufacturers of IT equipment. As a result, management at facilities we tested could not tell how many items of a certain model they had in service. Because property system data fields for item description are free-form and do not provide for data standardization, accurate data entry is critical to the identification of like items. For example, North Texas HCS inventory data showed one Solar 8000 physiological monitor listed as model "soalr 8000," one listed as "Solar 800," 26 listed as "Solar 8000," and 70 listed as "Solar8000." Although some of these differences appear to be typographical errors, when searching for Solar 8000 equipment in the database, there is no assurance that other variations of the item name would appear in the search results. Further, this situation hindered the North Texas HCS staff's identification of medical IT equipment items that store or process patient data, requiring us to select a second sample and make an additional site visit. At the Boston HCS, we found that Samsung monitor model number 150N was referred to inconsistently as a "Monitor" 4 times, "Neoware" 3 times, "Samsung 15 Inch" 33 times, and a "Samsung Monitor" 58 times. VA's policy does not address data consistency and standardization. Our Internal Control Management and Evaluation Tool[Footnote 28] states that an agency should: * establish a variety of control activities suited to information processing systems to ensure accuracy and completeness, * consider whether edit checks are used in controlling data entry, and: * consider accuracy control in relation to data entry design features. Although this tool is not required to be used, it is intended to provide a systematic, organized, and structured approach for federal agency use in assessing internal control structure. The failure to maintain consistent information on identical items or classes of items impairs visibility over IT assets as well as analysis and management decision making on existing IT equipment and replacements. Weaknesses in Controls over Hard Drives in the Disposal Process: Although VA requires that hard drives of IT equipment and medical equipment be sanitized prior to disposal to prevent unauthorized release of sensitive personal and medical information, we found weaknesses in the disposal process at each of our test locations that pose a risk that sensitive personal and medical information could be compromised.[Footnote 29] Specifically, we found weaknesses related to (1) timeliness of data sanitization, (2) adequacy of inventory recordkeeping for hard drives removed from their host computers, and (3) physical security controls. Currently, VA OIT personnel are not cleansing all hard drives in the property disposal process because of the guidance from VA's Office of General Counsel to preserve electronic information relevant to a class action lawsuit filed against VA in 2007 (the litigation hold),[Footnote 30] which heightens the need to maintain control over the hard drives in the property disposal process. However, two case study locations had not performed timely sanitization and disposal of hard drives prior to the effective date of the litigation hold. Specifically, one of our HCS test locations had stored excess hard drives for 3 to 4 years and another HCS test location indicated some of its excess hard drives dated back to the 1980s. Two HCS locations did not record dates that all hard drives were received. VA headquarters organizations did not keep records on hard drives in the disposal process prior to February 2008. In addition, adequate control over computer hard drives in the property disposal process requires accurate and complete recordkeeping, such as recording the hard drive serial number along with property identification and serial numbers of the original host computer. The ability to identify hard drives with the host computer inventory records also provides a means to determine the type of data that may have been stored on the hard drives. However, two of our four test locations did not record sufficient information to identify hard drives with host computers, and VA did not have a standard procedure to address this issue. Moreover, although storage locations used for excess hard drives are subject to access controls in VA Handbook 0730/1, Security and Law Enforcement, including motion detection intrusion alarm systems and special key (access) controls, three of our four case study locations did not comply with these requirements. Weaknesses in the controls over hard drives in the property disposal process create an unnecessary risk that sensitive personal information protected under the Privacy Act of 1974 [Footnote 31] and health information accorded additional protections under the Health Insurance Portability and Accountability Act of 1996 (HIPAA)[Footnote 32] could be compromised. The following discussion summarizes our findings at the four case study locations. * North Texas HCS. We found that the North Texas HCS had weaknesses in controls over hard drives in the property disposal process related to timely sanitization, inadequate recordkeeping, and lack of access controls. According to North Texas HCS staff, they were not sanitizing data from any hard drives in the property disposal process at the time of our site visit because of the litigation hold related to the class action lawsuit. The North Texas HCS also indicated that not all hard drives received for sanitization and disposal had been logged in their tracking system. However, for those drives that were recorded, we found that the hard drive disposal records contained sufficient information for identifying hard drives with their original host computers. In addition, the disposal records contained the dates on which the hard drives were removed from their original host computers. The North Texas HCS also maintained a file on certifications of drives that had been cleansed. Further, we observed that one of the two storage locations storing hard drives had inadequate physical security because of the absence of an access control system and intrusion detection alarm system, as required by VA Handbook 0730/1. * Boston HCS. Our work identified recordkeeping weaknesses in the hard drive disposal process at the Boston HCS. Specifically, we found that the hard drive disposal records did not contain sufficient information for identifying hard drives with their original host computers. Further, these records did not indicate the dates on which OIT personnel removed hard drives from their original host computers, which would impede an assessment of timely sanitization or disposal. The Boston HCS also had a practice of storing used hard drives in unsecured locations, such as closets and cabinets, and indicated that it had hard drives dating back to the 1980's. The Boston HCS Information Security Officer is in the process of establishing a centralized storage facility for computer hard drives. * Puget Sound HCS. We identified control weaknesses in the hard drive disposal process at the Puget Sound HCS related to a lack of timely sanitization and disposal and inadequate recordkeeping. Although Puget Sound HCS officials are holding drives because of the litigation hold related to the class action lawsuit, they told us that approximately 100 of the hard drives we observed had been in storage for approximately 3 or 4 years, and therefore are not related to the litigation hold. In addition, the hard drive disposal records at the Puget Sound HCS did not contain sufficient information for identifying hard drives with their original host computers. After our site visit, Puget Sound HCS staff provided us with revised hard drive records that include property identification numbers and hard drive serial numbers and identify hard drives with their original host computers. The Puget Sound HCS stored hard drives in a location that was in full compliance with physical security requirements in VA Handbook 0730/1. * VA Headquarters Organizations. Weaknesses we identified in controls involved the lack of recordkeeping prior to February 2008 and the lack of access controls of hard drive storage facilities. We found that the current hard drive disposal records at VA headquarters contain sufficient information for identifying hard drives with their original host computers. Specifically, OIT records hard drive information in a log that requires, among other elements, the bar code and serial numbers of the original host computer from which OIT personnel removed the hard drive and the serial number of the hard drive. OIT also records the dates on which hard drives are removed from original host computers. However, according to OIT officials and our review of the hard drive records, VA headquarters did not maintain a central record of hard drives prior to February 2008. Further, one of the two hard drive storage locations that we observed at VA headquarters had inadequate physical security because of the absence of an access control system and intrusion detection alarm system, as required by VA Handbook 0730/1. Physical Security Weaknesses Increase Risk of Loss, Theft, and Misappropriation: VA Handbook 0730/1, Security and Law Enforcement, prescribes physical security requirements for storage of new and used IT equipment. Specifically, the handbook requires warehouse-type storerooms to have walls to ceiling height with either masonry or gypsum wall board reaching the underside of the slab (floor) above. OIT storerooms are required to have overhead barricades that prevent "up and over" access from adjacent rooms. Warehouse, OIT, and medical equipment storerooms are all required to have motion intrusion detection alarm systems that detect entry and broadcast an alarm of sufficient volume to cause an illegal entrant to abandon a burglary attempt. Finally, OIT storerooms also are required to have special key control, meaning room door lock keys and day lock combinations that are not master keyed for use by others. Our investigator's inspection of physical security at officially designated IT warehouses and storerooms that held new and used IT equipment at the four case study locations found that most of these storage facilities met the requirements in VA Handbook 0730/1. However, we identified some deficiencies. For example, our investigator found at least one room at all four case study locations that did not have an electronic access control system or an intrusion detection system. Designated IT equipment storage locations at the Seattle Division of the Puget Sound HCS met the physical security requirements in VA Handbook 0730/1. However, IT workrooms and other informal, undesignated storage facilities did not. Despite the established physical security requirements, we found numerous informal, undesignated IT equipment storage locations that did not meet VA physical security requirements. For example, we observed an excess property storage room at the North Texas HCS that contained boxes of 86 hard drives that needed to be disposed of or sanitized. This room lacked a motion detection alarm system and the type of locking system prescribed in VA policy. North Texas HCS staff believed this room was not subject to the security provisions of VA Handbook 0730/1 because it was not formally designated as a storeroom or warehouse. Our investigator also identified an IT equipment work room at the North Texas HCS that lacked adequate physical security measures and was considered temporary in nature. In addition, at the Boston HCS, our investigator found that security personnel were unaware of several temporary storage rooms that contained IT equipment. Some of these rooms were initially established by OIT personnel as temporary storage areas, but had been in use for several years. Because these storerooms had not been formally designated as IT storage facilities, they were not subjected to required physical security inspections. Weaknesses in physical security heighten the risk that sensitive information contained on IT equipment stored in unsecured warehouses and storerooms could be compromised. Conclusions: Our audits and VA's departmentwide physical inventory of IT equipment identified pervasive control weaknesses that resulted in tens of thousands of missing IT equipment items that were purchased with taxpayer dollars. About 9,800 of these items have data storage capabilities and therefore pose a risk of improper disclosure of veterans' personal and medical information. Further, VA's lack of user- level accountability and its failure to maintain accurate and complete IT inventory records have hindered efforts to locate missing items. In the past year, VA has made significant progress in implementing its realigned OIT organization and strengthening policies for control over IT equipment. However, ensuring that IT inventory records are complete and that they are updated as changes in status occur will be key to maintaining accuracy and accountability over IT equipment items. VA's continued efforts to establish and maintain control over IT assets will be essential if VA is to adequately safeguard those assets from theft, loss, and misappropriation and protect sensitive personal and medical information of the nation's veterans. Recommendations for Executive Action: We recommend that the Secretary of Veterans Affairs require the CIO, with the support of medical centers and VA headquarters organizations we tested and other VA organizations, as appropriate, to take the following five actions to improve accountability of IT equipment inventory and reduce the risk of disclosure or compromise of sensitive personal and medical information: * Review property inventory records and confirm that all IT equipment, regardless of the organizational equipment inventory listing, is identified in the property system. * Establish and implement a policy requiring development of standardized naming classifications for IT equipment--including item name, manufacturer, and model--for recording IT equipment into local property inventory systems. * Develop a list of medical equipment with data storage capability that should be considered as IT equipment for inventory control purposes. * Develop a procedure for identifying hard drive serial numbers with both the property identification numbers and serial numbers of host computers. * Revise the definition of IT storage locations in VA's Handbook 0730/ 1, Security and Law Enforcement, to include informal IT storage locations, such as OIT work rooms, and require these locations to be included in physical security inspections. Agency Comments and Our Evaluation: In its July 28, 2008, written comments on our report, which are reprinted in appendix III, VA generally agreed with four of our five recommendations. VA initially disagreed with our recommendation concerning inventory control over medical equipment because it interpreted our recommendation as requiring them to redefine (i.e., reclassify) medical equipment with data storage capability as IT equipment. Instead, our recommendation was directed at developing a list of medical equipment with data storage capability and including this equipment in physical inventories of IT equipment to provide for CIO oversight of these items. We followed up with VA officials to clarify the intent of our recommendation. We also made appropriate changes to our report to clarify the intent of our recommendation. In addition, while agreeing with the intent of our recommendation concerning the development of standard naming classifications for its IT equipment, VA initially commented that it differed with part of our recommendation concerning who should be responsible for the development of standardized naming classifications. However, VA's comments indicate that it interpreted this recommendation as requiring classification action to occur on a decentralized basis at each VA facility. This was not our intent. In follow-up discussions with VA officials, we explained that our recommendation was directed at taking action to establish VA-wide naming conventions that would be used by all VA facilities in recording property information in their local inventory systems. We clarified the wording in our recommendation accordingly. Based on our follow-up meeting, VA officials said they agreed with all five of our recommendations. They reiterated actions noted in VA's comment letter on steps taken as well as planned actions to improve the accuracy and consistency of information in VA's property inventory systems. We are sending copies of this report to interested congressional committees; the Secretary of Veterans Affairs; the Veterans Affairs Chief Information Officer; the Under Secretary of Health, Veterans Health Administration; and the Director of the Office of Management and Budget. We will make copies available to others upon request. In addition, this report will be available at no charge on the GAO Web site at [hyperlink, http://www.gao.gov]. Please contact me at (202) 512-9095 or dalykl@gao.gov, if you of your staff have any questions concerning this report. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Major contributors to this report are acknowledged in appendix V. Signed by: Kay L. Daly: Acting Director: Financial Management and Assurance: [End of section] Appendix I: Objectives, Scope, and Methodology: Given the continuing nature of information technology (IT) equipment inventory control problems and their significance, the Chairman and Ranking Member of the House Committee on Veterans' Affairs, Subcommittee on Oversight and Investigations asked us to perform additional follow-up work to determine (1) whether the Department of Veterans Affairs (VA) has made progress in implementing our prior recommendations for improving internal control over IT equipment and (2) the effectiveness of VA's current internal controls to prevent theft, loss, or misappropriation of IT equipment. We evaluated VA's progress in implementing our previously reported recommendations by reviewing agency documentation and interviewing property management and Office of Information Technology (OIT) officials on actions taken in response to recommendations in our 2007 and 2004 reports.[Footnote 33] In concert with the Subcommittee request that VA perform a departmentwide physical inventory of IT assets, we reviewed the results of VA's 2007 physical inventory of IT equipment items and VA's process for completing Reports of Survey[Footnote 34] on lost and stolen items. We also evaluated policies that include guidance for improving accountability of IT equipment and accuracy of inventory records, related memorandums, and other documentation, such as action summaries. In addition, we interviewed cognizant VA officials about specific actions under way or completed, the component organizations responsible for those actions, and the status and targeted completion dates of those actions. Our assessment of the effectiveness of current VA IT equipment inventory controls included statistical tests of key control attributes at four case study locations, including the health care systems (HCS) in North Texas, Boston, and Puget Sound, and VA headquarters organizations. We also assessed controls over hard drives in the excess property disposal process, and our investigators made physical security inspections of IT storage locations at our four case study locations. We used as our criteria applicable law and VA policy, as well as our Standards for Internal Control in the Federal Government[Footnote 35] and our Internal Control Management and Evaluation Tool.[Footnote 36] We reviewed applicable program guidance provided by the test locations and interviewed officials about their IT inventory processes and controls. In selecting our case study locations, we chose three geographically disparate VA HCS. We also tested inventory at VA headquarters organizations as a means of assessing the overall control environment, or "tone at the top," as we did in our 2007 audit. Table 9 shows the VA locations selected for IT equipment inventory control testing, the sample size, and the reported number and value of IT equipment items at each location. Table 9: Population of VA IT Equipment at Locations Selected for Testing: VA location: North Texas HCS; Sample size and number of VA IT equipment items: 167 of 12,172; Value of VA IT equipment inventory: $49,097,365. VA location: Boston HCS; Sample size and number of VA IT equipment items: 148 of 15,706; Value of VA IT equipment inventory: 48,972,306. VA location: Puget Sound HCS; Sample size and number of VA IT equipment items: 147 of 11,474; Value of VA IT equipment inventory: 33,969,881. VA location: VA headquarters; Sample size and number of VA IT equipment items: 349 of 34,735; Value of VA IT equipment inventory: 48,996,332. Source: GAO analysis of VA facility IT equipment inventory data. Note: The data represent current inventory at the time we selected our samples. The reported value is the original acquisition cost, though not all items in VA's property management systems included original acquisition values. [End of table] We performed appropriate data reliability procedures, including an assessment of each VA test location's procedures for assuring data reliability, reasonableness checks on electronic data, and tests to assure that IT equipment inventory was sufficiently complete for the purposes of our work. As in our 2007 work, we relied on biomedical engineers to provide lists of medical equipment with the ability to store or process electronic data. We performed analytical procedures to confirm reasonableness of the medical equipment listings provided by the three HCS. Our analysis determined that the original listing submitted by the North Texas HCS staff was incomplete regarding medical equipment meeting our definition as IT equipment. We revisited our criteria for identifying medical equipment with data storage and processing capability with North Texas HCS officials and asked them to provide us a new medical equipment listing to support our sampling and control tests. Our procedures and test work also identified a limitation related to the completeness of IT equipment inventory at our four test locations. The VA North Texas and Boston HCS maintained some IT equipment records outside of their central listings of IT equipment. We also identified evidence that the VA Puget Sound and VA headquarters did not record all IT equipment items in the official property records. Further, our statistical tests determined that some IT equipment was recorded in inventory categories other than IT. We disclosed this limitation in the discussion of our test results. As a result of these limitations, the population of IT equipment is not known for VA overall or by location and we were not able to project our test results to the population of IT equipment inventory at each of our four test locations. However, we determined that these data were sufficiently reliable for us to project our test results to the population of current, recorded IT equipment inventory at each of the four locations. From the population of current, recorded IT equipment inventory at the time of our tests,[Footnote 37] we selected stratified random probability samples of IT equipment, including medical equipment with data storage capability, at each of the three HCS locations. For the 19 VA headquarters organizations, we stratified our sample by 6 major offices and used a seventh stratum for the remaining 13 organizations. With these statistically valid samples, each item in the population for the four case study locations had a nonzero probability of being included, and that probability could be computed for any item. Each sample item for a test location was subsequently weighted in our analysis to account statistically for all items in the population for that location, including those that were not selected. We performed tests on statistical samples of IT equipment inventory transactions at each of the four case study locations to assess whether the system of internal control over physical IT equipment inventory was effective (i.e., provided reasonable assurance of the reliability of inventory information and accountability of the individual items). For each IT equipment item in our statistical sample, we assessed whether (1) the item existed (meaning that the item recorded in the inventory records could be located), (2) inventory records and processes provided adequate accountability, and (3) identifying information (property number, serial number, model number, and location) was accurate. We explain the results of our existence tests in terms of control failures related to missing items and recordkeeping errors. The results of our statistical samples are specific to each of the four test locations and cannot be projected to the population of VA IT inventory as a whole. We present the results of our statistical samples for each population as point estimates representing (1) our projection of the estimated error overall for each control attribute and (2) the two-sided, 95 percent confidence intervals for the failure rates. To assess VA's controls over computer hard drives in the property disposal process, at each HCS and VA headquarters we interviewed OIT officials, observed hard drive storage locations, and obtained copies of VA documentation related to hard drives in the disposal process at the time of our site visits. Our investigators supported our tests of IT physical inventory controls by assessing the physical security of various IT equipment storage facilities at each of our four case study locations. As part of our assessment, one of our investigators interviewed VA Police at the three HCS locations and federal agency law enforcement officers at VA headquarters and met with physical security specialists at each of the test locations to discuss the results of our physical security inspections and the status of VA actions on identified weaknesses. We briefed VA managers at our three HCS test locations and VA headquarters, including VA HCS directors and OIT and property management officials, on the details of our audit, our findings, and their implications. On July 15, 2008, we requested comments on a draft of this report. We received comments from the Secretary of Veterans Affairs on July 28, 2008, and we had follow-up discussions with cognizant VA officials. We have summarized VA's comments and our follow- up discussions in the Agency Comments and Our Evaluation section of this report. We conducted this performance audit from January 2008 through July 2008 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. We performed our investigative work in accordance with standards prescribed by the President's Council on Integrity and Efficiency. [End of section] Appendix II: Status of VA Actions on Recommendations in GAO's July 2007 and 2004 Reports: Table 10 lists the 12 recommendations from our 2007 report, summarizes VA's actions, and presents the status of each recommendation. VA property officials from the Office of Acquisition and Logistics (OAL) and officials in the Office of Information and Technology (OIT) worked together to create a new VA Handbook 7002, Logistics Management Procedures, which updates VA policy for property management, including specific policy pertaining to information technology (IT) equipment. The Assistant Secretary for Management mandated early implementation of VA Handbook 7002 on July 3, 2008. Table 10: GAO's 2007 Report Recommendations and Status of VA Actions as of July 2008: 2007 VA-wide recommendations: GAO recommendation: 1. Revise VA property management policy and procedures to include detailed requirements for what transactions must be recorded to document inventory events and to clearly establish individual responsibility for recording all essential transactions in the property management process; VA action on the recommendation: VA mandated early implementation of Handbook 7002, Logistics Management Procedures, which requires the recording of key inventory events, including the recording of IT equipment information upon receipt, changes in item status, and turn-in and disposal; Status of GAO recommendation: Fully implemented. GAO recommendation: 2. Revise VA purchase card policy to require purchase card holders to notify property management officials of IT equipment and other property items acquired with government purchase cards at the time the items are received so that they can be recorded in property management systems; VA action on the recommendation: VA mandated early implementation of VA Handbook 4080, Government Purchase Card Procedures, which requires purchase cardholders to notify the property officer of IT equipment acquired with the purchase card so that these items may be recorded in the property management system. Handbook 7002 includes the same requirement; Status of GAO recommendation: Fully implemented. GAO recommendation: 3. Establish procedures to require specific, individual user-level accountability for IT equipment. In implementing this recommendation, consideration should be given to making the unit head, or a designee, accountable for shared IT equipment; VA action on the recommendation: Handbook 7002 requires employees to sign for IT equipment assigned exclusively for individual use and department heads or service chiefs to sign for shared IT equipment; Status of GAO recommendation: Fully implemented. GAO recommendation: 4. Enforce user-level accountability and IT coordinator responsibility by taking appropriate disciplinary action, including holding employees financially liable, as appropriate, for lost or missing IT equipment; VA action on the recommendation: VA facilities provided several fiscal year 2008 examples of bills sent to VA personnel for lost and damaged IT equipment items; Status of GAO recommendation: Fully implemented. GAO recommendation: 5. Establish specific time frames for finalizing a Report of Survey once an inventory has been completed so that research on missing items is completed expeditiously and does not continue indefinitely without meeting formal reporting requirements; VA action on the recommendation: In May 2008, OAL issued an information letter implementing immediately an overall Report of Survey timeline of 60 days. In addition, Handbook 7002 requires the Report of Survey process to be completed within 60 days; Status of GAO recommendation: Fully implemented. GAO recommendation: 6. Establish a mechanism to monitor adherence by the San Diego and Houston medical centers and other VA organizations, as appropriate, to VA policy for performing annual inventories of sensitive items under $5,000, including IT equipment; VA action on the recommendation: VA established the Office of Information Technology Oversight and Compliance in February 2007, which reviewed compliance with established VA policy. VA also established a tiger team in May 2007, which reviewed the results of the VA-wide 2007 physical inventory of IT equipment; Status of GAO recommendation: Fully implemented. GAO recommendation: 7. Require that information resource management and IT Services personnel at the various medical centers be given access to the central property database and be furnished with scanners so they can electronically update the property control records, as appropriate, during installation, repair, replacement, and relocation or disposal of IT equipment; VA action on the recommendation: VA has granted OIT personnel access to the central property database (AEMS/MERS). Furthermore, VA has begun to furnish OIT employees with hand scanners that may be used to scan equipment during routine maintenance. VA reports that it is currently assessing how many hand scanners various VA facilities need; Status of GAO recommendation: Partially implemented. GAO recommendation: 8. Require physical security personnel to perform inspections of buildings and storage facilities to identify informal and undesignated IT storage locations so that security assessments are performed and corrective actions are implemented, as appropriate; VA action on the recommendation: In September 2007, VA established Handbook 6500, Information Security Program, requiring that the Information Security Officer conduct and document physical security reviews as part of the annual review of the system security plan to help analyze any new or existing physical security vulnerabilities; Status of GAO recommendation: Fully implemented. 2007 Recommendations for the CIO: GAO recommendation: 9. Establish a formal policy requiring a review of the results of annual inventories to ensure that IT equipment inventory records are properly updated and no blank fields remain; VA action on the recommendation: VA Handbook 7002 requires the accountable officer to ensure that property records have been updated correctly at the completion of each physical inventory and that no blank fields remain; Status of GAO recommendation: Fully implemented. GAO recommendation: 10. Establish a process for reviewing Reports of Survey for lost, missing, and stolen IT equipment items to identify systemic weaknesses for appropriate corrective action; VA action on the recommendation: VA's OIT is working with OAL and the Office of Prosthetics and Clinical Logistics to develop an integrated approach for Report of Survey monitoring. OIT's tiger team also is reviewing VA facilities' internal controls for IT equipment and the results of the 2007 physical inventory, which included IT equipment items submitted for Report of Survey processing. However, VA has not yet established a formalized process for reviewing Reports of Survey; Status of GAO recommendation: Open. GAO recommendation: 11. Establish and implement a policy requiring information resource management personnel and IT coordinators to inform physical security officers of the site of all IT equipment storage locations so that these store rooms can be subjected to required inspections; VA action on the recommendation: VA Handbook 7002 requires that facilities' Security Management Committees (SMC) develop local strategic security plans as guides to identify physical and procedural security needs. Handbook 7002 requires the IT custodial officer to provide the facility information security officer a list of all IT storage areas and that access to IT equipment storage areas be provided to facility security personnel for use in performing regular inspections; Status of GAO recommendation: Fully implemented. GAO recommendation: 12. Establish and implement a policy for reviewing the results of physical security inspections of IT equipment storerooms and ensure that needed corrective actions are completed; VA action on the recommendation: VA Handbook 7002 states that the IT custodial officer will coordinate with the SMC to develop a plan to address IT-related security requirements identified in the strategic security plan. The handbook also requires the IT custodial officer to develop a plan to address all corrective actions identified in the Report of Physical Security Inspection of IT Equipment Store Rooms within 10 days of receipt of the report from security personnel; Status of GAO recommendation: Fully implemented. Source: GAO interviews of agency officials and analysis of VA documentation. [End of table] Table 11 lists the 6 property-related recommendations from our 2004 report, summarizes VA's actions, and presents the status of each recommendation. Table 11: GAO's 2004 Report Recommendations and Status of VA Actions as of July 2008: 2004 Property-related recommendations: GAO recommendation: 1. Clarify existing guidance and establish consistent parameters for personal property that is required to be accounted for in the property control records and that is subject to physical inventory to include sensitive property; VA action on the recommendation: In October 2005, VA issued a modification to VA Handbook 7127/4, Materiel Management Procedures, which stated that sensitive items, regardless of cost, should be included in annual equipment inventories. In addition, the guidance provided an expanded list of eight categories of sensitive items; Status of GAO recommendation: Fully implemented. GAO recommendation: 2. Provide a more comprehensive list of the type of personal property assets that are considered sensitive for accountability purposes; VA action on the recommendation: In October 2005, VA issued a modification to VA Handbook 7127/4, Materiel Management Procedures, which provided an expanded list of eight categories of sensitive items, including handheld and portable communication devices, printers, desktop and laptop computers, and video imaging equipment; Status of GAO recommendation: Fully implemented. GAO recommendation: 3. Direct that physical inventories of personal property be performed by the Acquisition and Materiel Management staff or other parties who are independent of those with property custodian responsibilities; VA action on the recommendation: In October 2005, VA issued a modification to Handbook 7127/4, Materiel Management Procedures, which required that all completed inventories have a 5 percent verification inventory conducted by an accountable officer or designee, a disinterested party, and the custodial officer or designee. However, the handbook did not direct that the independent party should perform the physical inventories, and 5 percent verifications do not suffice for independent inventories. In addition, VA has begun to furnish OIT employees with hand scanners that may be used to scan equipment. VA reports that it is currently assessing how many hand scanners its facilities need. The use of hand scanners for capturing IT equipment bar code label and serial number information during physical inventories would help achieve necessary independence; Status of GAO recommendation: Partially implemented. GAO recommendation: 4. Reinforce VA's requirement to attach bar code labels to agency personal property; VA action on the recommendation: During a June 2008 property conference call with property management personnel from VA field locations across the nation, OAL personnel reinforced VA's requirement to attach bar code labels to agency personal property; Status of GAO recommendation: Fully implemented. GAO recommendation: 5. For the six sites we visited in 2004, determine the location or disposition of personal property items not found during our site visits; VA action on the recommendation: VA reported in its Fiscal Year 2006 Budget Submission that the six identified medical centers were directed to conduct inventories of equipment inventory listings by March 31, 2005. VA further reported that upon completion of the inventories, the network director must submit certification that inventories were accomplished, any discrepancies were identified, and required Reports of Survey were prepared on items that could not be found; Status of GAO recommendation: Fully implemented. GAO recommendation: 6. For the six sites we visited in 2004, review property records to identify and correct erroneous or incomplete data fields; VA action on the recommendation: In June 2008, VA's Office of Information and Technology Oversight and Compliance planned to review the erroneous and blank data fields at the six medical centers we visited. In addition, VA officials indicated that they plan to review the data fields at a national level using a data warehouse and provide reports to the six sites by September 1, 2008. However, VA has not yet reviewed or corrected these erroneous and blank data fields; Status of GAO recommendation: Open. Source: GAO interviews of agency officials and analysis of VA documentation. [End of table] [End of section] Appendix III: Comments from the Department of Veterans Affairs: The Secretary Of Veterans Affairs: Washington: July 28, 2008: Ms. Kay L. Daly: Acting Director: Financial Management and Assurance: U. S. Government Accountability Office: 441 G Street, NW: Washington, DC 20548: Dear Ms. Daly: The Department of Veterans Affairs (VA) has reviewed your draft report, Veterans Affairs: Continued Action Needed to Reduce IT Equipment Losses and Correct Control Weaknesses (GAO-08-918), and generally agrees with all but one of the recommendations. VA does not agree with the recommendation that medical devices with data storage capability be considered information technology (IT) equipment for the purpose of inventory control. Not only is this counter to the Joint Commission accreditation requirements, a separate inventory of medical equipment is a necessity to address the Food and Drug Administration's recalls and other hazard notifications related to patient safety. VA does agree that sensitive information must be protected, and VA has established policy to deal with this issue. VA agrees with GAO's recommendation regarding the development of a standardized naming classification for IT equipment, but differs on the responsibility for implementing the recommendation. The enclosure specifically addresses GAO's recommendations and provides additional discussion and comments to the draft report. VA appreciates the opportunity to comment on your draft report. Sincerely yours. Signed by: James B. Peake, M.D. Enclosure: Department of Veterans Affairs (VA) Comments to Government Accountability Office (GAO) Draft Report: Continued Action Needed To Reduce It Equipment Losses And Correct Control Weaknesses (GAO-08-918): GAO recommends that the Department of Veterans Affairs take the following five actions: * Review property inventory records and confirm that all IT equipment, regardless of the organizational equipment inventory listing, is identified in the property system. Concur- VA Handbook 7002 requires the senior information technology (IT) official at each facility to review property inventory records and ensure that all IT equipment is identified in the VA property system. The senior IT official is responsible for establishing and implementing a process to identify, account for, track, monitor, inventory, and dispose of IT items that are capable of storing information electronically but are not assigned catalog stock numbers (CSN). The senior IT official will coordinate perpetual inventory activities as well as schedule and conduct an annual physical inventory of expendable IT items to verify the accuracy of the data contained in the sensitive expendable IT item listing (SEIIL). The senior IT official will document and report any discrepancies identified during inventory activities. The senior IT official will also coordinate perpetual inventory activities and conduct an annual physical inventory of IT equipment items assigned a CSN in accordance with the schedule established by Logistic Services to verify the accuracy of the data contained in the equipment inventory listing (EIL). The senior IT official is responsible for documenting and reporting any discrepancies identified during inventory activities. The annual EIL/SEIIL inventories include an audit to ensure accurate documentation in the inventory tracking systems. Following an inventory of IT items, or whenever an IT equipment item is identified as not accounted for', the senior IT official will review the documentation for discrepancies and coordinate with Logistic Services regarding a determination as to the need for report of survey (ROS) action. IT items on ROS must be resolved within 60 days of initiation. Any exceptions will be documented in a plan of action and approved by the facility director. The facility director is accountable for all equipment in their facility and is responsible for ensuring adherence to all applicable policies. Performance measures are being established for Office of Information and Technology (OI&T) regional directors and Veterans Health Administration (VHA) facility directors related to the accountability of IT equipment under their cognizance. * Establish and implement a policy requiring facility CIOs to develop standardized naming classifications for IT equipment, including item name, manufacturer, and model, for recording IT equipment into local property inventory systems. Partially Concur-VA concurs that standardized naming classifications are required to support tracking of IT equipment. However, VA does not concur that the standardized naming classifications should be established at the facility level. VA employs a cataloging process to categorize equipment using CSNs. The CSNs are assigned according to the schema established in VA Catalog No. 3, Section V, which provides a description for each CSN. This provides for a standardized naming classification system that applies across the Department. In the Fall of 2006 a group of subject matter experts assembled to develop standard operating procedures (SOP) for Veterans Health Administration (VHA) on asset management. These SOPs were issued March 8, 2007. One of the SOPs (AM 1 SOP) specifically addresses the data elements required to be included in the local property inventory system maintained in the Automated Engineering Management System/Medical Equipment Repair Service (AEMS/MERS) system. These data elements include item name, manufacturer, and model number/designation for each item of IT equipment. Prosthetics and Clinical Logistics Office (P&CLO) will be assessing compliance with this requirement by September 2008. Monthly reports will be generated and analyzed to identify facilities with incomplete data. P&CLO will send notifications to OI&T regional directors and VI- IA facility directors of non-compliant sites. Copies of reports will also be provided to the IT Asset Advisory Group (ITAAG) for trend analysis and to support the identification of systemic issues requiring corrective action. * Develop a list of medical equipment with data storage capability that should be considered as IT equipment for inventory control purposes. Partially Concur - VA does concur with maintaining an inventory of all equipment, including medical for inventory control purposes. In accordance with VA Handbook 7002, the facility director is responsible for ensuring that all nonexpendable equipment items, and sensitive equipment items regardless of cost, are entered into the VA property system for inventory control purposes. The Joint Commission verifies that medical devices are subjected to inspection before deployment; this inspection process includes the entry of these items into the property system. VA Handbook 6500 addresses the requirements associated with the management and protection of sensitive information and applies to all organizational components of the Department. VA does not concur with redefining medical equipment as IT equipment. Joint Commission accreditation requirements include maintenance of a separate and distinct medical equipment inventory to manage and document quality assurance activities. Medical devices are highly regulated by the Food and Drug Administration and a separate and accurate inventory is a necessity to address recall and other hazard notifications to minimize potential impact on patient safety. * Develop a procedure for identifying hard drive serial numbers with both the property identification numbers and serial numbers of host computers. Concur- VA agrees that hard drives need to be tracked and matched to host computers. OI&T and P&CLO will develop a procedure for identifying hard drive serial numbers with both the property identification numbers and serial numbers of host computers by the end of fiscal year 2008. This procedure will delineate organizational responsibilities and the process for ensuring appropriate mapping of hard drives to host computers. * Revise the definition of IT storage locations in VA's Handbook 0730/1, Security and Law Enforcement, to include informal IT storage locations, such as OIT work rooms and require these locations to be included in physical security inspections. Concur- OI&T will work with Security and Law Enforcement to revise the definition of IT storage locations to include informal IT storage locations. Meanwhile, IT custodial officers are responsible for identifying all IT storage areas for security personnel. The following requirements are included in VA Handbook 7002: The IT Custodial Officer will provide a list of all IT storage areas to the Facility IT Security Officer (FISO). This list will be updated as necessary to ensure it is maintained current.... Access to IT equipment storage locations will be provided to facility security personnel to perform regular inspections. Security personnel will provide a Report of Physical Security inspection of IT Equipment Store Rooms to the IT Custodial Officer at the facility within 10 days of completing a physical security inspection. The report will document [End of section] Appendix IV: Reports of Survey on Missing IT Equipment for VA Case Study Locations: Table 12 summarizes Report of Survey[Footnote 38] information related to VA's 2007 physical inventories of IT equipment for the 12 case study locations covered in our 2004, 2007, and 2008 audits. We used the original acquisition value as the best available data for the cost of IT equipment items that could not be located during VA's 2007 physical inventory. Table 12: Summary of Reports of Survey as of May 15, 2008, for Case Study Locations Covered in GAO Audits: Location: Atlanta medical center; Date physical inventory completed: Aug. 2007; Dates VA closed Reports of Survey: Apr. 2008; Items missing as of 12/31/07: 198; Items missing as of 5/15/08: 129; Reported original acquisition value of missing items as of 5/15/08: $220,115. Location: Boston healthcare system; Date physical inventory completed: Dec. 2007; Dates VA closed Reports of Survey: Ongoing; Items missing as of 12/31/07: 3,663; Items missing as of 5/15/08: 3,226; Reported original acquisition value of missing items as of 5/15/08: $5,026,271. Location: North Texas healthcare system; Date physical inventory completed: Dec. 2007; Dates VA closed Reports of Survey: Ongoing; Items missing as of 12/31/07: 5,309; Items missing as of 5/15/08: 5,308; Reported original acquisition value of missing items as of 5/15/08: $5,615,070. Location: Washington D.C. medical center; Date physical inventory completed: Sept. 2007; Dates VA closed Reports of Survey: May 2008; Items missing as of 12/31/07: 139; Items missing as of 5/15/08: 115; Reported original acquisition value of missing items as of 5/15/08: $120,048. Location: Houston medical center; Date physical inventory completed: Dec. 2007; Dates VA closed Reports of Survey: Ongoing; Items missing as of 12/31/07: 6,485; Items missing as of 5/15/08: 6,427; Reported original acquisition value of missing items as of 5/15/08: $7,737,917. Location: Indianapolis medical center; Date physical inventory completed: Dec. 2007; Dates VA closed Reports of Survey: May 2008; Items missing as of 12/31/07: 113; Items missing as of 5/15/08: 82; Reported original acquisition value of missing items as of 5/15/08: $29,986. Location: Los Angeles medical center; Date physical inventory completed: Dec. 2007; Dates VA closed Reports of Survey: Ongoing; Items missing as of 12/31/07: 1,767; Items missing as of 5/15/08: 1,648; Reported original acquisition value of missing items as of 5/15/08: $1,273,144. Location: VA headquarters; Date physical inventory completed: Jan. 2008; Dates VA closed Reports of Survey: Ongoing; Items missing as of 12/31/07: 1,595; Items missing as of 5/15/08: 1,314; Reported original acquisition value of missing items as of 5/15/08: $3,316,951. Location: San Diego healthcare system; Date physical inventory completed: Dec. 2007; Dates VA closed Reports of Survey: Feb. 2008; Items missing as of 12/31/07: 930; Items missing as of 5/15/08: 863; Reported original acquisition value of missing items as of 5/15/08: $717,805. Location: San Francisco medical center; Date physical inventory completed: Dec. 2007; Dates VA closed Reports of Survey: May 2008; Items missing as of 12/31/07: 39; Items missing as of 5/15/08: 39; Reported original acquisition value of missing items as of 5/15/08: $105,298. Location: Puget Sound healthcare system; Date physical inventory completed: Dec. 2007; Dates VA closed Reports of Survey: Ongoing; Items missing as of 12/31/07: 1,383; Items missing as of 5/15/08: 1,269; Reported original acquisition value of missing items as of 5/15/08: $1,536,840. Location: Tampa medical center; Date physical inventory completed: Dec. 2007; Dates VA closed Reports of Survey: Ongoing; Items missing as of 12/31/07: 815; Items missing as of 5/15/08: 690; Reported original acquisition value of missing items as of 5/15/08: $638,946. Source: GAO analysis of VA-reported 2007 inventory results and related Reports of Survey data. [End of table] [End of section] Appendix V GAO Contact and Staff Acknowledgments: GAO Contact: Kay L. Daly, (202) 512-9095 or dalykl@gao.gov: Acknowledgments: In addition to the contact named above, Gayle L. Fischer, Assistant Director; Andrew O'Connell, Assistant Director and Supervisory Special Agent; F. Abe Dymond, Assistant General Counsel; Doreen S. Eng, Assistant Director; Bamidele A. Adesina; James D. Ashley; Deyanna J. Beeler; Francine M. DelVecchio; Lauren S. Fassler; Steven M. Koons; Kelly A. Richburg; Ramon J. Rodriguez, Special Agent; Daniel E. Silva; Chevalier C. Strong; Danietta S. Williams; and Matthew L. Wood made key contributions to this report. [End of section] Footnotes: [1] GAO, VA Medical Centers: Internal Control over Selected Operating Functions Needs Improvement, [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO-04-755] (Washington, D.C.: July 21, 2004). [2] GAO, Veterans Affairs: Inadequate Controls over IT Equipment at Selected VA Locations Pose Continuing Risk of Theft, Loss, and Misappropriation, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07- 505] (Washington, D.C.: July 16, 2007). [3] For the purpose this audit, we included in our definition of IT equipment any equipment capable of storing or processing data, regardless of how VA classifies it. Therefore, medical devices that would typically not be classified as IT equipment, but may capture, process, or store patient data, were considered IT equipment for this audit. For example, we included electrocardiograph, anesthesiology, and ultrasound equipment in our tests. [4] Our 2007 audit covered medical centers in Washington, D.C.; Indianapolis, Ind.; San Diego, Calif.; and VA headquarters organizations. Our 2004 audit covered medical centers in Atlanta, Ga.; Houston, Tex.; Los Angeles, Calif.; San Francisco, Calif.; Tampa, Fla.; and Washington, D.C. [5] Each of the three HCS locations included multiple medical facilities. [6] Our tests of VA headquarters consist of separate strata for 6 organizations and a seventh strata for all other organizations. [7] The Report of Survey system is the method used by VA to obtain an explanation of the circumstances surrounding loss, damage, or destruction of government property other than through normal wear and tear. [8] As used in this report, the term excess property refers to property that a federal agency leases or owns that is not required to meet either the agency's needs or any other federal agency's needs. [9] The population of IT equipment items for the four test locations did not include the population of all IT equipment at those locations. Therefore, we can project our test results to the population of current, recorded IT equipment inventory at each location, but not the population of all IT equipment. Our tests were specific to each of the case study locations and cannot be projected to VA IT equipment inventory as a whole. [10] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-505]. [11] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-755]. [12] The Report of Survey system is the method used by VA to obtain an explanation of the circumstances surrounding loss, damage, or destruction of government property other than through normal wear and tear. [13] The Assistant Secretary for Management's July 3, 2008, information letter states that although the draft handbook was under final review within VA, the contents of the handbook "are of such importance that the policies and procedures need to be implemented as soon as possible." [14] See Office of Management and Budget (OMB), Safeguarding Against and Responding to the Breach of Personally Identifiable Information, Memorandum (Washington, D.C: May 22, 2007). This memorandum requires agencies to develop and implement an information breach notification policy. [15] GAO, Standards for Internal Control in the Federal Government, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/AIMD-00-21.3.1] (Washington, D.C.: November 1999). This document was prepared to fulfill our statutory requirement under 31 U.S.C. 3512 (c), (d), commonly known as the Federal Managers' Financial Integrity Act of 1982, to issue standards that provide the overall framework for establishing and maintaining internal control. [16] Each of these estimates has a margin of error, based on a two- sided, 95 percent confidence interval, of +/-10 percent or less. [17] We included medical equipment with the capability to store or process data in our tests; such items were excluded from the 2007 VA- wide physical inventory of IT equipment. [18] For the purpose of this audit, we include in our definition of IT equipment any equipment capable of storing or processing data, regardless of how VA classifies it. Therefore, medical devices that would typically not be classified as IT equipment, but may capture, process, or store patient data, were considered IT equipment for this audit. For example, we included electrocardiograph, anesthesiology, and ultrasound equipment in our tests. [19] 44 U.S.C. §§ 3101 and 3102, and implementing NARA regulations at 36 C.F.R. § 1222.38. This is consistent with the more general requirement for agencies to establish internal controls under 31 U.S.C. § 3512 (c), (d), commonly known as the Federal Managers' Financial Integrity Act of 1982 (FMFIA), and [hyperlink, http://www.gao.gov/cgi- bin/getrpt?GAO/AIMD-00-21.3.1]. [20] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-505]. [21] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-755]. [22] A tiger team is a quick response team formed to determine causes of identified problems and develop corrective action plans. [23] The Report of Survey system is the method used by VA to obtain an explanation of the circumstances surrounding loss, damage, or destruction of government property other than through normal wear and tear. [24] This policy combines information originally contained in VA Handbooks 7125, General Procedures, and 7127, Materiel Management Procedures, and would rescind these policies when approved in final form. [25] See OMB, Safeguarding Against and Responding to the Breach of Personally Identifiable Information, Memorandum (Washington, D.C: May 22, 2007). This memorandum requires agencies to develop and implement an information breach notification policy. [26] [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/AIMD-00-21.3.1]. [27] VA Handbook 7125, Materiel Management General Procedures, § 5003 (Oct. 11, 2005). [28] GAO, Internal Control Management and Evaluation Tool, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-1008G] (Washington, D.C.: August 2001). This document was prepared to assist agencies in maintaining or implementing effective internal control and, when needed, to help determine what, where, and how improvements can be implemented. [29] VA OIT personnel and contractors follow National Institute of Standards and Technology Special Publication 800-88 guidelines, which require performing three separate erasures for media sanitization. [30] On August 21, 2007, VA distributed a "litigation hold" memorandum that explained issues in Veterans for Common Sense v. Peake, a class action lawsuit filed in July 2007 against VA, and VA's ongoing obligation to identify and preserve electronic information relevant to those issues. VA directed employees not to preserve all information, only information relevant to the lawsuit. [31] Privacy Act of 1974, codified, as amended, at 5 U.S.C. § 552a. [32] HIPAA, Pub. L. No. 104-191, § 264, 110 Stat. 1936, 2033-34 (Aug. 21, 1996). The HHS Secretary has prescribed standards for safeguarding health information in the HIPAA Medical Privacy Rule. See 45 C.F.R. pt. 164. [33] GAO, Veterans Affairs: Inadequate Controls over IT Equipment at Selected VA Locations Pose Continuing Risk of Theft, Loss, and Misappropriation, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07- 505] (Washington, D.C.: July 16, 2007) and GAO, VA Medical Centers: Internal Control over Selected Operating Functions Needs Improvement, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-04-755] (Washington, D.C.: July 21, 2004). [34] The Report of Survey system is the method used by VA to obtain an explanation of the circumstances surrounding loss, damage, or destruction of government property other than through normal wear and tear. [35] GAO, Standards for Internal Control in the Federal Government, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO/AIMD-00-21.3.1] (Washington, D.C.: November 1999). This document was prepared to fulfill our statutory requirement under 31 U.S.C. 3512 (c), (d), commonly known as the Federal Managers' Financial Integrity Act of 1982, to issue standards that provide the overall framework for establishing and maintaining internal control. [36] GAO, Internal Control Management and Evaluation Tool, [hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-01-1008G] (Washington, D.C.: August 2001). This document was prepared to assist agencies in maintaining or implementing effective internal control and, when needed, to help determine what, where, and how improvements can be implemented. Although this tool is not required to be used, it is intended to provide a systematic, organized, and structured approach to assessing the internal control structure. [37] The population of IT equipment from which we selected our samples excluded IT equipment items identified as missing at the time of each of our tests. [38] The Report of Survey system is the method used by VA to obtain an explanation of the circumstances surrounding loss, damage, or destruction of government property other than through normal wear and tear. [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office: 441 G Street NW, Room LM: Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000: TDD: (202) 512-2537: Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548:

The Justia Government Accountability Office site republishes public reports retrieved from the U.S. GAO These reports should not be considered official, and do not necessarily reflect the views of Justia.