This is the accessible text file for GAO report number GAO-07-505 entitled 'Veterans Affairs: Inadequate Controls over IT Equipment at Selected VA Locations Pose Continuing Risk of Theft, Loss, and Misappropriation' which was released on July 24, 2007. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to Congressional Requesters: United States Government Accountability Office: GAO: July 2007: Veterans Affairs: Inadequate Controls over IT Equipment at Selected VA Locations Pose Continuing Risk of Theft, Loss, and Misappropriation: GAO-07-505: GAO Highlights: Highlights of GAO-07-505, a report to congressional requesters Why GAO Did This Study: In July 2004, GAO reported that the six Department of Veterans Affairs (VA) medical centers it audited lacked a reliable property control database and had problems with implementation of VA inventory policies and procedures. Fewer than half the items GAO selected for testing could be located. Most of the missing items were information technology (IT ) equipment. Given recent thefts of laptops and data breaches, the requesters were concerned about the adequacy of physical inventory controls over VA IT equipment. GAO was asked to determine (1) the risk of theft, loss, or misappropriation of IT equipment at selected locations; (2) whether selected locations have adequate procedures in place to assure accountability and physical security of IT equipment in the excess property disposal process; and (3) what actions VA management has taken to address identified IT inventory control weaknesses. GAO statistically tested inventory controls at four case study locations. What GAO Found: A weak overall control environment for VA IT equipment at the four locations GAO audited poses a significant security vulnerability to the nation’s veterans with regard to sensitive data maintained on this equipment. GAO’s Standards for Internal Control in the Federal Government requires agencies to establish physical controls to safeguard vulnerable assets, such as IT equipment, which might be vulnerable to risk of loss, and federal records management law requires federal agencies to record essential transactions. However, GAO found that current VA property management policy does not provide guidance for creating records of inventory transactions as changes occur. GAO also found that policies requiring annual inventories of sensitive items, such as IT equipment; adequate physical security; and immediate reporting of lost and missing items have not been enforced. GAO’s statistical tests of physical inventory controls at four VA locations identified a total of 123 missing IT equipment items, including 53 computers that could have stored sensitive data. The lack of user-level accountability and inaccurate records on status, location, and item descriptions make it difficult to determine the extent to which actual theft, loss, or misappropriation may have occurred without detection. The table below summarizes the results of GAO’s statistical tests at each location. Table: Current IT Inventory Control Failures at Four Test Locations: Control failures: Missing items; Washington, D.C.: 28%; Indianapolis: 6%; San Diego: 10%; VA HQ offices: 11%. Control failures: Incorrect user organization; Washington, D.C.: 80%; Indianapolis: 69%; San Diego: 70%; VA HQ offices: 11%. Control failures: Incorrect location; Washington, D.C.: 57%; Indianapolis: 23%; San Diego: 53%; VA HQ offices: 44%. Control failures: Recordkeeping errors; Washington, D.C.: 5%; Indianapolis: 0%; San Diego: 5%; VA HQ offices: 3%. Source: GAO analysis. Note: Each of these estimates has a margin of error, based on a two- sided, 95 percent confidence interval, of +/- 10 percent or less. [End of table] GAO also found that the four VA locations reported over 2,400 missing IT equipment items, valued at about $6.4 million, identified during physical inventories performed during fiscal years 2005 and 2006. Missing items were often not reported for several months and, in some cases, several years. It is very difficult to investigate these losses because information on specific events and circumstances at the time of the losses is not known. GAO’s limited tests of computer hard drives in the excess property disposal process found hard drives at two of the four case study locations that contained personal information, including veterans’ names and Social Security numbers. GAO’s tests did not find any remaining data after sanitization procedures were performed. However, weaknesses in physical security at IT storage locations and delays in completing the data sanitization process heighten the risk of data breach. Although VA management has taken some actions to improve controls over IT equipment, including strengthening policies and procedures, improving the overall control environment for sensitive IT equipment will require a renewed focus, oversight, and continued commitment throughout the organization. What GAO Recommends: GAO makes 12 recommendations to improve VA-wide policies and procedures with respect to controls over IT equipment, including recordkeeping requirements, physical inventories, user-level accountability, and physical security. VA agreed with GAO’s findings, noted significant actions under way, and concurred on the 12 recommendations. [Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-505]. To view the full product, including the scope and methodology, click on the link above. For more information, contact McCoy Williams at (202) 512-9095 or williamsm1@gao.gov. [End of section] Contents: Letter: Results in Brief: Background: Inadequate IT Inventory Control and Accountability Pose Risk of Loss, Theft, and Misappropriation: Physical Security Weaknesses Increase Risk of Loss, Theft, and Misappropriation of IT Equipment and Sensitive Data: VA Actions to Improve IT Management and Controls Have Been Limited: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Objectives, Scope, and Methodology: Appendix II: Comments from the Department of Veterans Affairs: Appendix III: GAO Contact and Staff Acknowledgments: Tables: Table 1: Current IT Equipment Inventory Control Failure Rates at Four Test Locations: Table 2: Number of Missing IT Equipment Items at Four Test Locations, Including Items That Could Have Stored Sensitive Information: Table 3: Number of Missing IT Equipment Items by Headquarters Office and Missing Items That Could Have Stored Sensitive Personal Data and Information: Table 4: Estimated Percentage of IT Inventory Control Failures Related to Correct User and Location at the Four Test Locations: Table 5: Estimated Percentage of Other IT Inventory Recordkeeping Failures at Four Test Locations: Table 6: Summary of Physical Inventories and Missing IT Equipment Identified by the Four Current Case Study Locations as of February 28, 2007: Table 7: Summary of Physical Inventories and Missing IT Equipment Identified by Five Case Study Locations Previously Audited as of March 2, 2007: Table 8: Population of VA IT Equipment at Locations Selected for Testing: Table 9: Number of Computer Hard Drives in the Property Disposal Process Selected for Testing at Four Locations: Figures: Figure 1: VA's IT Property Management Process: Figure 2: Photograph of Unsecured IT Equipment Storeroom in the VA Headquarters Building: Abbreviations: AEMS/MERS: Automated Engineering Management System/Medical Equipment Repair Service: CFR: Code of Federal Regulations: CIO: Chief Information Officer: CMR: consolidated memorandum receipt: DOD: Department of Defense: EIL: equipment inventory listing: FMFIA: Financial Managers' Financial Integrity Act of 1982: HHS: Department of Health and Human Services: HIPAA: Health Information Portability and Accountability Act of 1996: IFCAPS: Integrated Funds Distribution Control Point Activity, Accounting, and Procurement System: IRM: information resource management: IT: information technology: MRI: magnetic resonance imaging: NARA: National Archives and Records Administration: NIST: National Institute of Standards and Technology: USB: universal serial bus: USC: United States Code: VA: Department of Veterans Affairs: VHA: Veterans Health Administration: VISN: Veterans Integrated Service Network: United States Government Accountability Office: Washington, DC 20548: July 16, 2007: The Honorable Bob Filner: Chairman: The Honorable Steve Buyer: Ranking Member: Committee on Veterans' Affairs: House of Representatives: The Honorable Harry E. Mitchell: Chairman: The Honorable Ginny Brown-Waite: Ranking Member: Subcommittee on Oversight and Investigations: Committee on Veterans' Affairs: House of Representatives: In light of reported weaknesses in Department of Veterans Affairs (VA) inventory controls and reported thefts of laptop computers and data breaches, you were concerned about the adequacy of controls over VA information technology (IT) equipment. In July 2004, we reported[Footnote 1] that the six VA medical centers we audited lacked a reliable property control database, which did not produce a complete and accurate record of current inventory and compromised effective management and security of agency assets. We found that key policies and procedures established by VA to control personal property provided facilities with substantial latitude in conducting physical inventories[Footnote 2] and maintaining their property management systems, which resulted in reduced property accountability. For example, VA's Handbook 7127/3, Materiel Management Procedures[Footnote 3] allowed the person responsible for custody of VA property to attest to the existence of that property rather than requiring independent verification. Also, personnel at some locations interpreted a policy that established a $5,000 threshold for property that must be inventoried as a license to ignore VA requirements to account for sensitive, lower cost items that are susceptible to theft or loss, such as personal computers and peripheral equipment. Personnel at the VA medical centers, which are part of the Veterans Health Administration (VHA), located fewer than half of the 100 items we selected for testing at each of five medical centers and 62 of 100 items at the sixth medical center. Most of the items that could not be located were computer equipment. Based on our work, we concluded in our July 2004 report that these weak practices, combined with lax implementation, resulted in low levels of accountability and heightened risk of loss. During 2006, VA employed nearly 235,000 employees and relied on an undetermined number of contractors, volunteers, and students to support its operations. VA provided these individuals a wide range of IT equipment,[Footnote 4] including desktop and laptop computers, monitors and printers, personal digital assistants, unit-level workstations, local area networks, and medical equipment with memory and data processing/communication capabilities. VA information resource management (IRM) and property management personnel share responsibility for management of IT equipment inventory. This report responds to your request that we perform follow-up work to determine (1) the risk of theft, loss, or misappropriation[Footnote 5] of IT equipment at selected VA locations; (2) whether selected VA locations have adequate procedures in place to assure physical security and accountability over IT equipment in the excess property disposal process;[Footnote 6] and (3) what actions VA management has taken to address identified IT equipment inventory control weaknesses. In assessing the risk of theft, loss, or misappropriation of IT equipment, you also asked that we consider the results of physical inventories performed by the four case study locations covered in this audit and the six medical centers we previously audited.[Footnote 7] To achieve our first two objectives, we used a case study approach, selecting VA medical centers located in Washington, D.C., Indianapolis, Indiana, and San Diego, California; associated clinics; and VA headquarters organizations for our test work. To determine the risk of theft, loss, or misappropriation of IT equipment at these locations, we statistically tested IT equipment inventory to determine the effectiveness of controls relied on for accurate recording of inventory transactions, including existence (meaning IT equipment items listed in inventory records exist and can be located), user-level accountability, and inventory record accuracy. As requested, we also obtained and analyzed the results of physical inventories performed by the case study locations covered in our current and our previous audits. In addition, our investigator assessed physical security of IT equipment storerooms and procedures for reporting lost and missing items to VA law enforcement officials at our four current case study locations. To determine if the four case study locations had adequate procedures in place for proper disposal of excess IT equipment, we assessed procedures for security and accountability of excess IT equipment and independently tested a limited selection of computer hard drives for proper removal of data and compliance with VA property management policies. We performed sufficient procedures to determine that inventory data at the test locations were reliable for the purpose of our audit.[Footnote 8] We conducted our audit and investigation from September 2006 through March 2007. We performed our audit procedures in accordance with generally accepted government auditing standards, and we performed our investigative procedures in accordance with quality standards for investigators as set forth by the President's Council on Integrity and Efficiency. We obtained agency comments on a draft of this report. A detailed discussion of our objectives, scope, and methodology is included in appendix I. Results in Brief: A weak overall control environment and pervasive weaknesses in inventory control and accountability at the four locations we audited put IT equipment at risk of theft, loss, and misappropriation and pose a continuing security vulnerability to our nation's veterans with regard to sensitive data maintained on this equipment. Our Standards for Internal Control in the Federal Government[Footnote 9] requires agencies to establish physical control to secure and safeguard vulnerable assets, such as equipment that might be vulnerable to risk of loss or unauthorized use. Further, federal records management law and regulations require agencies to create and maintain records of essential transactions, including property records, as part of an effective internal control structure. However, we found that current VA property management policy does not provide guidance for recording IT equipment inventory transactions as events occur. We also found that certain other VA policies have not been enforced, including policies requiring (1) user-level accountability; (2) annual inventories of sensitive items, including IT equipment; (3) adequate physical security; and (4) immediate reporting of lost and missing items. Our statistical tests of IT equipment inventory controls at our four VA case study locations identified a total of 123 missing IT equipment items, including 53 computers that could have stored sensitive data. We estimate the percentage of inventory control failures related to these missing items to be 6 percent at the Indianapolis medical center, 10 percent at the San Diego medical center, 28 percent at the Washington, D.C., medical center, and 11 percent for VA headquarters organizations.[Footnote 10] In addition, although VA property management policy establishes guidelines for user-level accountability, we found a pervasive lack of user-level accountability across the four case study locations, and significant errors in recorded IT inventory information concerning user organization and location. As a result, for the four case study locations, we concluded that under the lax control environment, essentially no one was accountable for IT equipment. The lack of user-level accountability and inaccurate records on status, location, and item descriptions make it difficult to determine the extent to which actual theft, loss, or misappropriation may have occurred without detection at the case study locations. Our follow-up on the results of physical inventories performed by the four case study locations included in our current audit and the five other case study locations from our previous audit found that the case study locations identified thousands of missing IT equipment items valued at tens of millions of dollars. For example, the four case study locations included in our current audit reported over 2,400 missing IT equipment items, with a combined original acquisition value of about $6.4 million. Information we obtained as of March 2, 2007, showed that the five other locations we previously audited had identified over 8,600 missing IT equipment items with a combined original acquisition value of over $13.2 million. One of the four case study locations in our current audit and three of the five other case study locations covered in our previous audit had not yet completed Reports of Survey[Footnote 11] on losses identified in their physical inventories. Because none of the nine case study locations consistently recorded transactions as changes in IT equipment inventory status and location occurred, it is not possible to determine the disposition of IT equipment items that cannot be located. When attempts to locate missing IT equipment items were unfruitful, the losses were administratively reported for recordkeeping purposes, including the authorization to write them off in the property records. According to VA Police and security specialists,[Footnote 12] when losses are not immediately identified and reported, it is very difficult to conduct an investigation because information about the specific events and circumstances of the losses is no longer available. Our limited tests of computer hard drives in the excess property disposal process at the four case study locations found no data on those hard drives that were certified as sanitized.[Footnote 13] However, at two of the four test locations, we found that hard drives not yet subjected to data sanitization contained hundreds of names and Social Security numbers. Further, file dates on the hard drives we tested indicate that some of them had been in the disposal process for several years without being sanitized, creating an unnecessary risk that sensitive personal and medical information could be compromised. Excessive delays in completing data sanitization processes and noncompliance with VA physical security policy heighten the risk of data breach related to sensitive personal information residing on hard drives in the excess property disposal process. For example, we found numerous unofficial IT equipment storage locations in VA headquarters area office buildings that did not meet VA physical security requirements. One IT storeroom at the VA headquarters building did not have a door. At other VA headquarters buildings, we found IT equipment stored in open areas, closets, and filing cabinets. These storage locations did not meet VA physical security requirements for secure walls, doors, locks, special keys, and intrusion detection alarms. Since our July 2004 report, VA management has taken some actions and has other actions under way to strengthen controls over IT equipment. For example, on October 11, 2005, VA revised its Materiel Management Procedures[Footnote 14] to emphasize that requirements for annual inventories of sensitive items valued at under $5,000 include IT equipment. On August 4, 2006, VA issued a new directive entitled Information Security Program, which requires, in part, periodic evaluations and testing of the effectiveness of all management, operational, and technical controls and calls for procedures for immediately reporting and responding to security incidents. In December 2006, VA's new Chief Information Officer (CIO) centralized functional IT units across local VA organizations under the CIO organization. Despite these improvements, the department has not yet established and ensured consistent implementation of effective controls for accountability of IT equipment inventory, and IT inventory responsibilities shared by IRM and property management personnel are not well-defined. Until these shortcomings are addressed, VA will continue to face major challenges in safeguarding IT equipment and sensitive personal data on this equipment from loss, theft, and misappropriation. This report contains 12 recommendations to VA to further improve the overall control environment and strengthen key internal control activities and to increase attention to protecting IT equipment used in VA operations. In comments on a draft of this report, VA generally agreed with our findings, noted significant actions under way, and concurred on the 12 recommendations. VA also provided technical comments. VA's comments, including its technical comments, are discussed in the Agency Comments and Our Evaluation section of this report. VA's written comments are reprinted in appendix II. Background: VA's mission is to serve America's veterans and their families and to be their principal advocate in ensuring that they receive medical care, benefits, and social support in recognition of their service to our nation. VA, headquartered in Washington, D.C., is the second largest federal department and has over 235,000 employees, including physicians, nurses, counselors, statisticians, computer specialists, architects, and attorneys. VA carries out its mission through three major line organizations--VHA, Veterans Benefits Administration, and National Cemetery Administration--and field facilities throughout the United States. VA provides services and benefits through a nationwide network of 156 hospitals, 877 outpatient clinics, 136 nursing homes, 43 residential rehabilitation treatment programs, 207 readjustment counseling centers, 57 veterans' benefits regional offices, and 122 national cemeteries. Previously Reported Weaknesses in IT Inventory Controls: Our July 2004 report found significant property management weaknesses, including weaknesses in controls over IT equipment items valued at under $5,000 that are required to have inventory control. In that report, we made several recommendations for improving property management, including actions to (1) clarify existing policy regarding sensitive items that are required to be accounted for in the property control records, (2) provide a more comprehensive list of the type of personal property assets that are considered sensitive for accountability purposes, and (3) reinforce VA's requirement to attach bar code labels to agency personal property. VA's IT Property Management Process: The Assistant Secretary for Information and Technology serves as the CIO for the department and is the principal advisor to the Secretary on matters relating to IT management in the department. Key functions in VA's IT property management process are performed by IRM and property management personnel. These functions include identifying requirements; ordering, receiving, and installing IT equipment; performing periodic inventories; and identifying, removing, and disposing of obsolete and unneeded IT equipment. Figure 1 illustrates the IT property management process. In general, this is the process we observed at the four VA locations we audited. Figure 1: VA's IT Property Management Process: [See PDF for image] Source: GAO. [End of figure] The steps in the IT property management process are key events, which should be documented by an inventory transaction, financial transaction, or both, as appropriate. Federal records management law, as codified in Title 44 of the U.S. Code and implemented through National Archives and Records Administration (NARA) guidance, requires federal agencies to adequately document and maintain proper records of essential transactions and have effective controls for creating, maintaining, and using records of these transactions.[Footnote 15] Request and Ordering of IT Equipment: IRM personnel determine IT equipment requirements for a particular VA medical center or headquarters office based on strategic planning, medical center or office needs, specific requests, and budgetary resources. IRM personnel then submit requests to the cognizant Veterans Integrated Service Network (VISN),[Footnote 16] the CIO, and VA headquarters in Washington, D.C., for approval. For VA medical centers, the VISN generally purchases or leases IT equipment to realize economies of scale, but individual medical centers also may place incidental orders to meet their needs. In addition, headquarters offices may place individual orders or use purchase cards to acquire IT equipment. Medical equipment with IT capability is generally acquired through procurement contracts. When contracting personnel create a purchase order and submit it to the vendor, contracting personnel are required to send a copy of the purchase order to the appropriate property management personnel to notify them of a new order. When the vendor delivers ordered IT equipment to the loading dock, property management warehouse personnel inspect the boxes for visible signs of damage, and after accepting delivery, store IT equipment until they can transfer it to IRM personnel. Warehouse personnel confirm receipt and acceptance in the Integrated Funds Distribution Control Point Activity, Accounting, and Procurement System (IFCAPS), which then notifies the Financial Management System so that payment can be made to the vendor. Once the receipt is confirmed within IFCAPS, warehouse personnel notify IRM personnel of the delivery and arrange a transfer of the equipment to them. Upon transfer, an IRM official signs the receipt document, signifying acceptance of custody for the IT equipment. Recording of IT Equipment Acquisitions in Inventory Records: VA medical center property management personnel use information from the purchase order, including item name, item description, model number, manufacturer, vendor, and acquisition cost, to create property record(s) in the Automated Equipment Management System/Medical Equipment Repair Service (AEMS/MERS) for new IT equipment acquisitions.[Footnote 17] AEMS/MERS is a general inventory management system that is local to each VA medical center. Headquarters personnel also use purchase order information to enter records of new IT equipment in the Inte-GreatTM Property Manager system. Property management personnel also identify the department responsible for the IT equipment by recording an equipment inventory listing (EIL) code at VA medical centers and a consolidated memorandum receipt (CMR) code at headquarters. Once property records are created, property management personnel generate a bar code label for each piece of IT equipment. IRM personnel may prepare the equipment for issuance to specific users by installing VA-specific software and configurations prior to installation. In addition, VA medical center biomedical engineering personnel may test medical equipment for electrical safety before placing it in service. Issuance and Replacement of IT Equipment: IRM personnel or, in some cases, contractor personnel deliver new IT equipment to the appropriate service or location for installation. IRM or contractor personnel also remove and replace old IT equipment that has been approved for replacement. At some VA facilities, a bar code label is affixed to a door jam or other physical element of the specific location in which the IT equipment has been installed to document item locations in the property management system. Once the new equipment is installed, IRM or contractor personnel transfer the replaced equipment to an IRM storage room pending disposal. Physical Inventories of IT Equipment and Reports of Survey: VA policy[Footnote 18] mandates that each VA facility take physical inventory of its accountable property using one of two methods. The first method determines when the next inventory will be taken based on the accuracy rate for each EIL or CMR during the previous inventory. If an EIL or CMR was found to have an accuracy rate of 95 percent or above, the VA facility may inventory that EIL or CMR in 12 months. If the EIL or CMR has an accuracy rate of less than 95 percent, the VA facility must inventory that EIL or CMR within 6 months. The second method permits physical inventories to be performed on an exception basis. Under this method, a VA facility uses property management system data to identify the item bar codes that were scanned since the last inventory. If items have been scanned since the last inventory, they may be excluded from the current physical inventory. When a VA facility determines that items listed in inventory cannot be located, those items are listed on a Report of Survey and facility personnel convene a Board of Survey. Reports of Survey are provided to medical center VA Police or the Federal Protective Service officers at VA headquarters, as appropriate. The Report of Survey documents the circumstances of loss, damage, or destruction of government property. VA policy[Footnote 19] mandates that a Board of Survey be appointed when there is a possibility that a VA employee may be assessed pecuniary liability or disciplinary action as a result of loss, damage, or destruction of property and the value of the property involved is $5,000 or more. The Board of Survey reviews the Report of Survey, which identifies IT equipment that is unaccounted for and explains efforts made to account for the missing items. An approved Report of Survey provides necessary support for writing off lost and missing items. For items on the Report of Survey, VA personnel are supposed to update the use status in the property management system from "in-use" to "lost." Updating the use status allows for the generation of an exception report in case any of the items unaccounted for are subsequently located. Approval for Turn-in and Disposal: An IRM technician originates the request for turn-in of old IT equipment using VA Form 2237, "Request, Turn-In, and Receipt for Property or Services," or users may submit an electronic form 2237. Pending final approval of VA Form 2237, electronic notification is given to property management and IRM personnel, who use this documentation to ensure that they are removing and disposing of the correct item(s). IRM or contractor personnel transfer the old IT equipment to an IRM storage room for hard drive sanitization and subsequent reuse or disposal. Medical equipment with IT capability is generally traded in to the vendor for upgraded models after medical center IRM personnel have documented that data sanitization procedures were completed. Federal agencies, such as VA, are required to protect sensitive data stored on their IT equipment against the risk of data breaches and thus the improper disclosure of personal identification information, such as names and Social Security numbers. Such information is regulated by privacy protections under the Privacy Act of 1974[Footnote 20] and, when information concerns an individual's health, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and implementing regulations.[Footnote 21] Removal of Data from Hard Drives: VA facilities have two options for removing data from hard drives of IT equipment in the excess property disposal process. Under the first option, the VA medical center removes the hard drives from the IT equipment and ships them to a vendor for sanitization (data erasing). The vendor physically destroys any hard drives it cannot successfully erase. The vendor submits certification of hard drive sanitization or destruction to IRM personnel and ships the sanitized hard drives back to the VA facility for disposal. Under the second option, VA IRM personnel perform the procedures to sanitize the hard drives using VA- approved software, such as Data EraserTM. IRM personnel complete VA Form 0751, "Information Technology Equipment Sanitization Certification," to document the erasing of the hard drives. Hard drives that Data EraserTM software cannot successfully sanitize are held at the VA facility in IRM storage for physical destruction by another contractor at various intervals throughout the year. Final Disposition of IT Equipment: After data have been removed from the hard drives, the hard drives can be placed back into the IT equipment from which they were previously removed so that the computers can be reused or shipped directly to a VA IT equipment disposal vendor. For IT equipment that is not selected for reuse within VA, IRM personnel will notify cognizant property management personnel that the IT equipment is ready for final disposal and property management personnel transfer the items to a warehouse. VA facilities use different processes to handle the final disposal of IT equipment. For example, property management personnel may contact transportation personnel at the VA Central Office, who then contact a shipper to take the IT equipment to a disposal vendor, or a disposal vendor may pick up the IT equipment from the VA facility. Disposal vendors, including Federal Prison Industries, Inc.,[Footnote 22] determine what IT equipment is to be donated to schools. Generally, within several days of the equipment being shipped to the disposal vendor, property management personnel change the status field of the equipment in the property management system from "in-use" to "turned- in" and designate the property record as inactive. Inadequate IT Inventory Control and Accountability Pose Risk of Loss, Theft, and Misappropriation: Our tests of IT equipment inventory controls at four case study locations, including three VA medical centers and VA headquarters, identified a weak overall control environment and a pervasive lack of accountability for IT equipment items across the four locations we tested. Our Standards for Internal Control in the Federal Government[Footnote 23] states that a positive control environment provides discipline and structure as well as the climate that influences the quality of internal control. However, as summarized in table 1, our statistical tests of key IT inventory controls at our four case study locations found significant control failures related to (1) missing IT equipment items in our existence tests, (2) inaccurate information on user organization, (3) inaccurate information on user location, and (4) other recordkeeping errors. None of the case study locations had effective controls to safeguard IT assets from risk of loss, theft, and misappropriation. Table 1: Current IT Equipment Inventory Control Failure Rates at Four Test Locations: Control failures: Missing items in sample; Washington, D.C., medical center: 28%; Indianapolis medical center: 6%; San Diego medical center: 10%; VA headquarters: 11%. Control failures: Incorrect user organization; Washington, D.C., medical center: 80%; Indianapolis medical center: 69%; San Diego medical center: 70%; VA headquarters: 11%. Control failures: Incorrect user location; Washington, D.C., medical center: 57%; Indianapolis medical center: 23%; San Diego medical center: 53%; VA headquarters: 44%. Control failures: Recordkeeping errors; Washington, D.C., medical center: 5%; Indianapolis medical center: 0%; San Diego medical center: 5%; VA headquarters: 3%. Source: GAO analysis. Notes: Each of these estimates has a margin of error, based on a two- sided, 95 percent confidence interval, of +/-10 percent or less. The details of our statistical testing are explained in app. I. Because the four test locations did not record all IT equipment items in their inventory records, our estimated failure rates relate to current (recorded) inventory and not the population of all IT equipment at those locations. [End of table] Moreover, our statistical tests identified a total of 123 lost and missing IT equipment items across the four case locations, including 53 IT equipment items that could have stored sensitive personal information. Personal information, such as names and Social Security numbers, is regulated by privacy protections under the Privacy Act of 1974[Footnote 24] and information concerning an individual's health is accorded additional protections from unauthorized release under HIPAA and implementing regulations.[Footnote 25] Although VA property management policy[Footnote 26] establishes guidelines for holding employees and supervisors pecuniarily (financially) liable for loss, damage, or destruction because of negligence and misuse of government property, except for a few isolated instances, none of the case study locations assigned user-level accountability. Instead, these locations relied on information about user organization and user location, which was often incorrect and incomplete. In addition, although our standards for internal control require timely recording of transactions as part of an effective internal control structure and safeguarding of sensitive assets, we found that VA's property management policy[Footnote 27] neither specified what transactions were to be recorded for various changes in inventory status nor provided criteria for timely recording. Further, IRM and IT Services personnel responsible for installation, removal, and disposal of IT equipment did not record or assure that transactions were recorded by property management officials when these events occurred. Under this lax control environment, missing IT equipment items were often not reported for several months and, in some cases several years, until the problem was identified during a physical inventory. Inventory Tests Identified Significant Numbers of Missing Items: As shown in table 2, our statistical tests of IT equipment existence at the four case study locations identified a total of 123 missing IT equipment items, including 53 items that could have stored sensitive personal data and information. Although VA headquarters had the highest number of missing items, none of the four test locations had effective controls. Missing IT equipment items pose not only a financial risk but also a security risk associated with sensitive personal data maintained on computer hard drives. Table 2: Number of Missing IT Equipment Items at Four Test Locations, Including Items That Could Have Stored Sensitive Information: Test results: Number of missing items in each sample; Washington, D.C., medical center: 44; Indianapolis medical center: 9; San Diego medical Center: 17; VA headquarters: 53. Test results: Total missing items that could have stored sensitive data; Washington, D.C., medical center: 19; Indianapolis medical center: 3; San Diego medical Center: 8; VA headquarters: 23. Source: GAO analysis. Note: After we completed our analysis, Washington, D.C., medical center personnel provided documentation that one of the missing items--a new computer monitor--had been located. This information is not reflected in the table. [End of table] Because of the lack of user-level accountability and the failure to consistently update inventory records for changes in inventory status and user location, VA officials at our test locations could not determine the user or type of data stored on the 53 missing IT equipment items that could have stored sensitive personal information and, therefore, the risk posed by the loss of these items. The details of our test work at each location follow. Washington, D.C., Medical Center: Our physical inventory existence testing at the Washington, D.C., medical center identified an estimated 28 percent failure rate[Footnote 28] related to missing items in the recorded universe of 8,728 IT equipment items. Our analysis determined that the primary cause of these high control failure rates was a lack of coordination and communication between medical center IRM and property management personnel to assure that documentation on IT items in physical inventory was updated in the property management system when changes occurred. VA records management policy[Footnote 29] that implements federal records management law and NARA guidance[Footnote 30] requires the creation and maintenance of records of essential transactions, such as creating a timely record of newly acquired IT equipment in the property management system, and recording timely updates for changes in the status of IT equipment, including transfers, turn-ins, and replacement of equipment, and disposals. The medical center's IT equipment inventory records included 550 older IT equipment items that property management officials told us should have been removed from active inventory. Because the inventory status fields for these items were either blank or indicated the items were "in use," we included these items in the universe of current inventory for purposes of our statistical sample. Of the 44 missing IT equipment items identified in our statistical tests at the Washington, D.C., medical center, 9 items related to the 550 older IT equipment items of questionable status. Washington, D.C., medical center officials asserted that because of their age, these items would likely have been turned in for disposal. However, because the property system had not been updated to reflect a turn-in or disposal and no hard copy documentation had been retained, it was not possible to determine whether any of the 44 missing IT equipment items, including 19 items that could have stored sensitive personal information, had been sent to disposal or if any of them were lost or stolen. For other IT equipment items that could not be located during our existence testing, IRM or property management officials were able to provide documentation created and saved outside the property management system that showed several of these items had been turned in for disposal without recording the corresponding inventory transaction in the property management system. In March 2006, the Washington, D.C., medical center initiated an automated process for electronic notification and documentation of property turn-ins in the property management system. If effectively implemented, the electronic process should help resolve this problem going forward. With regard to the use and type of data stored on the 19 computers that our tests identified as missing, Washington D.C., medical center officials could not tell us the users or the types of data that would have been on these computers. This is because local medical center property management procedures call for recording the local IRM organization as the user for most IT equipment in the property management system, rather than the actual custodian or user of the IT equipment. Indianapolis Medical Center: The Indianapolis medical center had an estimated failure rate of 6 percent[Footnote 31] related to missing items in the recorded universe of 7,614 IT equipment items. However, our test results do not allow us to conclude that the center's controls over existence of IT equipment inventory are effective. Our statistical tests identified 9 missing IT equipment items, including 3 items that could have stored sensitive personal and medical information. Of the 3 missing items that could have stored sensitive information, medical center inventory records showed that 2 of these items were medical devices assigned to the radiology unit. Although medical center officials provided us with turn- in documentation for one of these items--a magnetic resonance imaging (MRI) machine that had just been disassembled and removed from service-- the documentation did not match the bar code (property identification number) or the serial number for our sample item, indicating possible recordkeeping errors. The user of the third item, a computer, was not known. In addition, our review of Indianapolis medical center purchase card records determined that some IT equipment items that were not included in property inventory records had been acquired with a government purchase card. We found that VA purchase card policy[Footnote 32] does not require cardholders to notify property management officials of the receipt of property items acquired with a purchase card, including IT equipment. As a result, there is no asset visibility[Footnote 33] or accountability for these items. Further, there is no assurance that sensitive personal data, medical data, or both that could be stored on these items are properly safeguarded. San Diego Medical Center: We estimated an overall failure rate of 10 percent[Footnote 34] related to missing items in the San Diego medical center's recorded universe of 11,604 IT equipment items. Our statistical tests at the San Diego medical center identified 17 missing IT equipment items, including 8 items that could have stored sensitive personal data and information. San Diego medical center officials could not tell us the user or type of data that would have been stored on the missing computers. San Diego medical center officials noted that some of the missing items were older IT equipment that would no longer be in use. However, without valid turn-in documentation, it is not possible to determine whether these IT equipment items were disposed of without creating the appropriate transaction record or if any of these items, including items that could have stored sensitive personal and medical information, were lost, stolen, or misappropriated without detection. Our tests also determined that San Diego medical center officials were not following VA policy for physical inventory control and accountability of IT equipment. Consistent with a finding in our July 2004 report, we found that the San Diego medical center had not included IT equipment items valued at less than $5,000 in annual physical inventories. Although San Diego medical center property management officials record IT equipment ordered through the formal property acquisition process in inventory records at the time it is acquired, absent an annual physical inventory, center officials have no way of knowing whether these items are still in use or if any of these items were lost, stolen, or misappropriated. VA property management policy[Footnote 35] requires that sensitive items, including computer equipment, be subjected to annual physical inventories. At the time of our IT equipment inventory testing in January 2007, San Diego medical center officials told us that consistent with requirements in VA Handbook 7127/4, they were initiating a physical inventory of all IT equipment items, including those items valued at less than $5,000. In addition, our analysis of San Diego medical center purchase card records identified several purchases of IT equipment that had not been recorded in the medical center's inventory records. As a result, our statistical tests did not include these items. Because the medical center's IT Services and property management officials are not tracking IT equipment items that were acquired with government purchase cards, there is no accountability for these items. As a result, San Diego medical center management does not know how many of these items have not been recorded in the property inventory records or how many of these items could contain sensitive personal information. If San Diego medical center officials properly perform their fiscal year 2007 physical inventory, they should be able to locate and establish an accountable record for IT equipment items acquired with purchase cards that are being used within their facility. However, additional research would be required to identify all IT equipment items that were acquired with a purchase card and are being used at employees' homes or other off-site locations. San Diego medical center IT Services personnel told us that they created and maintained informal "cuff records" outside the property management system to document installation and removal of IT equipment because property management officials did not permit them to have access to the property management system. In addition, IT Services personnel did not provide information from their informal cuff records to property management officials so that they could update the formal records maintained in property management system. As a result, the formal IT equipment inventory records saved in the property management system remained out-of-date, while more accurate records were maintained as separate IT Services files outside the formal system and were not available for management decision making. Further, San Diego IT Services personnel were not provided handheld scanners so that they could electronically update inventory records when they installed or removed IT equipment. The San Diego medical center IT Services' informal cuff records create internal control weaknesses because they do not provide reasonable assurance of furnishing information the agency needs to conduct current business. VA Headquarters Offices: We statistically tested a random sample of VA headquarters IT equipment items, which included IT equipment for each headquarters office. Based on our sample, we estimate an 11 percent failure rate[Footnote 36] related to missing items in the VA headquarters recorded universe of 25,353 IT equipment items. In addition, our tests of VA headquarters IT inventory identified 53 missing IT equipment items, including 23 computers that could have stored sensitive personal information. VA headquarters officials could not tell us the use or type of information that would have been stored on the missing computers. Table 3 identifies missing IT equipment items in our stratified sample by VA headquarters office. Table 3: Number of Missing IT Equipment Items by Headquarters Office and Missing Items That Could Have Stored Sensitive Personal Data and Information: Test location: Acquisition and Materiel; Number of missing IT items in stratified sample: 0 of 10; Missing items with data storage capability: 0. Test location: General Counsel; Number of missing IT items in stratified sample: 2 of 10; Missing items with data storage capability: 0 of 2. Test location: Information and Technology; Number of missing IT items in stratified sample: 9 of 94; Missing items with data storage capability: 6 of 9. Test location: Policy and Planning; Number of missing IT items in stratified sample: 0 of 10; Missing items with data storage capability: 0. Test location: Veterans Health Administration; Number of missing IT items in stratified sample: 17 of 95; Missing items with data storage capability: 7 of 17. Test location: Veterans Benefits Administration; Number of missing IT items in stratified sample: 24 of 93; Missing items with data storage capability: 10 of 24. Test location: All other[A]; Number of missing IT items in stratified sample: 1 of 32; Missing items with data storage capability: 0 of 1. Source: GAO analysis. [A] All other includes 17 additional VA headquarters organizations. The missing item in this category related to the Human Resource Management Office. [End of table] We found that VA headquarters property records were incomplete and out- of-date, particularly with regard to users and locations. VA headquarters officials told us that IT coordinators had access to the headquarters property system for purposes of updating records for their units. However, we found that the IT coordinators maintained informal spreadsheets, or cuff records, to track IT equipment assigned to their units instead of updating IT equipment records in the formal VA headquarters property system. As stated previously, the use of informal cuff records creates an internal control weakness because management does not have visibility over this information for decision making purposes. VA headquarters officials also told us that various headquarters offices acquire IT equipment using government purchase cards and that these items are not identified and recorded in inventory unless they are observed coming through the mail room or they are identified during physical inventories. As previously discussed, VA purchase card policy does not require purchase card holders to notify property management officials at the time they receive IT equipment and other property acquired with government purchase cards. Pervasive Lack of User-Level Accountability for IT Equipment at Case Study Locations: VA management has not enforced VA property management policy and has generally left implementation decisions up to local organizations, creating a nonstandard, high-risk environment. Although VA property management policy establishes guidelines for user-level accountability,[Footnote 37] the three medical centers we tested assigned accountability for most IT equipment to their IRM or IT Services organizations, and VA headquarters organizations tracked IT equipment items through their IT inventory coordinators. However, because these IT personnel and IT coordinators did not have possession (physical custody) of all IT equipment under their purview, they were not held accountable for IT equipment determined to be missing during physical inventories. This weak overall control environment at the four case study locations resulted in a pervasive lack of user-level accountability for IT equipment. Absent user-level accountability, accurate information on the using organization and location of IT equipment is key to maintaining asset visibility and control over IT equipment items. The high failure rates in our tests for correct user organization and location of IT equipment, shown in table 4, underscore the lack of user-level accountability at the four case study locations. The lack of accountability has in turn resulted in a lax attitude about controlling IT equipment. As a result, for the four case study locations, we concluded that under the current lax control environment, essentially no one was accountable for IT equipment. Table 4: Estimated Percentage of IT Inventory Control Failures Related to Correct User and Location at the Four Test Locations: Test location: Washington, DC, medical center; Incorrect user organization: 80%; (72% to 87%); Incorrect user location: 57%; (49% to 64%). Test location: Indianapolis, IN, medical center; Incorrect user organization: 69%; (60% to 78%); Incorrect user location: 23%; (15% to 33%). Test location: San Diego, CA, medical center; Incorrect user organization: 70%; (61% to 78%); Incorrect user location: 53%; (43% to 63%). Test location: VA headquarters organizations; Incorrect user organization: 11%; (8% to 15%); Incorrect user location: 44%; (37% to 51%). Source: GAO analysis. Note: The percentages represent point estimates and the two-sided, 95 percent confidence interval. [End of table] Our statistical tests found numerous instances where inventory records were not updated when equipment was transferred to another VA unit, moved to another location, or removed from a facility. We also found that critical inventory system data fields, such as user and location, were often blank. Completion of these data fields would have created records of essential transactions for IT inventory events. Because property management system inventory records were incomplete and out- of-date, it is not possible to determine the timing or events associated with lost IT equipment as a basis for holding individual employees accountable. In addition to failures in our tests for accurate user organization and location, we found that the inventory system data field for identifying IT coordinators at headquarters units was often blank or incorrect. The IT coordinator role, which is unique to VA headquarters offices, is intended to provide an additional level of control for tracking and managing assignment of IT equipment within each headquarters organizational unit. Our tests for accurate and complete information on headquarters IT coordinators found 85 errors out of a sample of 344 records tested. We estimated the failure rate for the IT coordinator records at VA headquarters units to be 47 percent.[Footnote 38] Further, although VA headquarters officials told us they use hand receipts[Footnote 39] for user-level accountability of mobile IT equipment that can be removed from VA offices for use by employees who are on travel or are working at home, we found this procedure was not used consistently. For example, we requested hand receipts for 15 mobile IT equipment items in our statistical sample that were being used by VA headquarters employees. These items either could be or were taken off-site. We received 9 hand receipts--1 that had expired, 6 that were dated after the date of our request, and 2 that were valid. Officials at the three medical centers we tested were able to provide hand receipts for IT equipment that was being used by their employees at home. Officials at all four case study locations expressed concerns that it would be difficult and burdensome to implement user-level accountability for IT equipment, particularly in the case of shared workstations used by multiple employees. However, Washington, D.C., medical center officials initiated actions to establish user-level accountability for individual employees and unit heads who have shared workstations. In March 2007, Washington, D.C., medical center officials implemented a policy for user-level accountability and began training their employees on the new requirements. The new policy requires employees to sign personal custody receipts for IT equipment assigned to them, and it requires supervisors to be responsible for IT equipment that is shared among staff in their sections. The policy states that users of IT equipment will be held accountable for acts deemed inappropriate or negligent and that employees are personally and financially responsible for loss, theft, damage, or destruction of government property caused by negligence. VA headquarters officials told us that they are considering approaches for implementing a VA-wide policy for user-level accountability of IT equipment. Errors in IT Equipment Inventory Status and Item Description Information: As shown in table 5, we also found some problems with the accuracy of IT equipment inventory records, including inaccurate information on status (e.g., in use, turned-in, disposal), serial numbers, model numbers, and item descriptions. The estimated overall error rates for these tests were lower than the error rates for the other control attributes we tested, and the Indianapolis medical center had no errors. Table 5: Estimated Percentage of Other IT Inventory Recordkeeping Failures at Four Test Locations: Test location: Washington, D.C., medical center; Inventory status information: 1%; (0% to 4%); Serial number: 6%; (2% to 11%); Item description: 0%; (0% to 5%); Total failures: 5%; (2% to 10%). Test location: Indianapolis medical center; Inventory status information: 0%; (0% to 2%); Serial number: 0%; (0% to 4%); Item description: 0%; (0% to 2%); Total failures: 0%; (0% to 4%). Test location: San Diego medical center; Inventory status information: 2%; (0% to 7%); Serial number: 1%; (0% to 6%); Item description: 2%; (0% to 8%); Total failures: 5%; (2% to 12%). Test location: VA headquarters organizations; Inventory status information: 0%; (0% to 2%); Serial number: 2%; (1% to 7%); Item description: 1%; (0% to 2%); Total failures: 3%; (1% to 6%). Source: GAO analysis. Note: The percentages represent point estimates and the two-sided, 95 percent confidence interval. [End of table] The errors we identified affect management decision making and create waste and inefficiency in operations. For example, inaccurate information on the status of IT equipment inventory items impairs management's ability to determine what items are available or in use. Errors in item descriptions impair management decision making on the number and types of available items and timing for replacement of these items, and serial number errors impair accountability. Further, inaccurate inventory information on the IT equipment item status, as well as the location errors discussed above, caused significant waste and inefficiency during physical inventories. Many of these errors should have been detected and corrected during annual physical inventories. Physical Inventories by Case Study Locations Identified Thousands of Missing IT Equipment Items Valued at Millions of Dollars: To assess the effect of the lax control environment for IT equipment, we asked VA officials at the case study locations covered in both our current and previous audits to provide us with information on the results of their physical inventories performed after issuance of recommendations in our July 2004 report, including Reports of Survey[Footnote 40] information on identified losses of IT equipment. VA policy[Footnote 41] requires that when property items are determined to be lost or missing, they are to be listed in a Report of Survey and an investigation is to be conducted into the circumstances of the loss before these items are written off in the property records. As of February 28, 2007, the four case study locations covered in our current audit reported over 2,400 missing IT equipment items with a combined original acquisition value of about $6.4 million as a result of inventories they performed during fiscal years 2005 and 2006. Based on information obtained through March 2, 2007, the five case study locations we previously audited had identified over 8,600 missing IT equipment items with a combined original acquisition value of over $13.2 million. Because inventory records were not consistently updated as changes in user organization or location occurred and none of the locations we audited required accountability at the user level, it is not possible to determine whether the missing IT equipment items represent recordkeeping errors or the loss, theft, or misappropriation of IT equipment. Further, missing IT equipment items were often not reported for several months and, in some cases several years, because most of the nine case study locations had not consistently performed required annual physical inventories or completed Reports of Survey promptly. Although physical inventories should be performed over a finite period, at most of the nine case study locations these inventories were not completed for several months or even several years while officials performed extensive searches in an attempt to locate missing items before preparing Reports of Survey to write them off. According to VA Police and security specialists,[Footnote 42] it is very difficult to conduct an investigation at this point because the details of the incidents cannot be determined. As law enforcement officers, VA Police are trained in investigative techniques that could potentially track and recover lost and missing items if promptly reported. Further, because VA Police are responsible for facility security, consistent reporting of lost and missing IT equipment to the Chief of Police at each VA medical center or federal law enforcement officers responsible for building security at VA headquarters locations could identify patterns of vulnerability that could be addressed through upgraded security plans. Physical Inventories Performed by Four Case Study Locations Identify Significant Numbers of Missing IT Equipment Items: The timing and scope of the physical inventories performed by the four case study locations in our current audit varied. For example, the Indianapolis medical center had been performing annual physical inventories in accordance with VA policy for several years. As a result, IT equipment inventory records were more accurate and physical inventories identified fewer missing items than most locations tested. The Washington, D.C., medical center performed a wall-to-wall physical inventory in response to our July 2004 report, which found that previously performed physical inventories of IT equipment were ineffective. In this case, inventory results reflected several years of activity involving IT inventory records that had not been updated and lost and missing IT equipment items that had not previously been identified and reported. Although the San Diego medical center had performed periodic physical inventories, it had not followed VA policy for including sensitive items, such as IT equipment valued at less than $5,000. As a result, the San Diego medical center's Reports of Survey are not a good indicator of the extent of lost and missing IT equipment at this location. The fiscal year 2006 VA headquarters physical inventory identified IT equipment items that may have been lost or missing for several years without detection or final resolution. For example, VA headquarters officials told us that during renovations of headquarters offices 10 years ago, IT equipment was relocated to office space designated as storerooms. When this space had to be vacated for renovation, the IT equipment had to be relocated, and many items were sent to disposal. According to VA headquarters officials, accountability for individual IT equipment items was not maintained during the renovation or disposal process. This weak overall control environment presents an opportunity for theft, loss, or misappropriation to occur without detection. As of February 28, 2007, based on inventories they performed during fiscal years 2005 and 2006, the four case study locations covered in our current audit reported over 2,400 missing IT equipment items with a combined original acquisition value of about $6.4 million. Table 6 provides information on the results of physical inventories performed by our four current case study locations. Table 6: Summary of Physical Inventories and Missing IT Equipment Identified by the Four Current Case Study Locations as of February 28, 2007: Test location: Washington, D.C., medical center; Fiscal years of inventory: 2005 thru 2006; Dates of Reports of Survey: Mar. 2006 thru Oct. 2006; Number of missing items identified: 1,133; Original acquisition value of missing items: $1,758,096. Test location: Indianapolis medical center; Fiscal years of inventory: 2005; 2006; Dates of Reports of Survey: Dec. 2004; Oct. 2006; Number of missing items identified: 6; 112; Original acquisition value of missing items: $23,206; $79,230. Test location: San Diego medical center[A]; Fiscal years of inventory: 2005; 2006; Dates of Reports of Survey: Dec. 2004; Ongoing; Number of missing items identified: 42; 15; Original acquisition value of missing items: $135,344; $24,418. Test location: VA headquarters offices; Fiscal years of inventory: 2006 and ongoing; Dates of Reports of Survey: Not yet finalized; Number of missing items identified: 1,162; Original acquisition value of missing items: $4,385,444. Source: GAO analysis. [A] The San Diego medical center IT Services personnel inventoried only items valued at $5,000 or more. [End of table] In response to our test work, in January 2007, the Washington, D.C., medical center prepared an additional Report of Survey to write off 699 older IT equipment items valued at $794,835 that had not been located or removed from current inventory. The VA headquarters physical inventory had initially identified about 2,700 missing IT equipment items, and officials told us that their research has resolved over half of the discrepancies. VA headquarters officials told us that they have not yet prepared a Report of Survey because they believe some of their missing IT equipment items may still be located. Physical Inventories by Five Locations Previously Audited Also Identify Significant Numbers of Missing IT Equipment Items: We also followed up with the five other case study locations[Footnote 43] that we previously audited to determine the results of physical inventories performed in response to recommendations in our July 2004 report. As of the end of our fieldwork in February 2007, the Tampa, Florida, medical center had not yet completed its physical inventory. In addition, the Houston, Texas, medical center's fiscal year 2005 physical inventory procedures continued to exclude IT equipment valued under $5,000 because the center had followed inaccurate guidance from its VISN. Our standards for internal control require federal agencies to have policies and procedures for ensuring that the findings of audits and other reviews are promptly resolved. In accordance with these standards, managers are to (1) promptly evaluate findings from audits and other reviews, including those showing deficiencies and recommendations; (2) determine proper actions in response to findings and recommendations; and (3) complete, within established time frames, all actions that correct or otherwise resolve the matters brought to management's attention. The failure to ensure that VA organizations take appropriate, timely action to address audit findings and recommendations indicates a significant control environment weakness with regard to a "tone at the top" and does not set an example that supports performance-based management and establishes controls that serve as the first line of defense in safeguarding assets and preventing and detecting errors. Based on information obtained through March 2, 2007, the five case study locations we previously audited had identified over 8,600 missing IT equipment items with a combined original acquisition value of over $13.2 million. As noted in table 7, of the three medical centers that completed their physical inventories, the Los Angeles, California, medical center reported over 8,400 missing IT equipment items valued at over $12.4 million. Table 7: Summary of Physical Inventories and Missing IT Equipment Identified by Five Case Study Locations Previously Audited as of March 2, 2007: Medical center test location: Atlanta, GA; Fiscal year of inventory: Ongoing since 2005; Dates of Reports of Survey: Not yet prepared; Number of missing items: 195; Original acquisition value of missing items: $254,666. Medical center test location: Houston, TX[A]; Fiscal year of inventory: 2005; Dates of Reports of Survey: Mar. 2005; Number of missing items: 3; Original acquisition value of missing items: $79,703. Medical center test location: Los Angeles, CA; Fiscal year of inventory: 2006; Dates of Reports of Survey: Not yet prepared; Number of missing items: 8,402; Original acquisition value of missing items: $12,424,860. Medical center test location: San Francisco, CA; Fiscal year of inventory: 2005; Dates of Reports of Survey: Oct. 2004 thru Dec. 2005; Number of missing items: 68; Original acquisition value of missing items: $463,373. Medical center test location: Tampa, FL; Fiscal year of inventory: Ongoing since Jan. 2006; Dates of Reports of Survey: Not yet prepared; Number of missing items: Unknown; Original acquisition value of missing items: Unknown. Source: GAO analysis. [A] The Houston medical center inventoried only items valued at $5,000 or more. [End of table] We found that Houston medical center property management policy did not include IT equipment within its definition of sensitive items requiring annual physical inventories. As a result, the Houston medical center inventoried items valued at $5,000 or more and reported 3 missing IT equipment items valued at $79,703. Houston medical center officials told us that they are now complying with VA policy to include all IT equipment in their current annual physical inventory effort. The Atlanta medical center identified 195 missing IT equipment items valued at $254,666, and the San Francisco medical center reported a total of 68 missing IT equipment items valued at $463,373. Three of the five medical centers--in Atlanta, Los Angeles, and Tampa--had not yet prepared Reports of Survey on the missing items identified in their physical inventories. Physical Security Weaknesses Increase Risk of Loss, Theft, and Misappropriation of IT Equipment and Sensitive Data: Our investigator's inspection of physical security at officially designated IT warehouses and storerooms that held new and used IT equipment found that most of these storage facilities met the requirements in VA Handbook 0730/1, Security and Law Enforcement. However, not all of the formally designated storage locations had required motion detection alarm systems and special door locks. In response to our findings, physical security specialists at the four case study locations told us that they had recommended that the needed mechanisms be installed. We also found numerous instances of IT equipment storage areas at VA headquarters offices that had not been formally designated as IT storerooms, and these informal IT storage areas did not meet VA physical security requirements. In addition, although VA requires that hard drives of IT equipment and medical equipment be sanitized prior to disposal to prevent unauthorized release of sensitive personal and medical information, we found weaknesses in the disposal process that pose a risk of data breach.[Footnote 44] For example, our tests of computer hard drives in the excess property disposal process found that hard drives at two of the four case study locations that had not yet been sanitized contained hundreds of names and Social Security numbers. We also found that some of the hard drives had been in the disposal process for several years without being sanitized, creating an unnecessary risk that sensitive personal information protected under the Privacy Act of 1974[Footnote 45] and personal medical information accorded additional protections under HIPAA[Footnote 46] could be compromised. Weaknesses in physical security heighten the risk of data breach related to sensitive personal information residing on hard drives in the property disposal process that have not yet been sanitized. Weaknesses in Procedures for Controlling Excess Computer Hard Drives: As previously discussed, VA requires that hard drives of excess computers be sanitized prior to reuse or disposal because they can store sensitive personal and medical information used in VA programs and activities, which could be compromised or used for unauthorized purposes. For example, our limited tests of excess computer hard drives in the disposal process that had not yet been sanitized found 419 unique names and Social Security numbers on three of the six Board of Veterans Appeals hard drives and one record on one of two VHA hard drives we tested. Our tests of five San Diego medical center hard drives that had not yet been sanitized found that one hard drive held at least 20 detailed patient medical histories, including 5 histories that contained Social Security numbers. Our limited tests of hard drives that were identified as having been subjected to internal or contractor data sanitization procedures did not find data remaining on these hard drives. However, our limited tests identified some problems that could pose a risk of data breach with regard to sensitive personal and medical information on hard drives in the disposal process that had not yet been sanitized. For example, our IT security specialist found that five hard drives stored in a bin labeled by the San Diego medical center as holding hard drives that had not been erased had in fact been sanitized. The lack of proper segregation and tracking of hard drives in the sanitization process poses a risk that some hard drives could make it through this process and be selected for reuse without having been sanitized. Further, based on the file dates on some of the computer hard drives that had not yet been sanitized at the San Diego and Indianapolis medical centers, our IT security specialist noted excessive delays--up to 6 years--in performing data sanitization once the computer systems had been identified for removal from use and disposal. Excessive delays in completing hard drive sanitization and disposal procedures pose an unnecessary risk when sensitive personal and medical information that is no longer needed is not removed from excess computer hard drives in a timely manner. Physical Security Weaknesses at IT Storage Locations Pose Risk of Data Breach: VA Handbook 0730/1, Security and Law Enforcement, prescribes physical security requirements for storage of new and used IT equipment. Specifically, the Handbook requires warehouse-type storerooms to have walls to ceiling height with either masonry or gypsum wall board reaching to the underside of the slab (floor) above. IRM storerooms are required to have overhead barricades that prevent "up and over" access from adjacent rooms. Warehouse, IRM, and medical equipment storerooms are all required to have motion intrusion detection alarm systems that detect entry and broadcast an alarm of sufficient volume to cause an illegal entrant to abandon a burglary attempt. Intrusion detection alarms for storerooms outside facility grounds, such as outpatient clinics, are required to be connected remotely to a commercial security alarm monitoring firm, local police department, or security office charged with building security. Finally, IRM storerooms also are required to have special key control, meaning room door lock keys and day lock combinations that are not master keyed for use by others. Most of the designated IT equipment storage facilities at the four case study locations met VA IT physical security requirements in VA Handbook 0730/1; however, we identified some deficiencies. For example, our investigator found that the Washington, D.C., and San Diego medical center IRM equipment storerooms lacked motion intrusion detection alarm systems and the Washington, D.C., medical center IRM storeroom did not meet door locking requirements. Based on our investigator's findings, physical security specialists at the San Diego and Washington, D.C., medical centers told us they have recommended that required intrusion detectors be installed in their IRM storerooms. In addition, the Washington, D.C., medical center reduced the number of keys to its IRM storerooms and changed storeroom locks to meet established requirements. Designated IT equipment storage facilities at the Indianapolis medical center met VA physical security requirements. Despite the established physical security requirements, we found numerous informal, undesignated IT equipment storage locations that did not meet VA physical security requirements. For example, our investigator observed an IT workroom at the Indianapolis medical center where new IT equipment was placed on the floor. This room lacked a motion detection alarm system and the type of locking system prescribed in VA policy. Indianapolis VA Police told our investigator that such a level of security was not required for this room under VA policy, because it was not designated as a storeroom. In addition, at the VA headquarters building, our investigator found that the physical security specialist was unaware of the existence of IT equipment in some storerooms. Thus, these storerooms had not been subjected to required physical security inspections. VA Police and physical security specialists at our test locations agreed with our investigator's assessment that the physical security of these IT storerooms was inadequate. During our statistical tests, we observed one IT equipment storeroom in the VA headquarters building IT Support Services area that had a separate wall, but no door. As shown in figure 2, the wall opening into the storeroom had yellow tape labeled "CAUTION" above the doorway. The store room was within an IT work area that had dropped ceilings that could provide "up and over" access from adjacent rooms, such as the employee store, and no alarm or intrusion detector. This storeroom did not meet VA's physical security requirements for motion intrusion detection and alarms and secure doors, locks, and special access keys. Figure 2: Photograph of Unsecured IT Equipment Storeroom in the VA Headquarters Building: [See PDF for image] Source: GAO. [End of figure] In another headquarters building, which housed VA's Office of General Counsel, we observed excess IT equipment, including computers with hard drives that had been awaiting turn-in and disposal for several months. This IT equipment was stacked in the corners of a large work area that had multiple doors and open access to numerous individuals, including vendors, contractors, employees, and others. Because our limited tests found sensitive personal data and information on hard drives that had not yet been sanitized, the failure to provide adequate security leaves this information vulnerable to data breach. Further, because software that can be used to image, or copy, this information is readily available, it is important to provide adequate security for these items. For example, imaging software, such as "Foremost," which was one of the imaging software products used by our IT security specialist, can be downloaded at no cost from the Internet and used to copy information from one hard drive to another in a few minutes. Thus, it is possible for a data breach to occur without theft of the IT equipment on which the data reside. We also found that VA headquarters IT coordinators used storerooms and closets with office-type door locks to store IT equipment that was not currently in use. Other headquarters organizations stored laptops that were in the "loaner pool" for use by employees on travel or at home in locked filing cabinets in open areas. In addition, during our test work, we observed that very few IT equipment items had been secured by locked cables. Physical security of IT equipment is of particular concern at the VA medical centers because these centers provide open access to visitors, students, contractors, and others. The lack of secure storage leaves this IT equipment and any sensitive personal information stored on this equipment vulnerable to theft, loss, misappropriation, and data breach. VA Actions to Improve IT Management and Controls Have Been Limited: Although VA has strengthened existing property management policy[Footnote 47] in response to recommendations in our July 2004 report, issued several new policies to establish guidance and controls for IT security, and reorganized and centralized the IT function within the department under the CIO, these actions have not yet been fully implemented. For example, the CIO has no formal responsibility for medical equipment that stores or processes patient data. VA headquarters CIO officials agree that this is an area of vulnerability that needs to be addressed. In addition, the new CIO organization structure does not address roles or necessary coordination between IRM and property management personnel with regard to inventory control of sensitive IT equipment items. The Assistant Secretary for Information and Technology, who serves as the CIO, told us that his staff is aware of this problem and the new CIO organization structure includes a unit that will have responsibility for IT equipment asset management once it becomes operational. However, this unit has not yet been funded or staffed. Regarding new policies, on October 11, 2005, VA revised its Handbook on materiel management procedures to emphasize that annual inventory requirements for sensitive items valued at under $5,000 include IT equipment, and specifically lists these items as including desktop and laptop computers, CD drives, printers, monitors, and handheld portable telecommunication devices. However, as noted in this report, VA has not ensured that sensitive IT equipment items valued at less than $5,000 have been subjected to annual physical inventories. In addition, on March 9, 2007, at the time we began briefing VA management on the results of our audit, VA's Office of Information and Technology issued a policy[Footnote 48] that includes assignment of user-level accountability for certain IT equipment, including external drives, desktop and laptop computers, and mobile phones that can be taken offsite for individual use. However, this policy had not yet been coordinated with property management officials who will be responsible for implementing the policy. On August 4, 2006, VA issued a new directive entitled Information Security Program, which requires, in part, periodic evaluations and testing of the effectiveness of all management, operational, and technical controls and calls for procedures for immediately reporting and responding to security incidents. A thorough understanding of the IT inventory control process and required internal controls within this process will be key to effective testing and oversight. Managers were not always aware of the inherent problems in their IT inventory processes discussed in this report, including the lack of required controls. Because the directive does not provide specific information on how these procedures will be carried out, the CIO is developing supplementary user guides. Effective implementation will be key to the success of VA IT policy and organizational changes. Conclusions: Poor accountability and a weak control environment have left the four VA case study organizations vulnerable to continuing theft, loss, and misappropriation of IT equipment and sensitive personal data. To provide a framework for accountability and security of IT equipment, the Secretary of Veterans Affairs needs to establish clear, sufficiently detailed mandatory policies rather than leaving the details of how policies will be implemented to the discretion of local VA organizations. Keys to safeguarding IT equipment are effective internal controls for the creation and maintenance of essential transaction records; a disciplined framework for specific, individual user-level accountability, whereby employees are held accountable for property assigned to them, including appropriate disciplinary action; and maintaining adequate physical security over IT equipment items. Although VA management has taken some actions to improve inventory controls, strengthening the overall control environment and establishing and implementing specific IT equipment controls will require a renewed focus, oversight, and continuing commitment throughout the organization. Recommendations for Executive Action: We recommend that the Secretary of Veterans Affairs require that the medical centers and VA headquarters offices we tested and other VA organizations, as appropriate, take the following 12 actions to improve accountability of IT equipment inventory and reduce the risk of disclosure of sensitive personal data, medical data, or both. To help minimize the risk of loss, theft, and misappropriation of government IT equipment used in VA operations, we recommend that the Secretary take the following eight departmentwide actions. * Revise VA property management policy and procedures to include detailed requirements for what transactions must be recorded to document inventory events and to clearly establish individual responsibility for recording all essential transactions in the property management process. * Revise VA purchase card policy to require purchase card holders to notify property management officials of IT equipment and other property items acquired with government purchase cards at the time the items are received so that they can be recorded in property management systems. * Establish procedures to require specific, individual user-level accountability for IT equipment. In implementing this recommendation, consideration should be given to making the unit head, or a designee, accountable for shared IT equipment. * Enforce user-level accountability and IT coordinator responsibility by taking appropriate disciplinary action, including holding employees financially liable, as appropriate, for lost or missing IT equipment. * Establish specific time frames for finalizing a Report of Survey once an inventory has been completed so that research on missing items is completed expeditiously and does not continue indefinitely without meeting formal reporting requirements. * Establish a mechanism to monitor adherence by the San Diego and Houston medical centers and other VA organizations, as appropriate, to VA policy for performing annual inventories of sensitive items under $5,000, including IT equipment. * Require that IRM and IT Services personnel at the various medical centers be given access to the central property database and be furnished with hand scanners so they can electronically update the property control records, as appropriate, during installation, repair, replacement, and relocation or disposal of IT equipment. * Require physical security personnel to perform inspections of buildings and storage facilities to identify informal and undesignated IT storage locations so that security assessments are performed and corrective actions are implemented, where appropriate. To assure inventory accuracy and prompt resolution of inventory discrepancies and improve security of IT equipment and any sensitive data stored on that equipment, we recommend that the Secretary require the CIO to take the following four actions. * Establish a formal policy requiring a review of the results of annual inventories to ensure that IT equipment inventory records are properly updated and no blank fields remain. * Establish a process for reviewing Reports of Survey for lost, missing, and stolen IT equipment items to identify systemic weaknesses for appropriate corrective action. * Establish and implement a policy requiring IRM personnel and IT coordinators to inform physical security officers of the site of all IT equipment storage locations so that these store rooms can be subjected to required inspections. * Establish and implement a policy for reviewing the results of physical security inspections of IT equipment storerooms and ensure that needed corrective actions are completed. Agency Comments and Our Evaluation: In written comments dated June 22, 2007, on a draft of this report, VA generally agreed with our findings, noted significant actions under way, and concurred on the 12 recommendations. For example, with regard to establishing detailed requirements for what transactions must be recorded to document inventory events, VA stated that it is performing a comprehensive update of department policies and procedures and plans to provide additional training and equipment audits, as necessary. With regard to establishing user-level accountability, VA stated that it is developing a policy that will require (1) unit heads or their designees to sign for all IT equipment issued to their service/unit and (2) hand receipts for IT equipment at the user-level. VA also provided technical comments regarding the information in tables 6 and 7. Specifically, VA stated that our data did not specify whether the estimated value provided for missing IT equipment was based on a depreciated loss value or a replacement value. Consistent with VA's reporting requirements for its Reports of Survey on lost personal property items, which include IT equipment, we used the original acquisition value for our estimates. Accordingly, we revised the column headings in the tables to note that the reported dollar value of missing items relates to the original acquisition value. Further, VA stated that some of the missing equipment included in our estimate may, in fact, have been properly disposed of but the proper documentation was not available. As stated in our report, proper documentation of key equipment events, such as transfer, turn-in, and disposal, must be documented by an inventory transaction, financial transaction, or both, as appropriate. Because the property system had not been updated to reflect a transfer, turn-in, or disposal and no hard copy documentation had been retained, it is not possible to determine whether any of the missing IT equipment items had been properly sent to disposal, and VA has no assurance that they were not lost or stolen. As agreed with your offices, unless you announce its contents earlier, we will not distribute this report until 30 days from its date. At that time, we will send copies to interested congressional committees; the Secretary of Veterans Affairs; the Veterans Affairs Chief Information Officer; the Acting Secretary of Health, Veterans Health Administration; and the Director of the Office of Management and Budget. We will make copies available to others upon request. In addition, this report will be available at no charge on the GAO Web site at http://www.gao.gov. Please contact me at (202) 512-9095 or williamsm1@gao.gov, if you or your staff have any questions concerning this report. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. Major contributors to this report are acknowledged in appendix III. Signed by: McCoy Williams: Director: Financial Management and Assurance: [End of section] Appendix I: Objectives, Scope, and Methodology: Pursuant to a request from the Chairman and Ranking Minority Member of the House Committee on Veterans' Affairs, we audited the Department of Veterans Affairs (VA) information technology (IT) equipment inventory controls. Our audit covered the following. * An assessment of the risk of loss, theft, and misappropriation of VA IT equipment items based on statistical tests of VA IT equipment inventory at selected case study locations and our investigator's evaluations of physical security and VA law enforcement investigations of incidents of loss or theft. * Results of physical inventories of IT equipment performed by case study locations covered in this audit and our previous audit. * An assessment of the adequacy of VA's physical security and accountability procedures for IT equipment in the property disposal process. * Management actions taken or under way to address previously identified IT equipment inventory control weaknesses. We used as our criteria applicable law and VA policy, as well as our Standards for Internal Control in the Federal Government[Footnote 49] and our Internal Control Management and Evaluation Tool.[Footnote 50] To assess the control environment at our test locations, we obtained an understanding of the processes and controls over IT equipment from acquisition to issuance and periodic inventories and disposal. We performed walk-throughs of these processes at all four test locations. We reviewed applicable program guidance provided by the test locations and interviewed officials about their IT inventory processes and controls. In selecting our case study locations, we chose one location--the Washington, D.C., VA medical center--that had the most significant problems identified in our July 2004 report and two other geographically dispersed VA medical centers. We also tested inventory at VA headquarters as a means of assessing the overall control environment, or "tone at the top." Table 8 shows the VA locations selected for IT equipment inventory control testing and the number and reported value of IT equipment items at each location. Table 8: Population of VA IT Equipment at Locations Selected for Testing: VA location: Washington, D.C., medical center; Sample size and number of VA IT equipment items: 168 of 8,728[A]; Value of VA IT equipment inventory: $33,065,322. VA location: Indianapolis, IN medical center; Sample size and number of VA IT equipment items: 144 of 7,614; Value of VA IT equipment inventory: 29,101,577. VA location: San Diego, CA medical center; Sample size and number of VA IT equipment items: 148 of 11,604; Value of VA IT equipment inventory: 48,077,071. VA location: VA headquarters; Sample size and number of VA IT equipment items: 344 of 25,353; Value of VA IT equipment inventory: 31,301,951. Source: GAO analysis of VA facility IT equipment inventory. Note: The data represent current inventory at the time we pulled our samples. The reported value is the original acquisition cost. [A] Includes 4,127 leased IT equipment items. [End of table] To follow up on actions taken in response to recommendations in our July 2004 report for improving physical inventories, we obtained and reviewed information on physical inventory results at the four case study locations as well as the five other case study locations previously audited. We performed appropriate data reliability procedures, including an assessment of each VA test location's procedures for assuring data reliability, and tests to assure that IT equipment inventory was sufficiently complete for the purposes of our work. Our procedures and test work identified a limitation related to IT equipment inventory completeness at our four test locations. IT equipment inventories at the Indianapolis and San Diego medical centers and VA headquarters organizations did not include all IT equipment acquired with purchase cards or purchased directly from local vendors. Also, the Washington, D.C., medical center inventory did not include one inventory category consisting of 149 older computer monitors and workstations. This data limitation prevented us from projecting our test results to the population of IT equipment inventory at each of our four test locations. However, we determined that these data were sufficiently reliable for us to project our test results to the population of current, recorded IT equipment inventory at each of the four locations. From the universe of current, recorded IT equipment inventory at the time of our tests, we selected stratified random probability samples of IT equipment, including medical equipment with data storage capability, at each of the three medical center locations. For the 23 VA headquarters organizations, we stratified our sample by 6 major offices and used a seventh stratum for the remaining 17 organizations. With these statistically valid samples, each item in the population for the four case study locations had a nonzero probability of being included, and that probability could be computed for any item. Each sample item for a test location was subsequently weighted in our analysis to account statistically for all items in the population for that location, including those that were not selected. We performed tests on statistical samples of IT equipment inventory transactions at each of the four case study locations to assess whether the system of internal controls over physical IT equipment inventory was effective (i.e., provided reasonable assurance of the reliability of inventory information and accountability of the individual items). For each IT equipment item in our statistical sample, we assessed whether (1) the item existed (meaning that the item recorded in the inventory records could be located), (2) inventory records and processes provided adequate accountability, and (3) identifying information (property number, serial number, model number, and location) was accurate. We explain the results of our existence tests in terms of control failures related to missing items and recordkeeping errors. The results of our statistical samples are specific to each of the four test locations and cannot be projected to the population of VA IT transactions as a whole. We present the results of our statistical samples for each population as (1) our projection of the estimated error overall and for each control attribute as point estimates and (2) the two-sided, 95 percent confidence intervals for the failure rates. Our investigator supported our tests of IT physical inventory controls by assessing physical security and reporting of missing items for purposes of law enforcement investigations. As part of our assessment, our investigator interviewed VA Police at the three medical centers and federal agency law enforcement officers at VA headquarters about reports and investigations of lost, stolen, and missing IT equipment. Our investigator also met with physical security specialists at each of the test locations to discuss the results of physical security inspections and the status of VA actions on identified weaknesses. To determine if the four test locations had adequate procedures for control and removal of data from hard drives of IT equipment in the property disposal process, our IT security specialist selected a limited number of computer hard drives for testing. We attempted to test a total of 10 hard drives in each category--drives with data and drives that had been sanitized--at each of the four test locations. Because some hard drives we selected were damaged or computer systems pulled for hard drive testing did not contain hard drives, the number of hard drives actually tested was less than the number we selected for testing. At the San Diego medical center, 5 hard drives selected for testing that were labeled as unerased had in fact been sanitized, and we included these hard drives in our sanitization testing. Table 9 shows the numbers of hard drives tested at the four locations we audited. Table 9: Number of Computer Hard Drives in the Property Disposal Process Selected for Testing at Four Locations: Medical centers. Test location: Washington, D.C; Drives with data: 4; Sanitized drives: 4; Total: 8. Test location: Indianapolis; Drives with data: 5; Sanitized drives: 6; Total: 11. Test location: San Diego; Drives with data: 10; Sanitized drives: 15; Total: 25. VA headquarters offices. Test location: Veterans Health Administration; Drives with data: 2; Sanitized drives: 1; Total: 3. Test location: Board of Veterans Appeals; Drives with data: 6; Sanitized drives: 8; Total: 14. Test location: Office of Cyber Information Security; Drives with data: 3; Sanitized drives: 1; Total: 4. Test location: VA headquarters, subtotal; Drives with data: 11; Sanitized drives: 10; Total: 21. Source: GAO analysis. [End of table] In performing these tests, our specialist used SMARTTM and Foremost software. SMARTTM is a software utility that has been designed and optimized to support forensic data practitioners and information security personnel in pursuit of their respective duties and goals. SMARTTM is currently used by federal, state, and local law enforcement; U.S. military and intelligence organizations; accounting firms; and forensic data examiners. Foremost is a program used to recover files based on their headers, footers, and internal data structures. Foremost, originally developed by the United States Air Force Office of Special Investigations and the Center for Information Systems Security Studies and Research, is now available to the general public. In addition, our investigator performed physical security inspections and assessed accountability over computer hard drives in the disposal process. To identify management actions taken in response to previously identified control weaknesses, we interviewed VA officials at our test locations, walked through the IT inventory processes to observe controls as implemented, and met with VA's Chief Information Officer (CIO). We also obtained and reviewed copies of new and revised VA policies and procedures. We briefed VA managers at our test locations and VA headquarters, including VA medical center directors, VA headquarters information resource management and property management officials, and VA's CIO on the details of our audit, including our findings and their implications. On April 9, 2007, we requested comments on a draft of this report. We received comments on June 22, 2007, and have summarized those comments in the Agency Comments and Our Evaluation section of this report. We conducted our audit work from September 2006 through March 2007 in accordance with generally accepted government auditing standards, and we performed our investigative work in accordance with standards prescribed by the President's Council on Integrity and Efficiency. [End of section] Appendix II: Comments from the Department of Veterans Affairs: The Deputy Secretary Of Veterans Affairs: Washington: June 22, 2007: Mr. McCoy Williams: Director: Information Management Issues: U. S. Government Accountability Office: 441 G Street, NW: Washington, DC 205413: Dear Mr. Williams: The Department of Veterans Affairs (VA) has reviewed the Government Accountability Office's (GAO) draft report: Veterans Affairs: Inadequate Controls over IT Equipment at Selected VA Locations Pose Continuing Risk of Theft; Loss, and Misappropriation (GAO-07-505) and generally agrees with its findings. VA supports GAO's conclusion that improving the overall control environment for sensitive information technology (IT) equipment requires renewed focus, oversight, and continued commitment throughout the organization. The Department has already taken significant actions, including the recent transformation of VA's IT program to a single authority under the Chief Information Officer. This will enable the Department to centralize and standardize IT equipment accountability policies and procedures, and replicate identified IT inventory best practices across VA. Accomplishing this task will require a concerted effort by many different offices within the Department. VA will analyze why VA medical center employees were found to have used their own systems to track IT equipment assigned to their units instead of updating records through VA's existing formal control system. Accordingly, the Department will convene a formal work group to include representatives from at least the Office of Information and Technology, Office of Acquisition and Materiel Management, the Office of Security and Law Enforcement, the Veterans Health Administration, and the Office of Human Resources and Administration to ensure development of a comprehensive strategy to address all of GAO's recommendations. Additionally, during the past 9 months VA Central Office (VACO) has revised and implemented procedures to improve the reconciliation process of future annual VACO inventories. These procedures include refresher training for all Equipment Inventory Listing (EIL) Officials, incorporating property accountability and responsibility in New Employee Orientation, and strengthening controls over the employee clearance process to ensure greater property accountability as individuals depart VACO. The Department is finalizing new policy directives that will require senior IT officials at the facility level to maintain an inventory of all IT equipment. The VA Office of Acquisition and Materiel Management provides current policy regarding the use and protection of VA-owned IT equipment. Department officials will reinforce those policies across all business lines. I appreciate your efforts to illuminate continuing weaknesses that undermine VA's efforts to protect the sensitive personal information the Department needs to provide services to our Nation's veterans. The enclosure discusses each of GAO's recommendations in detail. It also suggests some technical clarification for the report's overall accuracy. Sincerely yours, Signed by: Gordon H. Mansfield: Enclosure: Department of Veterans Affairs (VA) comments to: Government Accountability Office (GAO) draft report Veterans Affairs: Inadequate Controls over IT Equipment at Selected VA Locations Pose Continuing Risk of Theft, Loss, and Misappropriation (GAO-07-505): To help minimize the risk of loss, theft, and misappropriation of government IT equipment used in VA operations, GAO recommends that the Secretary of Veterans Affairs take the following departmentwide actions. * Revise VA property management policy and procedures to include detailed requirements for what transactions must be recorded to document inventory events and to clearly establish individual responsibility for recording all essential transactions in the property management process. Concur-VA is performing a comprehensive update of Department policies and procedures on equipment management, and we will include detailed requirements as appropriate. To improve awareness of and compliance with existing policies and procedures, the Veterans Health Administration (VHA) recently issued 11 standard operating procedures with detailed guidance to supplement VA policy and procedures on equipment management. In addition, VA's Office of Acquisition and Materiel Management (OA&MM) is working with VHA, the Veterans Benefits Administration, the National Cemetery Administration and the Office of Information and Technology (OI&T) to identify specific ways to improve compliance with VA's policies and procedures on equipment management. Topics under review include: * launch of a nationwide training program on equipment accountability; * review of logistical organizational structures; * implementation of a logistics certification program; and: * issuance of a memorandum to facility directors emphasizing the importance of equipment management and recommended actions to strengthen local programs. Finally, OA&MM is collaborating with VHA's Office of Business Oversight to include additional areas of audit for equipment management. This will also include a review of audit findings to determine where policies and procedures need enhancement. * Revise VA purchase card policy to require purchase card holders to notify property management officials of IT equipment and other property items acquired with a government purchase card at the time the items are received so that they can be recorded in property management systems. Concur - The Office of Finance will revise VA purchase card policy to require purchase card holders to notify property management officials of IT equipment and other property items acquired with a government purchase card at the time the items are received so that they can be recorded in property management systems. Target completion date is July 2007. On page 7, under "Requests and Ordering of IT Equipment," the sentence that begins on line 7 is no longer applicable. Headquarters offices may no longer place individual orders or use purchase cards to acquire IT equipment per recent guidance from the Chief Information Officer (CIO). * Establish procedures to require specific, individual user-level accountability for IT equipment In implementing this recommendation, consideration should be given to making the unit head, or a designee, accountable for shared IT equipment: Concur - The Office of Information and Technology is developing an operations policy that requires the senior IT official at a facility to maintain an inventory of all IT equipment and to have the business/ service unit head or designee sign for all IT equipment issued to their service/unit. Also, the policy will require issuing of hand receipts for IT equipment at the user-level. * Enforce user-level accountability and IT coordinator responsibility by taking appropriate disciplinary action, including holding employees financially liable, as appropriate, for lost or missing IT equipment: Concur-For VA Central Office (VACO), O/A's Property Management Division is responsible for processing Report of Surveys from Central Office organizations for lost or damaged VA property. The Property Management Division will expeditiously assign the Report of Survey to a Survey Board to determine if the employee(s) should be held financially liable or if disciplinary actions should be taken as a result of the loss, damage, or destruction of the property. When the Survey Board recommends that an employee should be held financially liable, a copy of the Report of Survey, complete findings and recommendations will be sent directly to the employee, instructing them to submit a written concurrence or objections to the findings within 10 working days to the approving official. An employee's failure to submit a written reply to the approving official within 10 working days will be submitted as acceptance of financial liability. Employees have the right to have an adverse survey finding reviewed by higher authority if requested within 10 working days after receiving notification of findings. The decision of the higher approving authority will be final. VA supervisors are responsible for ensuring that their employees are held accountable for VA property assigned to them in performance of their job. Supervisors are also responsible for any property not directly assigned to an individual employee in their area. OIA's Property Management Division is also implementing new VACO procedures to increase supervisory awareness and accountability for property lost, damaged, or destroyed by employees under their supervision, when supported by findings and recommendations from the Survey Board. This procedure includes the issuance of a memorandum from the approving official and Report of Survey findings, to the employee's supervisor with a courtesy copy to the second-line supervisor and Employee Relations, Central Office Human Resources Service, recommending that the supervisor take corrective action, including disciplinary action as appropriate, against the employee. Employee Relations, Central Office Human Resources Service, will follow up with the employee's immediate and second-line supervisors to ensure appropriate action is taken within 45 calendar days. * Establish specific timeframes for finalizing a Report of Survey once an Inventory has been completed so that research on missing items is completed in an expeditious manner and does not continue indefinitely without meeting formal reporting requirements. Concur-OI&T is developing an operations policy that will include the requirement that a Report of Surrey will be completed within 15 working days following completion of annual inventory. In VACO, after an annual Equipment Inventory is conducted, the Not Found Property Report must be reconciled within 15 days of receiving the report. (in the past, the Office of Administration [OA) has honored organizational requests to extend this timeframe for equipment believed misplaced rather than stolen.) Equipment that cannot be reconciled must immediately be reported on a Report of Survey to the Property Management Division. Property Management Division will immediately conduct an investigation on the missing equipment by forming a Board of Survey. Recent memorandums to the various VACO department heads addressed these procedures. Details were also provided to Equipment Inventory List (EIL) Officials in VACO. * Establish a mechanism to monitor San Diego, California, and Houston, Texas, medical center and other VA organization adherence as appropriate, to VA policy for performing annual Inventories of sensitive items under $5,000, including IT equipment. Concur-The Veterans Health Administration's (VHA) Prosthetics and Clinical Logistics Office (P&CLO) is monitoring all VA medical centers to ensure adherence to policy requiring an annual inventory of all items. To facilitate this effort, all facilities are required to report their Electronic Inventory List compliance on a quarterly basis to the Deputy Under Secretary for Health for Operations and Management (DUSHOM). This monitoring includes sensitive items under $5,000. P&CLO will disseminate further direction to the field on sensitive items through annual training, reminders at the materiel management conference calls, and e-mails. * Require that IRM and IT Services personnel at the various medical centers be given access to the central property database and be furnished with hand scanners so they can electronically update the property control records, as appropriate, during installation, repair, replacement, and relocation or disposal of IT equipment: Concur-VA's current asset management system (AEMS/MERS) allows for IRM and IT Services to be given restricted access to the AEMS/MERS system in order to record/update inventory records to reflect status and location. Hand scanners can be purchased locally as needed. Nevertheless, VHA's P&CLO is working with the DUSHOM to disseminate a memorandum to all VA medical centers directing them to give access to AEMS/MERS for all applicable information resource management and IT staff involved in IT asset management. P&CLO and DUSOHOM will provide direction in the memorandum to ensure open communication between IT staff and logistics staff in coordination of either procuring bar code scanners or making available existing bar code scanners at the medical centers. The memorandum will specify follow-up through regular conference calls and e-mails as required. Lastly, P&CLO is working with OI&T to establish better communication in defining roles and responsibilities of front line staff in updating the equipment records as appropriate. * Require physical security personnel to perform inspections of buildings and storage facilities to identify informal and undesignated IT storage locations so that security assessments are performed and corrective actions are implemented, where appropriate. Concur - The current version of the Security and Law Enforcement policy (073011) is referenced in this report. This version has undergone a large-scale revision and is in the Department concurrence process. There is a new requirement to the revised policy that each VA facility establish a Security Management Committee (SMC). One of the tasks of the SMC is to develop a local strategic security plan (SSP). The SSP is intended as a framework for identifying a facility's security needs and resolutions. We also wish to note that specific physical security requirements for IT resources and spaces have been updated. In addition, IT spaces are now required to be protected with physical access control systems (PACS). In previous versions, this was an optional item. To assure inventory accuracy and prompt resolution of inventory discrepancies and improve security of IT equipment and any sensitive data stored on that equipment, GAO recommends that the Secretary require the CIO to take the following four actions: * Establish a formal policy requiring a review of the results of annual inventories to ensure that IT equipment inventory records are properly updated and no blank fields remain. Concur -OI&T is developing a policy that requires the senior IT official at a facility to maintain an inventory of all IT equipment and to have the business/service unit head or designee sign for all IT equipment issued to their service/unit. The policy will require issuing of hand receipts for IT equipment at the user-level. The senior IT official at a facility will be required to complete an annual survey that ensures IT equipment inventory records are complete and up-to- date. * Establish a process for reviewing Reports of Survey for lost, missing, and stolen IT equipment items to identify systemic weaknesses for appropriate corrective action. Concur-OI&T is developing a policy that will include the requirement that a report of survey will be completed within 15 working days following completion of annual inventory. The policy will also require an analysis of the reports to identify any weakness trends. * Establish and implement a policy requiring IRM Personnel and IT coordinators to Inform Physical Security Officers of the location of all IT equipment storage locations so that these store rooms can be subjected to required inspections. Concur - OI&T is developing a policy that will require the senior IT official at every facility to provide IT equipment storage locations to facility security personnel to perform regular inspections. * Establish and implement a policy for reviewing the results of physical security inspections of IT equipment store rooms and ensure that needed corrective actions are completed. Concur- OI&T is developing a policy that will require senior IT Officials at every site to complete corrective actions addressed from all physical security inspections of IT equipment store rooms. Technical comments: Pages 4 and 20, and Tables 6 and 7, portray IT equipment that cannot be accounted for as having a combined potential financial loss in the millions of dollars. However, the report does not specify whether this cost estimate is provided as a depreciated loss value or a replacement value. Distinguishing between the two is very important as it directly impacts the loss estimate value. For instance, if IT equipment was purchased in previous years, it depreciates at a significant determined rate. On the other hand, if GAO used replacement costs to estimate the loss value, it needs to further clarify which year values it used (i.e. 2002 values, 2005 values, or current 2007 values). In addition, the tally of unaccounted-for equipment that GAO used for its estimate of loss value was surmised as a result of this audit. However, VA could, in fact, have properly disposed of some of the "missing" equipment, but the proper documentation of the disposal is just not available. If this is the case, then it should not be subject to having a replacement cost associated with it. [End of section] Appendix III: GAO Contact and Staff Acknowledgments: GAO Contact: McCoy Williams, (202) 512-9095 or williamsm1@gao.gov: Acknowledgments: In addition to the contact named above, Gayle L. Fischer, Assistant Director; Andrew O'Connell, Assistant Director and Supervisory Special Agent; Abe Dymond, Assistant General Counsel; Monica Perez Anatalio; James D. Ashley; Francine DelVecchio; Lauren S. Fassler; Dennis Fauber; Jason Kelly; Steven M. Koons; Christopher D. Morehouse; Chris J. Rodriguez; Special Agent Ramon J. Rodriguez; Lori B. Tanaka; and Danietta S. Williams made key contributions to this report. Technical expertise was provided by Keith A. Rhodes, Chief Technologist, and Harold Lewis, Assistant Director, Information Technology Security, Applied Research and Methods. FOOTNOTES [1] GAO, VA Medical Centers: Internal Control over Selected Operating Functions Needs Improvement, GAO-04-755 (Washington, D.C.: July 21, 2004). [2] Physical inventory is the process of reconciling personal property records with the property actually on hand. [3] Department of Veterans Affairs, VA Handbook 7127/3, Materiel Management Procedures. [4] For the purpose of this audit, we defined IT equipment as any equipment capable of processing or storing data, regardless of how VA classifies it. Therefore, medical devices that would typically not be classified as IT equipment, but may capture, process, or store patient data, were considered IT equipment for this audit. [5] As used in this report, theft and misappropriation both refer to the unlawful taking or stealing of personal property, with misappropriation occurring when the wrongdoer is an employee or other authorized user. [6] As used in this report, the term excess property refers to property that a federal agency leases or owns that is not required to meet either the agency's needs or any other federal agency's needs. [7] The Washington, D.C., medical center was also covered in our 2004 report. [8] The universe of IT equipment items for the four test locations did not include the population of all IT equipment at those locations. Therefore, we can project our test results to the universe of current, recorded IT equipment inventory at each location, but not the population of all IT equipment. Our tests were specific to each of the case study locations and cannot be projected to VA IT equipment inventory as a whole. [9] GAO, Standards for Internal Control in the Federal Government, GAO/ AIMD-00-21.3.1 (Washington, D.C.: November 1999). [10] Each of these estimates has a margin of error, based on a two- sided, 95 percent confidence interval, of +/-7 percent or less. [11] The Report of Survey system is the method used by VA to obtain an explanation of the circumstances surrounding loss, damage, or destruction of government property other than through normal wear and tear. [12] VA medical centers and other facilities have a VA Police Service, which provides law enforcement and physical security services, including security inspections and criminal investigations. The VA headquarters building does not have a police service. VA headquarters law enforcement duties are the responsibility of the Federal Protective Service. [13] VA IRM personnel and contractors follow National Institute of Standards and Technology (NIST) Special Publication 800-88 guidelines as well as more stringent Department of Defense (DOD) policy in DOD 5220.22-M, National Industrial Security Program Operating Manual, ch. 8, § 8-301, which requires performing three separate erasures for media sanitization. [14] VA Handbook 7127/4 § 5302.3, "Inventory of Equipment in Use." [15] 44 U.S.C. §§ 3101 and 3102, and implementing NARA regulations at 36 C.F.R. § 1222.38. This is consistent with the more general requirement for agencies to establish internal controls under 31 U.S.C. § 3512 (c), (d), commonly known as the Federal Managers' Financial Integrity Act of 1982 (FMFIA), and GAO/AIMD-00-21.3.1. [16] VHA has 21 VISNs that oversee medical center activities within their area, which may cover one or more states. [17] VA Handbook 7127, Materiel Management Procedures (Sept. 19, 1995), required that all sensitive items, including those valued under $5,000, be inventoried regardless of cost. According to VA Handbook 7127/1 (Oct. 21, 1997), records of property costing $5,000 or greater will be maintained in AMES/MERS. In addition to assets valued over $5,000, VA Handbook 7124/4 (Oct. 11, 2005) added a further explanation that sensitive items include handheld and portable telecommunication devices, printers, data storage equipment (e.g., desktop and laptop computers), video imaging equipment, cell phones, radios, motor vehicles, and firearms and ammunition. [18] VA Handbook 7127/4, Materiel Management Procedures (Oct. 11, 2005). [19] VA Handbook 7125, Materiel Management General Procedures, pt. 5, § 5101-8. [20] Privacy Act of 1974, codified, as amended, at 5 U.S.C. § 552a. [21] HIPAA required the Secretary of Health and Human Services (HHS) to submit to Congress detailed recommendations on standards related to the privacy of individually identifiable health information, including an individual's rights with respect to such information, procedures for an individual to exercise those rights, and the authorized uses and disclosures of such information by others, such as health care providers and insurers. The HHS Secretary has prescribed such standards in the HIPAA Medical Privacy Rule. See Pub. L. No. 104-191, § 264, 110 Stat. 1936, 2033-34 (Aug. 21, 1996), and implementing regulations at 45 C.F.R. pt. 164. [22] Federal Prison Industries, Inc. (also known as UNICOR) is a wholly owned U.S. government corporation, which operates factories and employs inmates in federal prisons. See 31 U.S.C. § 9101 (3)(E), 18 U.S.C. §§ 4121-4129. [23] GAO/AIMD-00-21.3.1. [24] Privacy Act of 1974, codified, as amended, at 5 U.S.C. § 552a. [25] The HHS Secretary has prescribed standards for safeguarding medical information in the HIPAA Medical Privacy Rule. See 45 C.F.R. pt. 164. [26] VA Handbook 7125, Materiel Management General Procedures, § 5003 (Oct. 11, 2005). [27] VA Handbook 7127/3, Material Management Procedures, pt. 1 § 5002- 2.3, and VA Handbook 7127/4, Material Management Procedures, pt. 4, § 5302.3. [28] The two-sided, 95 percent confidence interval for this estimate is from 21 percent to 35 percent. [29] VA Directive 6300, Records and Information Management, § 2 (Jan. 12, 1998). [30] 44 U.S.C. §§ 3101 and 3102, and implementing NARA regulations at 36 C.F.R. § 1222.38. This is consistent with the more general requirement for agencies to establish internal controls under 31 U.S.C. § 3512 (c), (d), commonly known as FMFIA, and GAO/AIMD-00-21.3.1. [31] The two-sided, 95 percent confidence interval for this estimate is from 2 percent to 13 percent. [32] VA Handbook 1730/1, Use and Management of the Government Purchase Card Program (June 17, 2005). [33] Asset visibility refers to accurate and timely information on the location, movement, status, and identifying information for property and equipment assets. [34] The two-sided, 95 percent confidence interval for this estimate is from 5 percent to 17 percent. [35] VA Handbook 7127/4, Materiel Management Procedures, pt. 1, § 5002.2 and pt. 4, § 5302.3 (Oct. 11, 2005). [36] The two-sided, 95 percent confidence interval for this estimate is from 8 percent to 15 percent. [37] VA Handbook 7125, Materiel Management General Procedures, § 5003. [38] The margin of error, based on a two-sided, 95 percent confidence interval is +/-3 percent. [39] A hand receipt is a document used to assign individual custody of a government-furnished equipment item. At VA headquarters a hand receipt includes the description and bar code number of the item, and it is signed by the employee responsible for the equipment and an authorizing official. [40] The Report of Survey System is the method used by VA to obtain an explanation of the circumstances surrounding loss, damage, or destruction of government property other than through normal wear and tear. [41] VA Handbook 7125, Materiel Management General Procedures, pt. 5, § 5101 and § 5101-21. [42] VA medical centers and other facilities have a VA Police Service, which provides law enforcement and physical security services, including security inspections and criminal investigations. The VA headquarters building does not have a police service. VA headquarters law enforcement duties are the responsibility of the Federal Protective Service. [43] The Washington, D.C., medical center was covered in both audits. [44] VA IRM personnel and contractors follow NIST Special Publication 800-88 guidelines as well as more stringent DOD policy in DOD 5220.22- M, National Industrial Security Program Operating Manual, ch. 8, § 8- 301, which requires performing three separate erasures for media sanitization. [45] Privacy Act of 1974, codified, as amended, at 5 U.S.C. § 552a. [46] Pub. L. No. 104-191, § 264, 110 Stat. 1936, 2033-34 (Aug. 21, 1996), and implementing regulations at 45 C.F.R. pt. 164. [47] VA Handbook 7127/4, Materiel Management Procedures (Oct. 11, 2005). [48] Universal Serial Bus (USB) Flash Drive User Guide 2.0 (Mar. 9, 2007). [49] GAO, Standards for Internal Control in the Federal Government, GAO/AIMD-00-21.3.1 (Washington, D.C.: November 1999). This document was prepared to fulfill our statutory requirement under 31 U.S.C. 3512 (c), (d), commonly known as the Federal Managers' Financial Integrity Act of 1982, to issue standards that provide the overall framework for establishing and maintaining internal control. [50] GAO, Internal Control Management and Evaluation Tool, GAO-01-1008G (Washington, D.C.: August 2001). This document was prepared to assist agencies in maintaining or implementing effective internal control and, when needed, to help determine what, where, and how improvements can be implemented. Although this tool is not required to be used, it is intended to provide a systematic, organized, and structured approach to assessing the internal control structure. GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site (www.gao.gov). Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to www.gao.gov and select "Subscribe to Updates." Order by Mail or Phone: The first copy of each printed report is free. Additional copies are $2 each. A check or money order should be made out to the Superintendent of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or more copies mailed to a single address are discounted 25 percent. Orders should be sent to: U.S. Government Accountability Office 441 G Street NW, Room LM Washington, D.C. 20548: To order by Phone: Voice: (202) 512-6000 TDD: (202) 512-2537 Fax: (202) 512-6061: To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: www.gao.gov/fraudnet/fraudnet.htm E-mail: fraudnet@gao.gov Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Gloria Jarmon, Managing Director, JarmonG@gao.gov (202) 512-4400 U.S. Government Accountability Office, 441 G Street NW, Room 7125 Washington, D.C. 20548: Public Affairs: Paul Anderson, Managing Director, AndersonP1@gao.gov (202) 512-4800 U.S. Government Accountability Office, 441 G Street NW, Room 7149 Washington, D.C. 20548: