Establishing secure connection… Loading editor… Preparing document…
Navigation

Fill and Sign the New York State Department of Health Selt Declaration of Income Form

Fill and Sign the New York State Department of Health Selt Declaration of Income Form

How it works

Open the document and fill out all its fields.
Apply your legally-binding eSignature.
Save and invite other recipients to sign it.

Rate template

4.5
35 votes
U.S. Department of Agriculture Office of Inspector General Great Plains Region Audit Report Farm Service Agency Price Support Loan Application Report No. 03099-195-KC September 2005 Executive Summary Farm Service Agency Price Support Loan Application (Audit Report No. 03099-195-KC) Results in Brief This report presents the results of our audit of the price support loan application within the Farm Service Agency’s (FSA) Automated Price Support System (APSS). Our overall objective was to assess whether the FSA had adequate management, security, and programming controls over its price support loan application. The FSA relies on the APSS to make and service commodity loans and loan deficiency payments, a critical function of the Commodity Credit Corporation’s mission to stabilize, support, and protect farm income and prices. Overall, we found that FSA had generally implemented sufficient controls to ensure the integrity of the price support loan application system. However, our audit identified areas where improvements were warranted regarding application programming, access, and security. Specifically, we found that: Recommendations In Brief • weaknesses existed in several automated checks used to validate data in the price support loan application; • controls over logical access, including passwords to its price support loan application, did not assure adherence to federal guidance because employees were required to divulge their passwords, and password intervals were not properly set; • a lack of controls existed over transmission of data without the appropriate security measures; • incomplete risk assessment documentation existed for the price support loan application; and • contingency plans did not describe the expected recovery actions to be taken by county offices. We recommend that the FSA: • conduct a detailed analysis of the adequacy of the key validation controls for the price support application; • develop and document validation controls to mitigate the specific weaknesses determined; USDA/OIG-A/03099-195-KC Page i • revise FSA direction on logical access control guidance to be consistent with Departmental requirements; • ensure that employees who have made their passwords and user identifications available to others obtain passwords and user identifications in accordance with Departmental security guidance; • consult with Office of the Chief Information Officer (OCIO) and implement adequate security to ensure that all sensitive data is transmitted securely in accordance with applicable requirements; • conduct sufficient reviews of risk assessments to establish that all relevant information has been documented and considered as part of the assessment’s development (e.g., network topology, list of system personnel, and connected applications) prior to acceptance of the work and payment; and • revise contingency plans for county offices that will provide the achievable processes to be followed for continued operation if an emergency arises and establish oversight of the plans. FSA Response In its August 1, 2005, written response to the draft report, FSA concurred with the findings and recommendations in the report, and provided timeframes for completing many of corrective actions. OIG Position We agree with management decision for Recommendations 1, 2, 3, 4, and 6. The management decision for Recommendation 5 is contingent upon the pending Office of the Chief Information Officer decision regarding the waiver of Departmental requirements. If a waiver is not granted, then a corrective action plan and applicable timeframes are needed. For Recommendation 7, additional clarification is needed on when the updated contingency plan instructions will be provided to county offices and the procedures to provide oversight of the plans to ensure that they accurately describe expected actions. USDA/OIG-A/03099-195-KC Page ii Abbreviations Used in This Report ADP APSS C&A CCC CS DM DR FSA ID IT ITS ITSD NIST OCFO OCIO OIG OMB PSD RA USDA Automated Data Processing Automated Price Support System Certification and Accreditation Commodity Credit Corporation Cyber Security Departmental Manual Departmental Regulation Farm Service Agency Identification Information Technology Information Technology Services Information Technology Services Division National Institute of Standards and Technology Office of the Chief Financial Officer Office of the Chief Information Officer Office of Inspector General Office of Management and Budget Price Support Division Risk Assessment United States Department of Agriculture USDA/OIG-A/03099-195-KC Page iii Table of Contents Executive Summary ....................................................................................................................... i Background and Objectives ......................................................................................................... 1 Findings and Recommendations.................................................................................................. 3 Section 1 Application Programming ...................................................................................... 3 Finding 1 FSA Lacks Assurance that Price Support Loan Application is Correctly Programmed to Validate Data....................................................... 3 Recommendation 1 ................................................................................ 4 Recommendation 2 ................................................................................ 5 Section 2. Application Access ................................................................................................. 7 Finding 2 Finding 3 Logical Access Controls Security Needs Strengthening............................... 7 Recommendation 3 ................................................................................ 8 Recommendation 4 ................................................................................ 9 Remote Access Security Needs Strengthening ............................................. 9 Recommendation 5 .............................................................................. 10 Section 3. Documentation ..................................................................................................... 12 Finding 4 Finding 5 Inadequate Risk Assessment Documentation ............................................. 12 Recommendation 6 .............................................................................. 13 Contingency Plans Need Revision .............................................................. 13 Recommendation 7 .............................................................................. 14 Scope and Methodology.............................................................................................................. 16 Exhibit A – FSA Response ......................................................................................................... 17 USDA/OIG-A/03099-195-KC Page iv Background and Objectives Background Application controls are the structure, policies, and procedures that apply to separate, individual application systems. An application system is typically a collection or group of individual computer programs that relate to a common function. In the Federal Government, some applications may be complex, comprehensive systems, involving numerous computer programs and organizational units, such as those associated with benefit payment systems. Application controls can encompass both the routines contained within the computer program code, and the policies and procedures associated with user activities, such as manual measures performed by the user to determine that data, was processed accurately by the computer. Application controls help make certain that transactions are valid, properly authorized, and completely and accurately processed by the computer. In addition, general security controls and automated controls built into the operating system that support the application should also be considered. Weak controls that allow physical or logical access to the computers that store application data could be used to circumvent the controls established within the application itself. The Commodity Credit Corporation (CCC) is a Government owned corporation created in 1933 to stabilize, support, and protect farm income and prices; to help maintain balanced and adequate supplies of agricultural commodities, including products, foods, feeds, and fibers; and to help in the orderly distribution of these commodities. Management of the CCC is vested in a board of directors, subject to the general supervision and direction of the Secretary of Agriculture. The activities of the CCC are carried out mainly by the personnel and through the facilities of the Farm Service Agency (FSA) and its State and county committees. There are 51 FSA State offices and about 2,500 U.S. Department of Agriculture (USDA) Service Centers. Additionally, the FSA maintains field office personnel in Kansas City and St. Louis, Missouri, and Salt Lake City, Utah. Various laws have emphasized the need to protect agencies’ sensitive and critical data, including the Privacy Act of 1974, the Federal Information Security Management Act of 2002, and the Paperwork Reduction Act of 1995. Departmental responsibilities were recently reemphasized in the Clinger-Cohen Act of 1996 and Presidential Decision Directive 63, “Policy on Critical Infrastructure Protection.” Additionally, the Government Information Security Reform Act was enacted on October 30, 2000. This Act codified the existing requirements of the Office of Management and Budget’s (OMB) USDA/OIG-A/03099-195-KC Page 1 Circular A-130, Appendix III, Security of Federal Automated Information Resources. Computer security at USDA is addressed in Departmental Manual (DM) 3140-1, Management Automated Data Processing (ADP) Security Manual, and various Departmental Regulations (DR). Additionally, the FSA has issued certain security guidelines in a series of IRM Handbooks. FSA uses a software application called the Automated Price Support System (APSS) to carryout the CCC marketing assistance loan program. The price support loan application is software within the APSS that facilitates marketing assistance loans provided to producers at harvest time, or after, to meet cash flow needs without having to sell their commodities when market prices are typically at harvest-time lows. Marketing loans allow producers to store production at harvest facilities and market their commodities throughout the year. Marketing assistance loans for covered commodities are pledged as loan collateral, and producers have the option of delivering the pledged collateral to the CCC as full payment for the loan at maturity. Market loan repayment provisions specify, under certain circumstances, that producers may repay loans at less than principal plus accrued interest and other charges. For crop year 2002, FSA/CCC processed 176,000 loans that totaled about $7.5 billion. The APSS was developed to completely record county office data for the marketing loan assistance and loan deficiency payments made to producers. The APSS is comprised of a distributed data processing system that provides field offices the capability to make and service commodity loans and loan deficiency payments and a reporting and accounting feeder system that provides centralized tracking of all loan detail (transactions) and summary reporting capabilities. The price support loan application calculates the commodity loans, prepares loan documents and disbursements, provides for repayments, transfers, forfeitures, settlements, establishes receivables, and calculates interest charges. The system interfaces with accounting, inventory and production adjustment applications, and summarized data files are transmitted from the county and State offices on a daily or weekly basis for use in preparation of national level reports. The USDA Office of Inspector General (OIG), conducted nationwide audits of selected USDA agencies to assess overall application controls of their computer systems to ensure the confidentiality, integrity, and availability of information. The FSA was one of the agencies selected for review. Objectives The objective of this audit was to determine if FSA had adequate management, security, and programming control over its price support loan application. USDA/OIG-A/03099-195-KC Page 2 Findings and Recommendations Section 1 Application Programming Finding 1 FSA Lacks Assurance that Price Support Loan Application is Correctly Programmed to Validate Data The price support loan application lacks several automatic checks to validate critical information that is used to make loan decisions. For example, the application should filter out loan requests that are made after the final date that a loan is available, but our testing showed it would allow loans to be made up to 2 months after this date has passed. However, we were unable to determine why these checks have not been incorporated into the application because FSA has not adequately recorded and retained documentation showing the changes it has made to the system through the years and FSA officials could not otherwise provide any information to explain the omissions. The application may have lacked these checks in its original programming, or the agency may have removed the checks in subsequent updates. In either case, without documentation tracking the history of changes made to the application, the agency cannot be assured that changes made to the system are authorized and accurate. Federal standards mandate that data within computer systems must be validated continuously, which involves determining if it is accurate, complete, consistent, and reasonable (Federal Information Processing Standards 73). To accomplish this goal, agencies incorporate automatic validation controls that restrict users from entering predictably invalid data (e.g., wrong State codes), changing critical data (e.g., Federal loan interest rates), superceding established timeframes (e.g., submitting a loan request past the due date), and so on. As users discover validation weaknesses in an application, agencies update the automatic controls to fix the problem. DM 3200-001 holds that changes made to major applications should be maintained throughout the life cycle of that system. Chapter 1.6 calls complete and accurate documentation of major application systems “essential.” More specifically, chapter 2.8 requires that managers maintain documentation related to the development, operation, and maintenance of an application throughout its use by an agency. DM 3200-002 also requires agencies to document software changes. USDA/OIG-A/03099-195-KC Page 3 Our tests determined several validation weaknesses in FSA’s price support loan application. In our tests at the FSA test site, the application: • Accepted crop loans 2 months after the final loan availability date for a given crop, • Permitted users to change interest rate tables, established yield tables, and service fees, which are critical to determining loan parameters, • Prevented users from entering accurate information (e.g., test crop weights ending in 50 were not accepted by the system). For example, while entering a loan, a test weight of 250 was entered but the computer would not accept this number so a test weight of 300 was entered and accepted by the system. We tested various test weight numbers in increments of “50” (i.e., 150, 250, 350, etc) and found these would not be accepted by the system. • Changed information input by the user (e.g., an entry of 2.56 bushels per acre was changed to 3156, and ‘K’ entered as a response to a yes (Y) or no (N) question was taken as a no (N)), and • Allowed inaccurate State codes to be entered. Proposed changes to FSA’s price support loan application go through an appropriately rigorous process of development and testing before they are implemented throughout the agency. The agency, though, has not kept track of all the changes that it has made to validation controls. It also has not compiled the updates as they are released. This lack of documentation may lead to the agency undoing preceding programming changes designed to enhance the validation controls within the application. Any or all of the weaknesses identified above, for example, may have developed from conflicts between programming changes. Alternately, implemented validation controls may have been incorrectly removed if an older software update was re-released, in effect returning the application to an earlier, less effective version. The correction of these individual weaknesses could enhance the overall strength of the application’s automatic validation control. Recommendation 1 Conduct a detailed analysis of the adequacy of the key validation controls for the price support application. USDA/OIG-A/03099-195-KC Page 4 Recommendation 2 Develop and document validation controls to mitigate the specific weaknesses cited above and those identified during the detailed analysis. FSA Response. In its August 1, 2005, response, FSA concurred with Recommendations 1 and 2, and the Price Support Division (PSD) conducted a preliminary detailed review and analysis specific to the weaknesses addressed in Finding 1. Of the weaknesses cited, PSD developed a validation control to accept a marketing assistance loan application within the final loan availability period applicable to the crop. This software enhancement will be released in county Release 568 and was scheduled to be released on July 25, 2005. PSD analysis found one screen where the alpha, other then “Y” or “N” was permitted to a question requiring a yes or no response. PSD will issue a user requirement to request an enhancement to this validation. The user requirement will be completed by August 31, 2005. FSA also stated that they found through their analysis that APSS does validate against test weight that is not applicable to a specific commodity. Human interaction is required for the remaining weaknesses cited in the audit which make an automated validation impossible. However, PSD will issue a directive to the State and county offices reminding them of the procedure for maintaining table files and to ensure program validations are correctly applied. FSA is in the beginning stages to develop a web based eLOAN application process via the internet. When this is completed, the APSS will not be needed to support marketing assistance loans. The user requirement was issued to address this project on June 26, 2005. A more in-depth validation system will be implemented with this process in all activities pertaining to all programs currently used by APSS. Because all resources are assigned to the eGOV initiatives, any additional enhancements in APSS may he prohibited, as directed by FSA Administration and the Information Technology Services Division (ITSD). However, FSA will make every attempt to ensure that validations remain a top priority in development of software. FSA’s USDA/OIG-A/03099-195-KC Page 5 response shows that the target date for completing final action is August 31, 2005. OIG Position. We clarified what information was tested in the bullet shown above regarding test weight numbers in increments of “50” (150, 250, 350) and performed additional testing for corn and wheat using a test weight of 50. We found that the APSS should not and does not allow a 50 test weight for wheat in all grades (1-5) and correctly does allow a 50 test weight for corn. Therefore, we accept management decision for Recommendations 1 and 2. For final action, FSA will need to report to the Office of the Chief Financial Officer (OCFO) that the proposed actions have been accomplished. USDA/OIG-A/03099-195-KC Page 6 Section 2. Application Access Finding 2 Logical Access Controls Security Needs Strengthening FSA does not have adequate control over logical access to its price support loan application. 1 FSA direction inappropriately requires employees to divulge their passwords to other employees, and systems are not set to adequately restrict access. With loose control over passwords and protective steps not taken, the price support loan application becomes vulnerable to unauthorized use and FSA becomes less capable of establishing accountability for that misuse. According to National Institute of Standards and Technology (NIST) 800-12, if passwords are used for authentication, organizations should teach users not to use easy-to-guess passwords, not to divulge their passwords, and not to store passwords where others can find them. 2 Counter to these requirements, agency, State, and county guidance direct employees to make their passwords available to other employees for administrative purposes. FSA’s handbook of computer operations directs field offices to print and store user identifications and passwords. 3 Also, • a State office notice required all county offices in a State to send master security user identifications (ID) and passwords to the State office. 4 Employees at the State office share these master security ID and passwords and, • another FSA county office required all its employees to provide their passwords to another employee who locks these passwords in a safe. For example, if someone tampers with the application using employee A’s password, but employee B also has access or knows the password, it will be difficult to establish which employee damaged the system. • The password change interval is set at 90 days on the operating system. Cyber Security (CS) requires passwords for all systems, applications or processes to be changed every 60 days 1 Logical access is the ability that users have to use, change, or view a computer system. To control that access means to restrict their ability to interact with the system. Logical access controls can be built into the operating system (e.g., automatically logging a user out after a period of inactivity), or incorporated into the applications that run on that system (e.g., passwords) (NIST 800-12 ch. 17). 2 NIST 800-14, “Generally Accepted Principles for Securing IT Systems,” Sept. 1996, sect. 3.11.3. 3 FSA Handbook 2-IRM, “Computer Operations for the GSS A and B,” May 29, 2003, para. 281.F(5). 4 MO Notice IRM-36, “ADP Password Changes,” December 8, 2003, Exhibit 3. USDA/OIG-A/03099-195-KC Page 7 for general users. Passwords issued to system administrators, system managers, and software engineers or those that are used for dial-in access are to be changed every 30 - 45 days. 5 By leaving the passwords the same for longer than recommended, the agency increases the risk that an unauthorized user will gain and retain access to the application. • In two county offices we visited, the computers did not automatically logout the user after a period of inactivity. Leaving open conduits into the application makes the application vulnerable to tampering and enhances the risk of exposing sensitive information to unauthorized access. Combined, these logical access control weaknesses increase FSA’s price support loan application vulnerability to misuse. Should an unauthorized user exploit these weaknesses, FSA’s ability to establish accountability will be hampered since employees will have access to other employees’ passwords. Recommendation 3 Revise FSA direction on logical access control guidance to be consistent with Departmental requirements. Revise agency, State, and county directives to instruct FSA employees on new password requirements implemented and to properly safeguard master security IDs and passwords. FSA Response. In its August 1, 2005, response, FSA agreed with the recommendation. Also, FSA Handbook 2-IRM will be revised to direct users to change their passwords every 60 days and to not include passwords when preparing a list of User IDs. A notice will be issued directing State and County personnel to update all local directives to comply with these changes. Also, ITSD plans to implement these corrective actions before October 1, 2005. OIG Position. We accept management decision for Recommendation 3. For final action, FSA will need to report to the OCFO that the proposed actions have been accomplished. 5 CS-13, “Passwords,” Chapter 6 Part 5, “Controlled Access Protection (C2)”, March 6, 2002, sect 2. USDA/OIG-A/03099-195-KC Page 8 Recommendation 4 Ensure that employees who have made their passwords and IDs available to others obtain new unique passwords and user IDs. Set computer system password and workstation logout controls, as required, by Departmental security guidance. FSA Response. In its August 1, 2005, response, FSA indicated that user passwords will be changed according to the 60 day cycle. Any employees who have made their passwords and ID’s available to others will be instructed to reset their passwords and not share their ID’s or passwords with others. Every employee will have a unique ID with a password known only to the employee. It is not feasible to issue new user ID’s. The User IDs have been stored in numerous audit trail files. The new User ID would start out as a completely new user with no way to link the new User ID to the activities of the old User ID. The IBM S/36 does not have an option to logout a user after a specified time. If a disconnection is forced from a higher level (network or AS/400 hosting system), the hard termination of a users session can cause data corruption in many of our applications. The S/36 does not have a database management system with commit/rollback capabilities. If a user is in the middle of a transaction and their session gets terminated, half of a transaction may be recorded. Implementing a forced disconnection would present a larger risk than the one we would he trying to mitigate. Also, ITSD will instruct employees to change their passwords by the end of the Fiscal Year (or sooner). OIG Position. We accept management decision for Recommendation 4. For final action, FSA will need to report to the OCFO that the proposed actions have been accomplished. Finding 3 Remote Access Security Needs Strengthening FSA does not have adequate control over external access to information contained within its price support loan application. FSA management did not institute security controls that were capable of encrypting 6 data in some locations because they believed the cost was too high, and the 6 Encryption is the process of disguising information or data so that it is unintelligible to an unauthorized person. USDA/OIG-A/03099-195-KC Page 9 encryption, or other security transmission measures, significantly slow the transmission through the transmission method used to an unacceptable level. This decision left the data at risk of being compromised. We found that about 155 of 2,500 FSA service centers do not encrypt information before transmitting it to FSA’s main computer system. The 155 service centers transmitted sensitive information, including information on about 2,600 loans, totaling $163 million made for crop year 2002 using an inappropriate method. Without encryption or other security transmission measures, sensitive information is not adequately protected. USDA standards 7 state that all USDA ADP installations should protect sensitive data by use of file level passwords, read/write locks, and/or encryption. These same standards 8 advocate that all USDA ADP installations consider encrypting sensitive data to protect it while being transmitted via telecommunications. In addition, DM 3550-002 9 now clarifies that sensitive, but unclassified information, transmitted by frame relay, is to be encrypted. FSA has neither required that the county offices submit their data securely, nor replaced the transmission method to allow encryption to be utilized for these 155 locations. Agency officials indicated that they believed the cost to switch to a transmission method that enables encryption to be acceptably used was prohibitive, based on the small activity level in these locations. Recommendation 5 Consult with the Office of the Chief Information Officer (OCIO) and implement adequate security to ensure that all sensitive data is transmitted securely, in accordance with Departmental and federal encryption requirements and update agency procedures, as needed. FSA Response. In its August 1, 2005, response, FSA indicated that the majority of FSA service centers encrypt data before transmission to FSA’s central computer systems. Approximately 155 service centers are currently unable to use Virtual Private Network conduits to transmit their data with encryption. These are small, low volume service centers. Given the current budget constraints and possible future office consolidations, as well as current efforts to migrate existing AS/400 applications to a central web environment, it is not cost effective to dedicate resources to 7 DM 3140-1, Management ADP Security Manual, section 15 (b). DM 3140-1, Management ADP Security Manual, section 18. 9 DM 3550-002, Sensitive but Unclassified Protection Information, chapter 10, part 2, table 3 dated February 17, 2005. 8 USDA/OIG-A/03099-195-KC Page 10 implement this type of security for 155 low volume sites. FSA is consulting with OCIO’s Information Technology Services (ITS) on this issue. ITS, which is now responsible for FSA’s Information Technology (IT) infrastructure, is looking into this issue and may request a waiver to Departmental requirements in this area. Also, the FSA response indicated that OCIO plans to submit a waiver request by August 15, 2005. OIG Position. Management decision for Recommendation 5 is contingent on the pending OCIO decision regarding the waiver of Departmental requirements. If a waiver is not granted, a corrective action plan that shows how the 155 sites will transmit data in accordance with Departmental regulations and applicable timeframes is needed. For final action, FSA will need to report to the OCFO that the proposed actions have been accomplished. USDA/OIG-A/03099-195-KC Page 11 Section 3. Documentation Finding 4 Inadequate Risk Assessment Documentation The documentation used by a contractor FSA hired to perform a risk assessment for its price support loan application did not include all relevant information to provide an accurate assessment. The contractor did not include a network topology—essentially, a blueprint of the computer network—that should have been reviewed prior to determining the risks associated with the application, as well as omitting other crucial information. FSA believed that the contractor had this knowledge, but it did not pursue obtaining the documentation from the contractor. As a result, FSA could not be assured that the risks attributable to its mission-critical system have been considered and that appropriate steps have been taken to mitigate these risks. NIST guidance for a risk assessment of an IT system requires an understanding of the system’s processing environment. To perform a risk assessment, some system-related information must be collected. A current network topology is one of the additional documents needed to develop a knowledge of the environment and operations of the IT system and its data. We reviewed the assessment completed in May 2003, by FSA’s contractor. The assessment lacked (1) a network topology, (2) a list of APSS personnel (of which, the price support loan application is a part), and (3) information about a database used to update information about loans and loan deficiency payments made to producers. Instead, there were blank highlighted sections that an FSA official indicated were for FSA staff to insert specific names or information at some later date. FSA’s risk assessments were in the process of being updated and completed in support of the certification and accreditation requirements at the time of our review. The documentation showed that as of February 2004, no topology had been included in the assessment. In March 2004, two FSA officials said that there was no network topology available for FSA’s APSS and, by connection, the price support loan application. In April 2004, FSA stated that one contractor had performed the risk assessments for all of FSA’s computer systems and should be familiar with the network topology. The FSA has recently completed the certification and accreditation process and the topology is now included. USDA/OIG-A/03099-195-KC Page 12 Recommendation 6 Conduct sufficient reviews of completed risk assessments, and ensure each risk assessment includes documentation establishing that all needed elements have been considered as part of the assessment’s development (e.g., network topology, list of system personnel, and connected applications) prior to acceptance of the work and payment of the contractor. FSA Response. In its August 1, 2005, response, FSA indicated that as part of the Certification and Accreditation (C&A) process for the APSS (completed September 2004), the risk assessment (RA) document was updated to include all required elements. FSA follows current Department of Agriculture C&A guidelines in reviewing the RA, and FSA will work to ensure that all needed elements are contained in future RA documents. Also, FSA has indicated they are already in compliance with the recommendation; therefore, no further action is needed. OIG Position. We accept management decision for Recommendation 6. For final action, FSA will need to report to the OCFO that the corrective actions have been accomplished. Finding 5 Contingency Plans Need Revision FSA’s contingency plans for county offices to continue operation of their price support loan application, in the event of disaster, does not reflect the expected recovery actions to be taken. Specifically, the alternate sites designated to carry on operations did not have the computing capacity to effect the application. In prior emergencies that shut down an office’s application (e.g., tornadoes), FSA had sent personnel and equipment to restore operations rather than following the contingency plan procedures the agency put in place. These ad hoc recoveries, however, are not explained or formalized within the county offices’ written plans. NIST 800-12 calls for agencies to plan how to keep their critical functions operating in the event of disruptions as an essential element USDA/OIG-A/03099-195-KC Page 13 of contingency planning. 10 As the final step in planning, an agency must test the plan along several dimensions to make sure that it will work to continue operations. 11 We reviewed the plans for three county offices to determine if they were sufficient to restore operations in the event of a disruption. Each of the offices had agreements with their neighboring county offices to run the application on their computers in cases of system failure. In all three cases, the offices’ computers, however, did not appear to have enough disk space to upload the neighboring office’s systems and continue to run their own workload as well. 12 According to disk space capacity reports, each office was using 57 percent of its own disk space for part of its operating system. Consequently, running the systems of two offices together might exceed the disk space available. In one State office, FSA officials acknowledged that some parts of the contingency plans could be improved. In two other State offices, they stated that they relied on agency personnel to restore their system with new equipment and programs. These personnel informed us that they had prepared their plans using the guidance provided in FSA procedures. FSA headquarters personnel stated that they usually provide the required equipment to the disabled county. Relying on FSA headquarters personnel does not supplant the need for a formal contingency plan that outlines the actual steps that a county office must take to recover operations. Recommendation 7 Revise contingency plans for all county offices that will provide for achievable processes to be followed for continued operation of the application, if an emergency arises. Establish oversight of the plans to ensure that they accurately describe expected actions. FSA Response. In its August 1, 2005, response, FSA indicated that Finding 5 (Contingency Plans Need Revision) appears to focus on the need for additional documentation covering all of the various options available to recover county office operations in the event of an emergency, service disruption, or hardware failure. While the FSA contingency plan for county offices does reflect the expected recovery actions to be 10 Chapter 11. Chapter 11.6. 12 The AS/400 System 36 is an integrated system where the AS/400 provides the platform and core operating system for the Advance System 36 emulation. System 36 is required for most state and county office legacy applications to operate. 11 USDA/OIG-A/03099-195-KC Page 14 taken, it is true that options, other than the transfer of operations to an alternate site, have been used in order to recover operations. These options may include replacing failed or damaged hardware, moving hardware from a disaster site to a suitable alternate location, or using existing hardware at an alternate site to continue operations. Step-by-step procedures covering each of these options, as well as criteria for selecting an appropriate recovery option, should be incorporated into an updated contingency plan. FSA also disputed that the disk space capacity may not allow both offices running the applications for two service centers in that two copies of the operating system and application libraries are not required. Only the data files from the disaster site need to be loaded upon the system at the alternate site. Therefore, the actual amount of space required for establishing the disaster site on the alternate system will be significantly lower than the sum of the two disk space utilization figures. Also, FSA has indicated they are already in compliance with the recommendation; therefore, no further action is needed. OIG Position. We were unable to accept management decision for Recommendation 7 without additional clarification regarding whether FSA will or has issued step-by-step procedures covering each of the recovery options, the criteria for selecting an appropriate recovery option, and how this option should be incorporated into each county office updated contingency plan. Also, information is needed detailing the procedures to provide oversight of the plans to ensure that they accurately describe expected actions along with the timeframes. USDA/OIG-A/03099-195-KC Page 15 Scope and Methodology Our audit was part of a nationwide audit of selected USDA agencies and selected applications within these agencies. We tested an application contained within the APSS to determine if selected application system controls (manual or automated) are in place and functioning effectively to ensure transactions are properly authorized, completely processed, and accurately processed. The APSS consists of price support loans, price support loan deficiency payments, and price support graze out payments. We selected FSA’s price support loan application, based on the size of the application and the type of processing it conducted. We conducted our review through interviews, review of FSA procedures and records, and observations. To accomplish our audit objective, we performed the following procedures: • Gained an understanding of the FSA IT environment; • Reviewed agency, Departmental, and other Federally mandated IT security policies and procedures; • Interviewed responsible officials for managing the price support loan application, and reviewed and analyzed FSA records; • Performed detailed testing of FSA’s logical and physical access controls for one mission-critical application, and software controls by analyzing records and controls established to ensure the security of FSA’s price support loan application; and • Conducted testing at Kansas City, Missouri, Beacon Facility and three county offices in three States. Audit fieldwork was performed from February 2004 through August 2004. The audit was conducted in accordance with Government Auditing Standards. USDA/OIG-A/03099-195-KC Page 16 Exhibit A – FSA Response Exhibit A – Page 1 of 7 USDA/OIG-A/03099-195-KC Page 17 USDA/OIG-A/03099-195-KC Page 18 USDA/OIG-A/03099-195-KC Page 19 USDA/OIG-A/03099-195-KC Page 20 USDA/OIG-A/03099-195-KC Page 21 USDA/OIG-A/03099-195-KC Page 22 USDA/OIG-A/03099-195-KC Page 23 Informational copies of this report have been distributed to: Administrator, FSA ATTN: Agency Liaison Officer Government Accountability Office Office of Management and Budget Office of the Chief Financial Officer Director, Planning and Accountability Division (6) (1) (1) (1)

Valuable suggestions for finalizing your ‘New York State Department Of Health Selt Declaration Of Income Form’ online

Are you fed up with the inconvenience of managing paperwork? Look no further than airSlate SignNow, the top electronic signature platform for both individuals and businesses. Bid farewell to the tedious procedure of printing and scanning documents. With airSlate SignNow, you can effortlessly complete and sign documents online. Utilize the robust features integrated into this user-friendly and cost-effective platform to transform your paperwork management. Whether you need to approve forms or gather signatures, airSlate SignNow takes care of everything seamlessly, needing just a few clicks.

Adhere to this comprehensive guide:

  1. Access your account or initiate a free trial with our service.
  2. Click +Create to upload a file from your device, cloud storage, or our form repository.
  3. Open your ‘New York State Department Of Health Selt Declaration Of Income Form’ in the editor.
  4. Click Me (Fill Out Now) to set up the document on your end.
  5. Include and designate fillable fields for others (if necessary).
  6. Continue with the Send Invite options to solicit eSignatures from others.
  7. Save, print your copy, or convert it into a reusable template.

Don’t be concerned if you need to collaborate with your colleagues on your New York State Department Of Health Selt Declaration Of Income Form or send it for notarization—our solution offers everything required to accomplish such tasks. Register with airSlate SignNow today and elevate your document management to a new level!

Here is a list of the most common customer questions. If you can’t find an answer to your question, please don’t hesitate to reach out to us.

Need help? Contact Support
Self Declaration of income Form pdf
New york state department of health self declaration of income form download
Self-Declaration of no income Form
DOH Self Declaration of no income form
New york state department of health self declaration of income form online
Self Declaration of income letter template
Self Declaration of Income form spanish
DECLARATION of income or SUPPORT form nyc
Sign up and try New york state department of health selt declaration of income form
  • Close deals faster
  • Improve productivity
  • Delight customers
  • Increase revenue
  • Save time & money
  • Reduce payment cycles