Finding FA 2023-001: Eligibility: Incorrect Federal Pell Grant Amounts Awarded (Repeat Finding)
Federal Program Information
Assistance Listing Number: ALN 84.063
Federal Program Name: Student Financial Assistance Cluster.
Federal Pell Grant Program
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P063P200033 (Steve to Confirm)
Federal Award Year: July 1, 2022, to June 30, 2023
Campus: West Los Angeles College
Compliance Requirement: Eligibility
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations (CFR) 690.62 Calculation of a Federal Pell Grant, the amount of a student’s Pell Grant for an academic year is based upon the payment and disbursement schedules published by the Secretary for each award year. The Uniform Guidance Compliance Supplement states that the Department of Education provides institutions with Payment and Disbursement Schedules for determining Pell awards each year. The Payment or
Disbursement Schedule provides the maximum annual amount a student would receive for a full academic year for a given enrollment status, Expected Family Contribution (EFC), and Cost of Attendance (COA). The Payment Schedule is used to determine the annual award for full-time, three-quarter-time, half-time, and less-than-half-time students.
2 CFR section 200.303 requires that non-Federal entities receiving Federal awards establish and maintain internal control over the Federal awards that provide reasonable assurance that the non-Federal entity is managing the Federal awards in compliance with Federal statutes, regulations, and the terms and conditions of the Federal awards.
Identified Condition:
Of the twenty (20) students selected for eligibility test work at West Los Angeles College, we noted the following:
• 1 student had an incorrectly calculated Federal Pell Grant award, which resulted in an understatement of
the disbursement to the student by $773. The student was eligible to receive $1,273 yet received $500 in
Winter 2023.
Cause and Effect:
The institution has reviewed the student’s award and determined that the student was inadvertently disbursed $500 instead of $1,273 which is considered to be an underpayment. Once identified by the auditors, the award has since been corrected and refunded to the student. The Central Financial Aid Systems Unit and the District’s Student Information System (SIS) Information Technology department have reviewed both system controls and
manual intervention, but the cause remains undetermined.
Questioned Costs:
See schedule of findings and questioned costs
The District has a known net understatement of Pell Grant award disbursements of ($773). The projected total net understatement of the Pell Grant award disbursements is $186,345 as follows:
See schedule of findings and questioned costs
This is computed by dividing the error found in the samples per term (Fall/Winter term – net underpayment ($773) and Spring/Summer terms – $0) over the total Pell awards disbursed in the sample size per term (Winter term – $64,577, and Spring/Summer terms – $81,046) multiplied by the total Pell awards disbursed for the identified colleges per term (Fall/Winter term – $15,567,394 and Spring/Summer terms – $14,958,472). The computation is made on a per-term basis on a campus level and not on a district-wide level.
Recommendation:
We recommend that the District make the necessary system modifications to the PeopleSoft SIS to ensure student awards are properly calculated. This will help ensure that Federal Pell grants are properly awarded to students who meet the eligibility requirements.
Views of Responsible Officials and Planned Corrective Actions:
The District believes this error was an isolated incident and the effect is minimal as we performed an extensive
review of all nine campuses’ Pell grant award disbursements for the term and found that this was the only
similar award. The District will monitor disbursements and will perform reconciliation on a monthly basis.
Personnel Responsible for Implementation: FA Office and the Central Financial Aid Unit.
Position of Responsible Personnel: FA Managers
Expected Date of Implementation: Already Implemented
Finding FA 2023-002: Special Tests and Provision: Return of Title IV Funds: Incorrect Calculation of Return of Title IV Funds, Untimely Notification of Grant Overpayment to Students and Secretary, Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal Date (Repeat Finding)
Federal Program Information
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster;
Federal Pell Grant Program
Federal Direct Student Loans
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P007A210456, P063P215260, P268K225260
P007A210676, P063P215262, P268K225262, 21-C01-740
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles City College (Repeat Finding)
East Los Angeles College (Repeat Finding)
Los Angeles Harbor College (Repeat Finding)
Los Angeles Mission College (Repeat Finding)
Los Angeles Pierce College (Repeat Finding)
Los Angeles Southwest College (Repeat Finding)
Los Angeles Trade Technical College (Repeat Finding)
Los Angeles Valley College (Repeat Finding)
West Los Angeles College (Repeat Finding)
Compliance Requirement: Special Tests and Provisions – Return of Title IV Funds
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations 668.22 (a)(1) through (a)(5):
When a recipient of Title IV grant or loan assistance withdraws from an institution during a payment period or period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV aid earned by the student as of the student’s withdrawal date. If the total amount of Title IV assistance earned by the student is less than the amount that was disbursed to the student or on his or her behalf as of the date of the institution’s determination that the student withdrew, the difference must be returned to the Title IV programs as outlined in this section and no additional disbursements may be made to the student for the payment period or period of enrollment. If the amount the student earned is greater than the amount disbursed, the difference between the amounts must be treated as a post-withdrawal disbursement.
Per the Uniform Guidance Compliance Supplement:
Withdrawal Date:
If an institution is required to take attendance, the withdrawal date is the last date of academic attendance, as determined by the institution from its attendance records. An institution is required to take attendance if:
a. The institution is required to take attendance for some or all of its students by an entity outside of the
institution (such as the institution’s accrediting agency or state agency);
b. The institution itself has a requirement that its instructors take attendance; or
c. The institution or an outside entity has a requirement that can only be met by taking attendance or a
comparable process, including, but not limited to, requiring that students in a program demonstrate
attendance in the classes of that program or a portion of that program (34 CFR 668.22(b)(3)).
Note: As provided in the Department’s Program Integrity Q&As for Return of Title IV Funds, the monitoring
of whether online students log into classes does not by itself result in an institution being an institution that
is required to take attendance for Title IV, HEA program purposes because monitoring logins alone is not
monitoring academic engagement (as defined under 34 CFR 600.2). However, an institution that collects
and maintains information about students’ online activities for the purpose of tracking academic
engagement is considered to be an institution that is required to take attendance for programs involving
such tracking if that tracking:
1. Involves monitoring student attendance in a synchronous class, lecture, recitation, or field or laboratory
activity, physically or online via a distance education platform, where there is an opportunity for
interaction between the instructor and students; or
2. Is used to administratively withdraw students or to enforce an institutional attendance policy.
If an institution is not required to take attendance, the withdrawal date is (1) the date, as determined by the
institution, that the student began the withdrawal process prescribed by the institution; (2) the date, as
determined by the institution, that the student otherwise provided official notification to the institution, in
writing or orally, of his or her intent to withdraw; (3) if the student ceases attendance without providing
official notification to the institution of his or her withdrawal, the midpoint of the payment period or, if
applicable, the period of enrollment; (4) if the institution determines that a student did not begin the
withdrawal process or otherwise notify the institution of the intent to withdraw due to illness, accident,
grievous personal loss or other circumstances beyond the student’s control, the date the institution
determines is related to that circumstance; (5) if a student does not return from an approved leave of
absence, the date that the institution determines the student began the leave of absence; or (6) if the
student takes an unapproved leave of absence, the date that the student began the leave of absence.
Notwithstanding the above, an institution that is not required to take attendance may use as the withdrawal
date, the last date of attendance at an academically related activity as documented by the institution (34
CFR668.22(c) and (l)).
Title IV funds may be expended only towards the education of the students who can be proven to have
been in attendance at the institution. In a distance education context, documenting that a student has
logged into an online distance education platform or system is not sufficient, by itself, to demonstrate
attendance by the student. To avoid returning all funds for a student that did not begin attendance, an
institution must be able to document “attendance at any class.” To qualify as a last date of attendance for
Return of Title IV purposes, an institution must demonstrate that a student participated in class or was
otherwise engaged in an academically related activity, such as by contributing to an online discussion or
initiating contact with a faculty member to ask a course-related question.
Timing of Return of Title IV Funds
Returns of Title IV funds are required to be deposited or transferred into the SFA account or electronic fund
transfers initiated to ED as soon as possible, but no later than 45 days after the date the institution
determines that the student withdrew. Returns by check are late if the check is issued more than 45 days
after the institution determined the student withdrew or the date on the canceled check shows the check
was endorsed more than 60 days after the date the institution determined that the student withdrew (34
CFR 668.173(b)).
An institution that is not required to take attendance must determine the withdrawal date for a student who
withdraws without providing notification to the institution no later than 30 days after the end of the earlier of
the (1) payment period or period of enrollment, (2) academic year in which the student withdrew, or
(3) educational program from which the student withdrew (34 CFR 668.22(j)). The institution must also
notify the recipient of Title IV loans returned (34 CFR 685.306(a)(2)).
Identified Condition:
See schedule of findings and questioned costs
Description
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
We noted 1 of 15 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out, or never began attendance that had an incorrect calculation of
percentage of completion for Spring 2023 based on the student’s actual number of days completed
during the enrollment period. The student was enrolled in a session module course, which is a program
that does not span the entire length of the payment period or period of enrollment. For this type of
course, the student’s “actively enrolled days” should have been used in the return of Title IV funds
calculation. This error resulted in an overstatement of the institutional return by $13 and an
overstatement of the student’s return by $21. The effect of the overstatement of the student’s return did
not result in a questioned cost due to grant protection.
Los Angeles Southwest College
We noted 6 of 20 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out or never began attendance for Fall 2022 that had had an incorrect
calculation of the percentage of completion based on the student’s number of days completed during
the enrollment period.
For 3 students, these errors resulted in:
• 1 student with an understatement of institutional return of $37 and an understatement of student
return of $287.
• 1 student with an understatement of institutional return of $11 and an understatement of student
return of $197.
• 1 student with an overstatement of institutional return of $10 and overstatement of student return of
$20. The effect of the above overstatement of the student return did not result in questioned costs
due to grant protection.
For the remaining 3 students, we noted these students were enrolled in a session module course,
which is a program that does not span the entire length of the payment period or period of enrollment.
For this type of course, the student’s “actively enrolled days” should have been used in the return of
Title IV funds calculation These errors resulted in:
• 1 student with an overstatement of institutional return of $30.
• 1 student with an overstatement of institutional return of $187.
• 1 student with an overstatement of institutional return of $21 and an overstatement of student
return of $9. The effect of the overstatement of the student return did not result in questioned costs
due to grant protection.
B. Untimely Notification of Grant Overpayment to the Secretary
We noted that 1 out of 15 students selected for compliance test work at East Los Angeles College that
owed an overpayment of $187 as a result of the student’s withdrawal was referred to the Secretary of
the Department of Education beyond the 30-day timeframe from the date of the institution’s
determination that the student withdrew and owed overpayments as a result of the student’s
withdrawal. The required notification was submitted to the National Student Loan Data System
(NSLDS) 260 days late.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The District has not yet implemented a formal process in place to monitor a student’s active
participation in an online class and engagement in academic activities related to a distance education
(DE) course in order to determine the reasonableness and accuracy of the student’s withdrawal date in
the system. Currently, the withdrawal date used in the calculation of return to Title IV funds is the actual
date the student initiates the withdrawal from the course in the system.
Cause and Effect:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The Financial Aid Technician who processed the Spring 2023 return to Title IV had an oversight on that
record during his review process. He had a family emergency during that period and had to leave in the
middle of his review process. As a result, he forgot to deduct the spring break period from the total
number of days for the enrollment period. This caused the calculation to be slightly off.
Los Angeles Southwest College
The person who was assigned the role of handling the return to Title IV program received limited
training before he assumed the duties of return to Title IV calculations while also having to maintain his
full load as a Financial Aid Technician. In addition to the limited training, there were changes as to how
the program was administered and modules were calculated. This is an arduous task for a seasoned
professional and a very challenging task for a novice at best. As with all newly assigned duties, given
more time he would have become an expert in handling this program with minimal to zero errors.
B. Untimely Notification of Grant Overpayment to the Secretary
Every two weeks a new batch of return to Title IV report is released to be processed. The urgency for
each report to be completed within a certain time frame created confusion for the NSLDS reporting due
date. The same Financial Aid Technician was in charge of completing each step of the process. East
Los Angeles College has the largest return to Title IV population. The demand to meet the deadline
process caused an oversight for the NSLDS report.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The calculation of return to Title IV funds is a complex process. The District has invested significant
resources to improve the accuracy of the process. The District is centralizing and automating the return
to Title IV process to minimize potential errors. However, there are still manual aspects to the process.
In particular, distance education courses (DE) require faculty to withdraw students from Canvas, the
online content delivery application, and Peoplesoft, the District’s student information system.
Peoplesoft is used to maintain student records and for administering aid. Incorrect information entered
into either system can lead to an incorrect return to Title IV calculation, resulting in institutional liability
and/or disciplinary action taken by the U.S. Department of Education.
Questioned Costs:
A. Incorrect Calculation of Return to Title IV Funds
See schedule of findings and questioned costs
The District has a known net understatement of the amount due from the student of $434 and a known
net overstatement of the amount due from the District of $213. The Projected total net understatement
of amounts due from both the student and District is $4,006 as follows:
See schedule of findings and questioned costs.
This is computed by dividing the errors found in samples per term (Summer term – net understatement
$0 and Fall/Spring terms – net understatement $221 over the total Pell awards disbursed in the sample
size per term (Summer term – $5,000 and Fall/Spring terms – $176,293) multiplied by the total Pell
awards disbursed for the identified colleges per term (Summer term – $67,595 and Fall/Spring terms –
$3,195,662). The computation is made on a per-term basis on a campus level and not on a
district-wide level.
B. Untimely Notification of Grant Overpayment to the Secretary
None.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
None.
Recommendation:
We recommend that the District evaluate and improve its existing process and control procedures related
to the return of Title IV funds, including notification and return due date requirements. This will help ensure
1) that the returns of Title IV funds are accurately calculated and 2) compliance with the notification and
return due date requirements, in accordance with the Uniform Guidance and the Code of Federal
Regulation.
We recommend that the District implement additional controls at the course instructor level to effectively
monitor student participation and engagement in academic activities related to DE courses in order for the
instructor to determine the reasonableness and accuracy of a student’s withdrawal date listed in the
system. This will help ensure that the withdrawal date used in the calculation of the return of Title IV funds
is accurate.
Views of Responsible Officials and Planned Corrective Actions:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The corrective action plan that will be put in place is to develop a chart with a predetermined number of
days based on the enrollment period. This will avoid the manual counting of the number of days for
each student. We also trained an additional staff member to help with the workload. This will ensure
that errors will be caught before the completion of the review process. Implementation will begin in
Spring 2024. Staff is currently being trained.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Spring 2024
Los Angeles Southwest College
The corrective action that we are implementing to remediate this finding is to move the campus return
to Title IV processing to the “R2T4 Unit” at the District Office.
Personnel Responsible for Implementation: Muniece R. Bruton
Position of Responsible Personnel: Financial Aid Manager
Expected Date of Implementation: December 1, 2023
B. Untimely Notification of Grant Overpayment to Students and Secretary
East Los Angeles College
The Corrective Action plan is being implemented by providing an additional staff member to assist with
the return to Title IV process along with helping with the validation to ensure calculation, notification,
and reporting to NSLDS will be completed on a timely basis. A reminder is set in the Financial Aid
Technician Outlook calendar to help remind them to help meet the deadline of the reporting
requirement.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Fall 2023
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
In the fall 2022 term, the District implemented training for all Distance Education (DE) faculty members
to reduce the risk of data entry errors. DE faculty receive follow-up notifications at the beginning of
every term). In addition, the District attempted to conduct random sampling to ensure the accuracy of
the data entry. However, the District did not have the authorization or resources to perform sampling
during the audit period. As a result, the corrective action plan (CAP) was only partially implemented
during fiscal year 2023. In fall 2023, the District secured the human resources and required
authorizations to conduct random sampling of the faculty data entry. The District’s Internal Audit
Department (IAD) is performing random sampling of all campuses. As of fall 2023, all corrective actions
have been fully implemented.
Personnel Responsible for Implementation: Steve Giorgi, Betsy Regalado, Keyna Crenshaw
Position of Responsible Personnel: Financial Aid Manager, Associate Vice Chancellor of Educational
Programs and Institutional Effectiveness, LACCD Supervising Auditor)
Expected Date of Implementation: Fall 2023
Finding FA 2023-002: Special Tests and Provision: Return of Title IV Funds: Incorrect Calculation of Return of Title IV Funds, Untimely Notification of Grant Overpayment to Students and Secretary, Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal Date (Repeat Finding)
Federal Program Information
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster;
Federal Pell Grant Program
Federal Direct Student Loans
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P007A210456, P063P215260, P268K225260
P007A210676, P063P215262, P268K225262, 21-C01-740
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles City College (Repeat Finding)
East Los Angeles College (Repeat Finding)
Los Angeles Harbor College (Repeat Finding)
Los Angeles Mission College (Repeat Finding)
Los Angeles Pierce College (Repeat Finding)
Los Angeles Southwest College (Repeat Finding)
Los Angeles Trade Technical College (Repeat Finding)
Los Angeles Valley College (Repeat Finding)
West Los Angeles College (Repeat Finding)
Compliance Requirement: Special Tests and Provisions – Return of Title IV Funds
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations 668.22 (a)(1) through (a)(5):
When a recipient of Title IV grant or loan assistance withdraws from an institution during a payment period or period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV aid earned by the student as of the student’s withdrawal date. If the total amount of Title IV assistance earned by the student is less than the amount that was disbursed to the student or on his or her behalf as of the date of the institution’s determination that the student withdrew, the difference must be returned to the Title IV programs as outlined in this section and no additional disbursements may be made to the student for the payment period or period of enrollment. If the amount the student earned is greater than the amount disbursed, the difference between the amounts must be treated as a post-withdrawal disbursement.
Per the Uniform Guidance Compliance Supplement:
Withdrawal Date:
If an institution is required to take attendance, the withdrawal date is the last date of academic attendance, as determined by the institution from its attendance records. An institution is required to take attendance if:
a. The institution is required to take attendance for some or all of its students by an entity outside of the
institution (such as the institution’s accrediting agency or state agency);
b. The institution itself has a requirement that its instructors take attendance; or
c. The institution or an outside entity has a requirement that can only be met by taking attendance or a
comparable process, including, but not limited to, requiring that students in a program demonstrate
attendance in the classes of that program or a portion of that program (34 CFR 668.22(b)(3)).
Note: As provided in the Department’s Program Integrity Q&As for Return of Title IV Funds, the monitoring
of whether online students log into classes does not by itself result in an institution being an institution that
is required to take attendance for Title IV, HEA program purposes because monitoring logins alone is not
monitoring academic engagement (as defined under 34 CFR 600.2). However, an institution that collects
and maintains information about students’ online activities for the purpose of tracking academic
engagement is considered to be an institution that is required to take attendance for programs involving
such tracking if that tracking:
1. Involves monitoring student attendance in a synchronous class, lecture, recitation, or field or laboratory
activity, physically or online via a distance education platform, where there is an opportunity for
interaction between the instructor and students; or
2. Is used to administratively withdraw students or to enforce an institutional attendance policy.
If an institution is not required to take attendance, the withdrawal date is (1) the date, as determined by the
institution, that the student began the withdrawal process prescribed by the institution; (2) the date, as
determined by the institution, that the student otherwise provided official notification to the institution, in
writing or orally, of his or her intent to withdraw; (3) if the student ceases attendance without providing
official notification to the institution of his or her withdrawal, the midpoint of the payment period or, if
applicable, the period of enrollment; (4) if the institution determines that a student did not begin the
withdrawal process or otherwise notify the institution of the intent to withdraw due to illness, accident,
grievous personal loss or other circumstances beyond the student’s control, the date the institution
determines is related to that circumstance; (5) if a student does not return from an approved leave of
absence, the date that the institution determines the student began the leave of absence; or (6) if the
student takes an unapproved leave of absence, the date that the student began the leave of absence.
Notwithstanding the above, an institution that is not required to take attendance may use as the withdrawal
date, the last date of attendance at an academically related activity as documented by the institution (34
CFR668.22(c) and (l)).
Title IV funds may be expended only towards the education of the students who can be proven to have
been in attendance at the institution. In a distance education context, documenting that a student has
logged into an online distance education platform or system is not sufficient, by itself, to demonstrate
attendance by the student. To avoid returning all funds for a student that did not begin attendance, an
institution must be able to document “attendance at any class.” To qualify as a last date of attendance for
Return of Title IV purposes, an institution must demonstrate that a student participated in class or was
otherwise engaged in an academically related activity, such as by contributing to an online discussion or
initiating contact with a faculty member to ask a course-related question.
Timing of Return of Title IV Funds
Returns of Title IV funds are required to be deposited or transferred into the SFA account or electronic fund
transfers initiated to ED as soon as possible, but no later than 45 days after the date the institution
determines that the student withdrew. Returns by check are late if the check is issued more than 45 days
after the institution determined the student withdrew or the date on the canceled check shows the check
was endorsed more than 60 days after the date the institution determined that the student withdrew (34
CFR 668.173(b)).
An institution that is not required to take attendance must determine the withdrawal date for a student who
withdraws without providing notification to the institution no later than 30 days after the end of the earlier of
the (1) payment period or period of enrollment, (2) academic year in which the student withdrew, or
(3) educational program from which the student withdrew (34 CFR 668.22(j)). The institution must also
notify the recipient of Title IV loans returned (34 CFR 685.306(a)(2)).
Identified Condition:
See schedule of findings and questioned costs
Description
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
We noted 1 of 15 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out, or never began attendance that had an incorrect calculation of
percentage of completion for Spring 2023 based on the student’s actual number of days completed
during the enrollment period. The student was enrolled in a session module course, which is a program
that does not span the entire length of the payment period or period of enrollment. For this type of
course, the student’s “actively enrolled days” should have been used in the return of Title IV funds
calculation. This error resulted in an overstatement of the institutional return by $13 and an
overstatement of the student’s return by $21. The effect of the overstatement of the student’s return did
not result in a questioned cost due to grant protection.
Los Angeles Southwest College
We noted 6 of 20 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out or never began attendance for Fall 2022 that had had an incorrect
calculation of the percentage of completion based on the student’s number of days completed during
the enrollment period.
For 3 students, these errors resulted in:
• 1 student with an understatement of institutional return of $37 and an understatement of student
return of $287.
• 1 student with an understatement of institutional return of $11 and an understatement of student
return of $197.
• 1 student with an overstatement of institutional return of $10 and overstatement of student return of
$20. The effect of the above overstatement of the student return did not result in questioned costs
due to grant protection.
For the remaining 3 students, we noted these students were enrolled in a session module course,
which is a program that does not span the entire length of the payment period or period of enrollment.
For this type of course, the student’s “actively enrolled days” should have been used in the return of
Title IV funds calculation These errors resulted in:
• 1 student with an overstatement of institutional return of $30.
• 1 student with an overstatement of institutional return of $187.
• 1 student with an overstatement of institutional return of $21 and an overstatement of student
return of $9. The effect of the overstatement of the student return did not result in questioned costs
due to grant protection.
B. Untimely Notification of Grant Overpayment to the Secretary
We noted that 1 out of 15 students selected for compliance test work at East Los Angeles College that
owed an overpayment of $187 as a result of the student’s withdrawal was referred to the Secretary of
the Department of Education beyond the 30-day timeframe from the date of the institution’s
determination that the student withdrew and owed overpayments as a result of the student’s
withdrawal. The required notification was submitted to the National Student Loan Data System
(NSLDS) 260 days late.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The District has not yet implemented a formal process in place to monitor a student’s active
participation in an online class and engagement in academic activities related to a distance education
(DE) course in order to determine the reasonableness and accuracy of the student’s withdrawal date in
the system. Currently, the withdrawal date used in the calculation of return to Title IV funds is the actual
date the student initiates the withdrawal from the course in the system.
Cause and Effect:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The Financial Aid Technician who processed the Spring 2023 return to Title IV had an oversight on that
record during his review process. He had a family emergency during that period and had to leave in the
middle of his review process. As a result, he forgot to deduct the spring break period from the total
number of days for the enrollment period. This caused the calculation to be slightly off.
Los Angeles Southwest College
The person who was assigned the role of handling the return to Title IV program received limited
training before he assumed the duties of return to Title IV calculations while also having to maintain his
full load as a Financial Aid Technician. In addition to the limited training, there were changes as to how
the program was administered and modules were calculated. This is an arduous task for a seasoned
professional and a very challenging task for a novice at best. As with all newly assigned duties, given
more time he would have become an expert in handling this program with minimal to zero errors.
B. Untimely Notification of Grant Overpayment to the Secretary
Every two weeks a new batch of return to Title IV report is released to be processed. The urgency for
each report to be completed within a certain time frame created confusion for the NSLDS reporting due
date. The same Financial Aid Technician was in charge of completing each step of the process. East
Los Angeles College has the largest return to Title IV population. The demand to meet the deadline
process caused an oversight for the NSLDS report.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The calculation of return to Title IV funds is a complex process. The District has invested significant
resources to improve the accuracy of the process. The District is centralizing and automating the return
to Title IV process to minimize potential errors. However, there are still manual aspects to the process.
In particular, distance education courses (DE) require faculty to withdraw students from Canvas, the
online content delivery application, and Peoplesoft, the District’s student information system.
Peoplesoft is used to maintain student records and for administering aid. Incorrect information entered
into either system can lead to an incorrect return to Title IV calculation, resulting in institutional liability
and/or disciplinary action taken by the U.S. Department of Education.
Questioned Costs:
A. Incorrect Calculation of Return to Title IV Funds
See schedule of findings and questioned costs
The District has a known net understatement of the amount due from the student of $434 and a known
net overstatement of the amount due from the District of $213. The Projected total net understatement
of amounts due from both the student and District is $4,006 as follows:
See schedule of findings and questioned costs.
This is computed by dividing the errors found in samples per term (Summer term – net understatement
$0 and Fall/Spring terms – net understatement $221 over the total Pell awards disbursed in the sample
size per term (Summer term – $5,000 and Fall/Spring terms – $176,293) multiplied by the total Pell
awards disbursed for the identified colleges per term (Summer term – $67,595 and Fall/Spring terms –
$3,195,662). The computation is made on a per-term basis on a campus level and not on a
district-wide level.
B. Untimely Notification of Grant Overpayment to the Secretary
None.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
None.
Recommendation:
We recommend that the District evaluate and improve its existing process and control procedures related
to the return of Title IV funds, including notification and return due date requirements. This will help ensure
1) that the returns of Title IV funds are accurately calculated and 2) compliance with the notification and
return due date requirements, in accordance with the Uniform Guidance and the Code of Federal
Regulation.
We recommend that the District implement additional controls at the course instructor level to effectively
monitor student participation and engagement in academic activities related to DE courses in order for the
instructor to determine the reasonableness and accuracy of a student’s withdrawal date listed in the
system. This will help ensure that the withdrawal date used in the calculation of the return of Title IV funds
is accurate.
Views of Responsible Officials and Planned Corrective Actions:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The corrective action plan that will be put in place is to develop a chart with a predetermined number of
days based on the enrollment period. This will avoid the manual counting of the number of days for
each student. We also trained an additional staff member to help with the workload. This will ensure
that errors will be caught before the completion of the review process. Implementation will begin in
Spring 2024. Staff is currently being trained.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Spring 2024
Los Angeles Southwest College
The corrective action that we are implementing to remediate this finding is to move the campus return
to Title IV processing to the “R2T4 Unit” at the District Office.
Personnel Responsible for Implementation: Muniece R. Bruton
Position of Responsible Personnel: Financial Aid Manager
Expected Date of Implementation: December 1, 2023
B. Untimely Notification of Grant Overpayment to Students and Secretary
East Los Angeles College
The Corrective Action plan is being implemented by providing an additional staff member to assist with
the return to Title IV process along with helping with the validation to ensure calculation, notification,
and reporting to NSLDS will be completed on a timely basis. A reminder is set in the Financial Aid
Technician Outlook calendar to help remind them to help meet the deadline of the reporting
requirement.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Fall 2023
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
In the fall 2022 term, the District implemented training for all Distance Education (DE) faculty members
to reduce the risk of data entry errors. DE faculty receive follow-up notifications at the beginning of
every term). In addition, the District attempted to conduct random sampling to ensure the accuracy of
the data entry. However, the District did not have the authorization or resources to perform sampling
during the audit period. As a result, the corrective action plan (CAP) was only partially implemented
during fiscal year 2023. In fall 2023, the District secured the human resources and required
authorizations to conduct random sampling of the faculty data entry. The District’s Internal Audit
Department (IAD) is performing random sampling of all campuses. As of fall 2023, all corrective actions
have been fully implemented.
Personnel Responsible for Implementation: Steve Giorgi, Betsy Regalado, Keyna Crenshaw
Position of Responsible Personnel: Financial Aid Manager, Associate Vice Chancellor of Educational
Programs and Institutional Effectiveness, LACCD Supervising Auditor)
Expected Date of Implementation: Fall 2023
Finding FA 2023-002: Special Tests and Provision: Return of Title IV Funds: Incorrect Calculation of Return of Title IV Funds, Untimely Notification of Grant Overpayment to Students and Secretary, Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal Date (Repeat Finding)
Federal Program Information
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster;
Federal Pell Grant Program
Federal Direct Student Loans
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P007A210456, P063P215260, P268K225260
P007A210676, P063P215262, P268K225262, 21-C01-740
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles City College (Repeat Finding)
East Los Angeles College (Repeat Finding)
Los Angeles Harbor College (Repeat Finding)
Los Angeles Mission College (Repeat Finding)
Los Angeles Pierce College (Repeat Finding)
Los Angeles Southwest College (Repeat Finding)
Los Angeles Trade Technical College (Repeat Finding)
Los Angeles Valley College (Repeat Finding)
West Los Angeles College (Repeat Finding)
Compliance Requirement: Special Tests and Provisions – Return of Title IV Funds
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations 668.22 (a)(1) through (a)(5):
When a recipient of Title IV grant or loan assistance withdraws from an institution during a payment period or period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV aid earned by the student as of the student’s withdrawal date. If the total amount of Title IV assistance earned by the student is less than the amount that was disbursed to the student or on his or her behalf as of the date of the institution’s determination that the student withdrew, the difference must be returned to the Title IV programs as outlined in this section and no additional disbursements may be made to the student for the payment period or period of enrollment. If the amount the student earned is greater than the amount disbursed, the difference between the amounts must be treated as a post-withdrawal disbursement.
Per the Uniform Guidance Compliance Supplement:
Withdrawal Date:
If an institution is required to take attendance, the withdrawal date is the last date of academic attendance, as determined by the institution from its attendance records. An institution is required to take attendance if:
a. The institution is required to take attendance for some or all of its students by an entity outside of the
institution (such as the institution’s accrediting agency or state agency);
b. The institution itself has a requirement that its instructors take attendance; or
c. The institution or an outside entity has a requirement that can only be met by taking attendance or a
comparable process, including, but not limited to, requiring that students in a program demonstrate
attendance in the classes of that program or a portion of that program (34 CFR 668.22(b)(3)).
Note: As provided in the Department’s Program Integrity Q&As for Return of Title IV Funds, the monitoring
of whether online students log into classes does not by itself result in an institution being an institution that
is required to take attendance for Title IV, HEA program purposes because monitoring logins alone is not
monitoring academic engagement (as defined under 34 CFR 600.2). However, an institution that collects
and maintains information about students’ online activities for the purpose of tracking academic
engagement is considered to be an institution that is required to take attendance for programs involving
such tracking if that tracking:
1. Involves monitoring student attendance in a synchronous class, lecture, recitation, or field or laboratory
activity, physically or online via a distance education platform, where there is an opportunity for
interaction between the instructor and students; or
2. Is used to administratively withdraw students or to enforce an institutional attendance policy.
If an institution is not required to take attendance, the withdrawal date is (1) the date, as determined by the
institution, that the student began the withdrawal process prescribed by the institution; (2) the date, as
determined by the institution, that the student otherwise provided official notification to the institution, in
writing or orally, of his or her intent to withdraw; (3) if the student ceases attendance without providing
official notification to the institution of his or her withdrawal, the midpoint of the payment period or, if
applicable, the period of enrollment; (4) if the institution determines that a student did not begin the
withdrawal process or otherwise notify the institution of the intent to withdraw due to illness, accident,
grievous personal loss or other circumstances beyond the student’s control, the date the institution
determines is related to that circumstance; (5) if a student does not return from an approved leave of
absence, the date that the institution determines the student began the leave of absence; or (6) if the
student takes an unapproved leave of absence, the date that the student began the leave of absence.
Notwithstanding the above, an institution that is not required to take attendance may use as the withdrawal
date, the last date of attendance at an academically related activity as documented by the institution (34
CFR668.22(c) and (l)).
Title IV funds may be expended only towards the education of the students who can be proven to have
been in attendance at the institution. In a distance education context, documenting that a student has
logged into an online distance education platform or system is not sufficient, by itself, to demonstrate
attendance by the student. To avoid returning all funds for a student that did not begin attendance, an
institution must be able to document “attendance at any class.” To qualify as a last date of attendance for
Return of Title IV purposes, an institution must demonstrate that a student participated in class or was
otherwise engaged in an academically related activity, such as by contributing to an online discussion or
initiating contact with a faculty member to ask a course-related question.
Timing of Return of Title IV Funds
Returns of Title IV funds are required to be deposited or transferred into the SFA account or electronic fund
transfers initiated to ED as soon as possible, but no later than 45 days after the date the institution
determines that the student withdrew. Returns by check are late if the check is issued more than 45 days
after the institution determined the student withdrew or the date on the canceled check shows the check
was endorsed more than 60 days after the date the institution determined that the student withdrew (34
CFR 668.173(b)).
An institution that is not required to take attendance must determine the withdrawal date for a student who
withdraws without providing notification to the institution no later than 30 days after the end of the earlier of
the (1) payment period or period of enrollment, (2) academic year in which the student withdrew, or
(3) educational program from which the student withdrew (34 CFR 668.22(j)). The institution must also
notify the recipient of Title IV loans returned (34 CFR 685.306(a)(2)).
Identified Condition:
See schedule of findings and questioned costs
Description
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
We noted 1 of 15 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out, or never began attendance that had an incorrect calculation of
percentage of completion for Spring 2023 based on the student’s actual number of days completed
during the enrollment period. The student was enrolled in a session module course, which is a program
that does not span the entire length of the payment period or period of enrollment. For this type of
course, the student’s “actively enrolled days” should have been used in the return of Title IV funds
calculation. This error resulted in an overstatement of the institutional return by $13 and an
overstatement of the student’s return by $21. The effect of the overstatement of the student’s return did
not result in a questioned cost due to grant protection.
Los Angeles Southwest College
We noted 6 of 20 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out or never began attendance for Fall 2022 that had had an incorrect
calculation of the percentage of completion based on the student’s number of days completed during
the enrollment period.
For 3 students, these errors resulted in:
• 1 student with an understatement of institutional return of $37 and an understatement of student
return of $287.
• 1 student with an understatement of institutional return of $11 and an understatement of student
return of $197.
• 1 student with an overstatement of institutional return of $10 and overstatement of student return of
$20. The effect of the above overstatement of the student return did not result in questioned costs
due to grant protection.
For the remaining 3 students, we noted these students were enrolled in a session module course,
which is a program that does not span the entire length of the payment period or period of enrollment.
For this type of course, the student’s “actively enrolled days” should have been used in the return of
Title IV funds calculation These errors resulted in:
• 1 student with an overstatement of institutional return of $30.
• 1 student with an overstatement of institutional return of $187.
• 1 student with an overstatement of institutional return of $21 and an overstatement of student
return of $9. The effect of the overstatement of the student return did not result in questioned costs
due to grant protection.
B. Untimely Notification of Grant Overpayment to the Secretary
We noted that 1 out of 15 students selected for compliance test work at East Los Angeles College that
owed an overpayment of $187 as a result of the student’s withdrawal was referred to the Secretary of
the Department of Education beyond the 30-day timeframe from the date of the institution’s
determination that the student withdrew and owed overpayments as a result of the student’s
withdrawal. The required notification was submitted to the National Student Loan Data System
(NSLDS) 260 days late.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The District has not yet implemented a formal process in place to monitor a student’s active
participation in an online class and engagement in academic activities related to a distance education
(DE) course in order to determine the reasonableness and accuracy of the student’s withdrawal date in
the system. Currently, the withdrawal date used in the calculation of return to Title IV funds is the actual
date the student initiates the withdrawal from the course in the system.
Cause and Effect:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The Financial Aid Technician who processed the Spring 2023 return to Title IV had an oversight on that
record during his review process. He had a family emergency during that period and had to leave in the
middle of his review process. As a result, he forgot to deduct the spring break period from the total
number of days for the enrollment period. This caused the calculation to be slightly off.
Los Angeles Southwest College
The person who was assigned the role of handling the return to Title IV program received limited
training before he assumed the duties of return to Title IV calculations while also having to maintain his
full load as a Financial Aid Technician. In addition to the limited training, there were changes as to how
the program was administered and modules were calculated. This is an arduous task for a seasoned
professional and a very challenging task for a novice at best. As with all newly assigned duties, given
more time he would have become an expert in handling this program with minimal to zero errors.
B. Untimely Notification of Grant Overpayment to the Secretary
Every two weeks a new batch of return to Title IV report is released to be processed. The urgency for
each report to be completed within a certain time frame created confusion for the NSLDS reporting due
date. The same Financial Aid Technician was in charge of completing each step of the process. East
Los Angeles College has the largest return to Title IV population. The demand to meet the deadline
process caused an oversight for the NSLDS report.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The calculation of return to Title IV funds is a complex process. The District has invested significant
resources to improve the accuracy of the process. The District is centralizing and automating the return
to Title IV process to minimize potential errors. However, there are still manual aspects to the process.
In particular, distance education courses (DE) require faculty to withdraw students from Canvas, the
online content delivery application, and Peoplesoft, the District’s student information system.
Peoplesoft is used to maintain student records and for administering aid. Incorrect information entered
into either system can lead to an incorrect return to Title IV calculation, resulting in institutional liability
and/or disciplinary action taken by the U.S. Department of Education.
Questioned Costs:
A. Incorrect Calculation of Return to Title IV Funds
See schedule of findings and questioned costs
The District has a known net understatement of the amount due from the student of $434 and a known
net overstatement of the amount due from the District of $213. The Projected total net understatement
of amounts due from both the student and District is $4,006 as follows:
See schedule of findings and questioned costs.
This is computed by dividing the errors found in samples per term (Summer term – net understatement
$0 and Fall/Spring terms – net understatement $221 over the total Pell awards disbursed in the sample
size per term (Summer term – $5,000 and Fall/Spring terms – $176,293) multiplied by the total Pell
awards disbursed for the identified colleges per term (Summer term – $67,595 and Fall/Spring terms –
$3,195,662). The computation is made on a per-term basis on a campus level and not on a
district-wide level.
B. Untimely Notification of Grant Overpayment to the Secretary
None.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
None.
Recommendation:
We recommend that the District evaluate and improve its existing process and control procedures related
to the return of Title IV funds, including notification and return due date requirements. This will help ensure
1) that the returns of Title IV funds are accurately calculated and 2) compliance with the notification and
return due date requirements, in accordance with the Uniform Guidance and the Code of Federal
Regulation.
We recommend that the District implement additional controls at the course instructor level to effectively
monitor student participation and engagement in academic activities related to DE courses in order for the
instructor to determine the reasonableness and accuracy of a student’s withdrawal date listed in the
system. This will help ensure that the withdrawal date used in the calculation of the return of Title IV funds
is accurate.
Views of Responsible Officials and Planned Corrective Actions:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The corrective action plan that will be put in place is to develop a chart with a predetermined number of
days based on the enrollment period. This will avoid the manual counting of the number of days for
each student. We also trained an additional staff member to help with the workload. This will ensure
that errors will be caught before the completion of the review process. Implementation will begin in
Spring 2024. Staff is currently being trained.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Spring 2024
Los Angeles Southwest College
The corrective action that we are implementing to remediate this finding is to move the campus return
to Title IV processing to the “R2T4 Unit” at the District Office.
Personnel Responsible for Implementation: Muniece R. Bruton
Position of Responsible Personnel: Financial Aid Manager
Expected Date of Implementation: December 1, 2023
B. Untimely Notification of Grant Overpayment to Students and Secretary
East Los Angeles College
The Corrective Action plan is being implemented by providing an additional staff member to assist with
the return to Title IV process along with helping with the validation to ensure calculation, notification,
and reporting to NSLDS will be completed on a timely basis. A reminder is set in the Financial Aid
Technician Outlook calendar to help remind them to help meet the deadline of the reporting
requirement.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Fall 2023
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
In the fall 2022 term, the District implemented training for all Distance Education (DE) faculty members
to reduce the risk of data entry errors. DE faculty receive follow-up notifications at the beginning of
every term). In addition, the District attempted to conduct random sampling to ensure the accuracy of
the data entry. However, the District did not have the authorization or resources to perform sampling
during the audit period. As a result, the corrective action plan (CAP) was only partially implemented
during fiscal year 2023. In fall 2023, the District secured the human resources and required
authorizations to conduct random sampling of the faculty data entry. The District’s Internal Audit
Department (IAD) is performing random sampling of all campuses. As of fall 2023, all corrective actions
have been fully implemented.
Personnel Responsible for Implementation: Steve Giorgi, Betsy Regalado, Keyna Crenshaw
Position of Responsible Personnel: Financial Aid Manager, Associate Vice Chancellor of Educational
Programs and Institutional Effectiveness, LACCD Supervising Auditor)
Expected Date of Implementation: Fall 2023
Finding FA 2023-002: Special Tests and Provision: Return of Title IV Funds: Incorrect Calculation of Return of Title IV Funds, Untimely Notification of Grant Overpayment to Students and Secretary, Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal Date (Repeat Finding)
Federal Program Information
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster;
Federal Pell Grant Program
Federal Direct Student Loans
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P007A210456, P063P215260, P268K225260
P007A210676, P063P215262, P268K225262, 21-C01-740
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles City College (Repeat Finding)
East Los Angeles College (Repeat Finding)
Los Angeles Harbor College (Repeat Finding)
Los Angeles Mission College (Repeat Finding)
Los Angeles Pierce College (Repeat Finding)
Los Angeles Southwest College (Repeat Finding)
Los Angeles Trade Technical College (Repeat Finding)
Los Angeles Valley College (Repeat Finding)
West Los Angeles College (Repeat Finding)
Compliance Requirement: Special Tests and Provisions – Return of Title IV Funds
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations 668.22 (a)(1) through (a)(5):
When a recipient of Title IV grant or loan assistance withdraws from an institution during a payment period or period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV aid earned by the student as of the student’s withdrawal date. If the total amount of Title IV assistance earned by the student is less than the amount that was disbursed to the student or on his or her behalf as of the date of the institution’s determination that the student withdrew, the difference must be returned to the Title IV programs as outlined in this section and no additional disbursements may be made to the student for the payment period or period of enrollment. If the amount the student earned is greater than the amount disbursed, the difference between the amounts must be treated as a post-withdrawal disbursement.
Per the Uniform Guidance Compliance Supplement:
Withdrawal Date:
If an institution is required to take attendance, the withdrawal date is the last date of academic attendance, as determined by the institution from its attendance records. An institution is required to take attendance if:
a. The institution is required to take attendance for some or all of its students by an entity outside of the
institution (such as the institution’s accrediting agency or state agency);
b. The institution itself has a requirement that its instructors take attendance; or
c. The institution or an outside entity has a requirement that can only be met by taking attendance or a
comparable process, including, but not limited to, requiring that students in a program demonstrate
attendance in the classes of that program or a portion of that program (34 CFR 668.22(b)(3)).
Note: As provided in the Department’s Program Integrity Q&As for Return of Title IV Funds, the monitoring
of whether online students log into classes does not by itself result in an institution being an institution that
is required to take attendance for Title IV, HEA program purposes because monitoring logins alone is not
monitoring academic engagement (as defined under 34 CFR 600.2). However, an institution that collects
and maintains information about students’ online activities for the purpose of tracking academic
engagement is considered to be an institution that is required to take attendance for programs involving
such tracking if that tracking:
1. Involves monitoring student attendance in a synchronous class, lecture, recitation, or field or laboratory
activity, physically or online via a distance education platform, where there is an opportunity for
interaction between the instructor and students; or
2. Is used to administratively withdraw students or to enforce an institutional attendance policy.
If an institution is not required to take attendance, the withdrawal date is (1) the date, as determined by the
institution, that the student began the withdrawal process prescribed by the institution; (2) the date, as
determined by the institution, that the student otherwise provided official notification to the institution, in
writing or orally, of his or her intent to withdraw; (3) if the student ceases attendance without providing
official notification to the institution of his or her withdrawal, the midpoint of the payment period or, if
applicable, the period of enrollment; (4) if the institution determines that a student did not begin the
withdrawal process or otherwise notify the institution of the intent to withdraw due to illness, accident,
grievous personal loss or other circumstances beyond the student’s control, the date the institution
determines is related to that circumstance; (5) if a student does not return from an approved leave of
absence, the date that the institution determines the student began the leave of absence; or (6) if the
student takes an unapproved leave of absence, the date that the student began the leave of absence.
Notwithstanding the above, an institution that is not required to take attendance may use as the withdrawal
date, the last date of attendance at an academically related activity as documented by the institution (34
CFR668.22(c) and (l)).
Title IV funds may be expended only towards the education of the students who can be proven to have
been in attendance at the institution. In a distance education context, documenting that a student has
logged into an online distance education platform or system is not sufficient, by itself, to demonstrate
attendance by the student. To avoid returning all funds for a student that did not begin attendance, an
institution must be able to document “attendance at any class.” To qualify as a last date of attendance for
Return of Title IV purposes, an institution must demonstrate that a student participated in class or was
otherwise engaged in an academically related activity, such as by contributing to an online discussion or
initiating contact with a faculty member to ask a course-related question.
Timing of Return of Title IV Funds
Returns of Title IV funds are required to be deposited or transferred into the SFA account or electronic fund
transfers initiated to ED as soon as possible, but no later than 45 days after the date the institution
determines that the student withdrew. Returns by check are late if the check is issued more than 45 days
after the institution determined the student withdrew or the date on the canceled check shows the check
was endorsed more than 60 days after the date the institution determined that the student withdrew (34
CFR 668.173(b)).
An institution that is not required to take attendance must determine the withdrawal date for a student who
withdraws without providing notification to the institution no later than 30 days after the end of the earlier of
the (1) payment period or period of enrollment, (2) academic year in which the student withdrew, or
(3) educational program from which the student withdrew (34 CFR 668.22(j)). The institution must also
notify the recipient of Title IV loans returned (34 CFR 685.306(a)(2)).
Identified Condition:
See schedule of findings and questioned costs
Description
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
We noted 1 of 15 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out, or never began attendance that had an incorrect calculation of
percentage of completion for Spring 2023 based on the student’s actual number of days completed
during the enrollment period. The student was enrolled in a session module course, which is a program
that does not span the entire length of the payment period or period of enrollment. For this type of
course, the student’s “actively enrolled days” should have been used in the return of Title IV funds
calculation. This error resulted in an overstatement of the institutional return by $13 and an
overstatement of the student’s return by $21. The effect of the overstatement of the student’s return did
not result in a questioned cost due to grant protection.
Los Angeles Southwest College
We noted 6 of 20 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out or never began attendance for Fall 2022 that had had an incorrect
calculation of the percentage of completion based on the student’s number of days completed during
the enrollment period.
For 3 students, these errors resulted in:
• 1 student with an understatement of institutional return of $37 and an understatement of student
return of $287.
• 1 student with an understatement of institutional return of $11 and an understatement of student
return of $197.
• 1 student with an overstatement of institutional return of $10 and overstatement of student return of
$20. The effect of the above overstatement of the student return did not result in questioned costs
due to grant protection.
For the remaining 3 students, we noted these students were enrolled in a session module course,
which is a program that does not span the entire length of the payment period or period of enrollment.
For this type of course, the student’s “actively enrolled days” should have been used in the return of
Title IV funds calculation These errors resulted in:
• 1 student with an overstatement of institutional return of $30.
• 1 student with an overstatement of institutional return of $187.
• 1 student with an overstatement of institutional return of $21 and an overstatement of student
return of $9. The effect of the overstatement of the student return did not result in questioned costs
due to grant protection.
B. Untimely Notification of Grant Overpayment to the Secretary
We noted that 1 out of 15 students selected for compliance test work at East Los Angeles College that
owed an overpayment of $187 as a result of the student’s withdrawal was referred to the Secretary of
the Department of Education beyond the 30-day timeframe from the date of the institution’s
determination that the student withdrew and owed overpayments as a result of the student’s
withdrawal. The required notification was submitted to the National Student Loan Data System
(NSLDS) 260 days late.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The District has not yet implemented a formal process in place to monitor a student’s active
participation in an online class and engagement in academic activities related to a distance education
(DE) course in order to determine the reasonableness and accuracy of the student’s withdrawal date in
the system. Currently, the withdrawal date used in the calculation of return to Title IV funds is the actual
date the student initiates the withdrawal from the course in the system.
Cause and Effect:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The Financial Aid Technician who processed the Spring 2023 return to Title IV had an oversight on that
record during his review process. He had a family emergency during that period and had to leave in the
middle of his review process. As a result, he forgot to deduct the spring break period from the total
number of days for the enrollment period. This caused the calculation to be slightly off.
Los Angeles Southwest College
The person who was assigned the role of handling the return to Title IV program received limited
training before he assumed the duties of return to Title IV calculations while also having to maintain his
full load as a Financial Aid Technician. In addition to the limited training, there were changes as to how
the program was administered and modules were calculated. This is an arduous task for a seasoned
professional and a very challenging task for a novice at best. As with all newly assigned duties, given
more time he would have become an expert in handling this program with minimal to zero errors.
B. Untimely Notification of Grant Overpayment to the Secretary
Every two weeks a new batch of return to Title IV report is released to be processed. The urgency for
each report to be completed within a certain time frame created confusion for the NSLDS reporting due
date. The same Financial Aid Technician was in charge of completing each step of the process. East
Los Angeles College has the largest return to Title IV population. The demand to meet the deadline
process caused an oversight for the NSLDS report.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The calculation of return to Title IV funds is a complex process. The District has invested significant
resources to improve the accuracy of the process. The District is centralizing and automating the return
to Title IV process to minimize potential errors. However, there are still manual aspects to the process.
In particular, distance education courses (DE) require faculty to withdraw students from Canvas, the
online content delivery application, and Peoplesoft, the District’s student information system.
Peoplesoft is used to maintain student records and for administering aid. Incorrect information entered
into either system can lead to an incorrect return to Title IV calculation, resulting in institutional liability
and/or disciplinary action taken by the U.S. Department of Education.
Questioned Costs:
A. Incorrect Calculation of Return to Title IV Funds
See schedule of findings and questioned costs
The District has a known net understatement of the amount due from the student of $434 and a known
net overstatement of the amount due from the District of $213. The Projected total net understatement
of amounts due from both the student and District is $4,006 as follows:
See schedule of findings and questioned costs.
This is computed by dividing the errors found in samples per term (Summer term – net understatement
$0 and Fall/Spring terms – net understatement $221 over the total Pell awards disbursed in the sample
size per term (Summer term – $5,000 and Fall/Spring terms – $176,293) multiplied by the total Pell
awards disbursed for the identified colleges per term (Summer term – $67,595 and Fall/Spring terms –
$3,195,662). The computation is made on a per-term basis on a campus level and not on a
district-wide level.
B. Untimely Notification of Grant Overpayment to the Secretary
None.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
None.
Recommendation:
We recommend that the District evaluate and improve its existing process and control procedures related
to the return of Title IV funds, including notification and return due date requirements. This will help ensure
1) that the returns of Title IV funds are accurately calculated and 2) compliance with the notification and
return due date requirements, in accordance with the Uniform Guidance and the Code of Federal
Regulation.
We recommend that the District implement additional controls at the course instructor level to effectively
monitor student participation and engagement in academic activities related to DE courses in order for the
instructor to determine the reasonableness and accuracy of a student’s withdrawal date listed in the
system. This will help ensure that the withdrawal date used in the calculation of the return of Title IV funds
is accurate.
Views of Responsible Officials and Planned Corrective Actions:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The corrective action plan that will be put in place is to develop a chart with a predetermined number of
days based on the enrollment period. This will avoid the manual counting of the number of days for
each student. We also trained an additional staff member to help with the workload. This will ensure
that errors will be caught before the completion of the review process. Implementation will begin in
Spring 2024. Staff is currently being trained.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Spring 2024
Los Angeles Southwest College
The corrective action that we are implementing to remediate this finding is to move the campus return
to Title IV processing to the “R2T4 Unit” at the District Office.
Personnel Responsible for Implementation: Muniece R. Bruton
Position of Responsible Personnel: Financial Aid Manager
Expected Date of Implementation: December 1, 2023
B. Untimely Notification of Grant Overpayment to Students and Secretary
East Los Angeles College
The Corrective Action plan is being implemented by providing an additional staff member to assist with
the return to Title IV process along with helping with the validation to ensure calculation, notification,
and reporting to NSLDS will be completed on a timely basis. A reminder is set in the Financial Aid
Technician Outlook calendar to help remind them to help meet the deadline of the reporting
requirement.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Fall 2023
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
In the fall 2022 term, the District implemented training for all Distance Education (DE) faculty members
to reduce the risk of data entry errors. DE faculty receive follow-up notifications at the beginning of
every term). In addition, the District attempted to conduct random sampling to ensure the accuracy of
the data entry. However, the District did not have the authorization or resources to perform sampling
during the audit period. As a result, the corrective action plan (CAP) was only partially implemented
during fiscal year 2023. In fall 2023, the District secured the human resources and required
authorizations to conduct random sampling of the faculty data entry. The District’s Internal Audit
Department (IAD) is performing random sampling of all campuses. As of fall 2023, all corrective actions
have been fully implemented.
Personnel Responsible for Implementation: Steve Giorgi, Betsy Regalado, Keyna Crenshaw
Position of Responsible Personnel: Financial Aid Manager, Associate Vice Chancellor of Educational
Programs and Institutional Effectiveness, LACCD Supervising Auditor)
Expected Date of Implementation: Fall 2023
Finding FA 2023-002: Special Tests and Provision: Return of Title IV Funds: Incorrect Calculation of Return of Title IV Funds, Untimely Notification of Grant Overpayment to Students and Secretary, Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal Date (Repeat Finding)
Federal Program Information
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster;
Federal Pell Grant Program
Federal Direct Student Loans
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P007A210456, P063P215260, P268K225260
P007A210676, P063P215262, P268K225262, 21-C01-740
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles City College (Repeat Finding)
East Los Angeles College (Repeat Finding)
Los Angeles Harbor College (Repeat Finding)
Los Angeles Mission College (Repeat Finding)
Los Angeles Pierce College (Repeat Finding)
Los Angeles Southwest College (Repeat Finding)
Los Angeles Trade Technical College (Repeat Finding)
Los Angeles Valley College (Repeat Finding)
West Los Angeles College (Repeat Finding)
Compliance Requirement: Special Tests and Provisions – Return of Title IV Funds
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations 668.22 (a)(1) through (a)(5):
When a recipient of Title IV grant or loan assistance withdraws from an institution during a payment period or period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV aid earned by the student as of the student’s withdrawal date. If the total amount of Title IV assistance earned by the student is less than the amount that was disbursed to the student or on his or her behalf as of the date of the institution’s determination that the student withdrew, the difference must be returned to the Title IV programs as outlined in this section and no additional disbursements may be made to the student for the payment period or period of enrollment. If the amount the student earned is greater than the amount disbursed, the difference between the amounts must be treated as a post-withdrawal disbursement.
Per the Uniform Guidance Compliance Supplement:
Withdrawal Date:
If an institution is required to take attendance, the withdrawal date is the last date of academic attendance, as determined by the institution from its attendance records. An institution is required to take attendance if:
a. The institution is required to take attendance for some or all of its students by an entity outside of the
institution (such as the institution’s accrediting agency or state agency);
b. The institution itself has a requirement that its instructors take attendance; or
c. The institution or an outside entity has a requirement that can only be met by taking attendance or a
comparable process, including, but not limited to, requiring that students in a program demonstrate
attendance in the classes of that program or a portion of that program (34 CFR 668.22(b)(3)).
Note: As provided in the Department’s Program Integrity Q&As for Return of Title IV Funds, the monitoring
of whether online students log into classes does not by itself result in an institution being an institution that
is required to take attendance for Title IV, HEA program purposes because monitoring logins alone is not
monitoring academic engagement (as defined under 34 CFR 600.2). However, an institution that collects
and maintains information about students’ online activities for the purpose of tracking academic
engagement is considered to be an institution that is required to take attendance for programs involving
such tracking if that tracking:
1. Involves monitoring student attendance in a synchronous class, lecture, recitation, or field or laboratory
activity, physically or online via a distance education platform, where there is an opportunity for
interaction between the instructor and students; or
2. Is used to administratively withdraw students or to enforce an institutional attendance policy.
If an institution is not required to take attendance, the withdrawal date is (1) the date, as determined by the
institution, that the student began the withdrawal process prescribed by the institution; (2) the date, as
determined by the institution, that the student otherwise provided official notification to the institution, in
writing or orally, of his or her intent to withdraw; (3) if the student ceases attendance without providing
official notification to the institution of his or her withdrawal, the midpoint of the payment period or, if
applicable, the period of enrollment; (4) if the institution determines that a student did not begin the
withdrawal process or otherwise notify the institution of the intent to withdraw due to illness, accident,
grievous personal loss or other circumstances beyond the student’s control, the date the institution
determines is related to that circumstance; (5) if a student does not return from an approved leave of
absence, the date that the institution determines the student began the leave of absence; or (6) if the
student takes an unapproved leave of absence, the date that the student began the leave of absence.
Notwithstanding the above, an institution that is not required to take attendance may use as the withdrawal
date, the last date of attendance at an academically related activity as documented by the institution (34
CFR668.22(c) and (l)).
Title IV funds may be expended only towards the education of the students who can be proven to have
been in attendance at the institution. In a distance education context, documenting that a student has
logged into an online distance education platform or system is not sufficient, by itself, to demonstrate
attendance by the student. To avoid returning all funds for a student that did not begin attendance, an
institution must be able to document “attendance at any class.” To qualify as a last date of attendance for
Return of Title IV purposes, an institution must demonstrate that a student participated in class or was
otherwise engaged in an academically related activity, such as by contributing to an online discussion or
initiating contact with a faculty member to ask a course-related question.
Timing of Return of Title IV Funds
Returns of Title IV funds are required to be deposited or transferred into the SFA account or electronic fund
transfers initiated to ED as soon as possible, but no later than 45 days after the date the institution
determines that the student withdrew. Returns by check are late if the check is issued more than 45 days
after the institution determined the student withdrew or the date on the canceled check shows the check
was endorsed more than 60 days after the date the institution determined that the student withdrew (34
CFR 668.173(b)).
An institution that is not required to take attendance must determine the withdrawal date for a student who
withdraws without providing notification to the institution no later than 30 days after the end of the earlier of
the (1) payment period or period of enrollment, (2) academic year in which the student withdrew, or
(3) educational program from which the student withdrew (34 CFR 668.22(j)). The institution must also
notify the recipient of Title IV loans returned (34 CFR 685.306(a)(2)).
Identified Condition:
See schedule of findings and questioned costs
Description
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
We noted 1 of 15 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out, or never began attendance that had an incorrect calculation of
percentage of completion for Spring 2023 based on the student’s actual number of days completed
during the enrollment period. The student was enrolled in a session module course, which is a program
that does not span the entire length of the payment period or period of enrollment. For this type of
course, the student’s “actively enrolled days” should have been used in the return of Title IV funds
calculation. This error resulted in an overstatement of the institutional return by $13 and an
overstatement of the student’s return by $21. The effect of the overstatement of the student’s return did
not result in a questioned cost due to grant protection.
Los Angeles Southwest College
We noted 6 of 20 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out or never began attendance for Fall 2022 that had had an incorrect
calculation of the percentage of completion based on the student’s number of days completed during
the enrollment period.
For 3 students, these errors resulted in:
• 1 student with an understatement of institutional return of $37 and an understatement of student
return of $287.
• 1 student with an understatement of institutional return of $11 and an understatement of student
return of $197.
• 1 student with an overstatement of institutional return of $10 and overstatement of student return of
$20. The effect of the above overstatement of the student return did not result in questioned costs
due to grant protection.
For the remaining 3 students, we noted these students were enrolled in a session module course,
which is a program that does not span the entire length of the payment period or period of enrollment.
For this type of course, the student’s “actively enrolled days” should have been used in the return of
Title IV funds calculation These errors resulted in:
• 1 student with an overstatement of institutional return of $30.
• 1 student with an overstatement of institutional return of $187.
• 1 student with an overstatement of institutional return of $21 and an overstatement of student
return of $9. The effect of the overstatement of the student return did not result in questioned costs
due to grant protection.
B. Untimely Notification of Grant Overpayment to the Secretary
We noted that 1 out of 15 students selected for compliance test work at East Los Angeles College that
owed an overpayment of $187 as a result of the student’s withdrawal was referred to the Secretary of
the Department of Education beyond the 30-day timeframe from the date of the institution’s
determination that the student withdrew and owed overpayments as a result of the student’s
withdrawal. The required notification was submitted to the National Student Loan Data System
(NSLDS) 260 days late.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The District has not yet implemented a formal process in place to monitor a student’s active
participation in an online class and engagement in academic activities related to a distance education
(DE) course in order to determine the reasonableness and accuracy of the student’s withdrawal date in
the system. Currently, the withdrawal date used in the calculation of return to Title IV funds is the actual
date the student initiates the withdrawal from the course in the system.
Cause and Effect:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The Financial Aid Technician who processed the Spring 2023 return to Title IV had an oversight on that
record during his review process. He had a family emergency during that period and had to leave in the
middle of his review process. As a result, he forgot to deduct the spring break period from the total
number of days for the enrollment period. This caused the calculation to be slightly off.
Los Angeles Southwest College
The person who was assigned the role of handling the return to Title IV program received limited
training before he assumed the duties of return to Title IV calculations while also having to maintain his
full load as a Financial Aid Technician. In addition to the limited training, there were changes as to how
the program was administered and modules were calculated. This is an arduous task for a seasoned
professional and a very challenging task for a novice at best. As with all newly assigned duties, given
more time he would have become an expert in handling this program with minimal to zero errors.
B. Untimely Notification of Grant Overpayment to the Secretary
Every two weeks a new batch of return to Title IV report is released to be processed. The urgency for
each report to be completed within a certain time frame created confusion for the NSLDS reporting due
date. The same Financial Aid Technician was in charge of completing each step of the process. East
Los Angeles College has the largest return to Title IV population. The demand to meet the deadline
process caused an oversight for the NSLDS report.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The calculation of return to Title IV funds is a complex process. The District has invested significant
resources to improve the accuracy of the process. The District is centralizing and automating the return
to Title IV process to minimize potential errors. However, there are still manual aspects to the process.
In particular, distance education courses (DE) require faculty to withdraw students from Canvas, the
online content delivery application, and Peoplesoft, the District’s student information system.
Peoplesoft is used to maintain student records and for administering aid. Incorrect information entered
into either system can lead to an incorrect return to Title IV calculation, resulting in institutional liability
and/or disciplinary action taken by the U.S. Department of Education.
Questioned Costs:
A. Incorrect Calculation of Return to Title IV Funds
See schedule of findings and questioned costs
The District has a known net understatement of the amount due from the student of $434 and a known
net overstatement of the amount due from the District of $213. The Projected total net understatement
of amounts due from both the student and District is $4,006 as follows:
See schedule of findings and questioned costs.
This is computed by dividing the errors found in samples per term (Summer term – net understatement
$0 and Fall/Spring terms – net understatement $221 over the total Pell awards disbursed in the sample
size per term (Summer term – $5,000 and Fall/Spring terms – $176,293) multiplied by the total Pell
awards disbursed for the identified colleges per term (Summer term – $67,595 and Fall/Spring terms –
$3,195,662). The computation is made on a per-term basis on a campus level and not on a
district-wide level.
B. Untimely Notification of Grant Overpayment to the Secretary
None.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
None.
Recommendation:
We recommend that the District evaluate and improve its existing process and control procedures related
to the return of Title IV funds, including notification and return due date requirements. This will help ensure
1) that the returns of Title IV funds are accurately calculated and 2) compliance with the notification and
return due date requirements, in accordance with the Uniform Guidance and the Code of Federal
Regulation.
We recommend that the District implement additional controls at the course instructor level to effectively
monitor student participation and engagement in academic activities related to DE courses in order for the
instructor to determine the reasonableness and accuracy of a student’s withdrawal date listed in the
system. This will help ensure that the withdrawal date used in the calculation of the return of Title IV funds
is accurate.
Views of Responsible Officials and Planned Corrective Actions:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The corrective action plan that will be put in place is to develop a chart with a predetermined number of
days based on the enrollment period. This will avoid the manual counting of the number of days for
each student. We also trained an additional staff member to help with the workload. This will ensure
that errors will be caught before the completion of the review process. Implementation will begin in
Spring 2024. Staff is currently being trained.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Spring 2024
Los Angeles Southwest College
The corrective action that we are implementing to remediate this finding is to move the campus return
to Title IV processing to the “R2T4 Unit” at the District Office.
Personnel Responsible for Implementation: Muniece R. Bruton
Position of Responsible Personnel: Financial Aid Manager
Expected Date of Implementation: December 1, 2023
B. Untimely Notification of Grant Overpayment to Students and Secretary
East Los Angeles College
The Corrective Action plan is being implemented by providing an additional staff member to assist with
the return to Title IV process along with helping with the validation to ensure calculation, notification,
and reporting to NSLDS will be completed on a timely basis. A reminder is set in the Financial Aid
Technician Outlook calendar to help remind them to help meet the deadline of the reporting
requirement.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Fall 2023
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
In the fall 2022 term, the District implemented training for all Distance Education (DE) faculty members
to reduce the risk of data entry errors. DE faculty receive follow-up notifications at the beginning of
every term). In addition, the District attempted to conduct random sampling to ensure the accuracy of
the data entry. However, the District did not have the authorization or resources to perform sampling
during the audit period. As a result, the corrective action plan (CAP) was only partially implemented
during fiscal year 2023. In fall 2023, the District secured the human resources and required
authorizations to conduct random sampling of the faculty data entry. The District’s Internal Audit
Department (IAD) is performing random sampling of all campuses. As of fall 2023, all corrective actions
have been fully implemented.
Personnel Responsible for Implementation: Steve Giorgi, Betsy Regalado, Keyna Crenshaw
Position of Responsible Personnel: Financial Aid Manager, Associate Vice Chancellor of Educational
Programs and Institutional Effectiveness, LACCD Supervising Auditor)
Expected Date of Implementation: Fall 2023
Finding FA 2023-002: Special Tests and Provision: Return of Title IV Funds: Incorrect Calculation of Return of Title IV Funds, Untimely Notification of Grant Overpayment to Students and Secretary, Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal Date (Repeat Finding)
Federal Program Information
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster;
Federal Pell Grant Program
Federal Direct Student Loans
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P007A210456, P063P215260, P268K225260
P007A210676, P063P215262, P268K225262, 21-C01-740
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles City College (Repeat Finding)
East Los Angeles College (Repeat Finding)
Los Angeles Harbor College (Repeat Finding)
Los Angeles Mission College (Repeat Finding)
Los Angeles Pierce College (Repeat Finding)
Los Angeles Southwest College (Repeat Finding)
Los Angeles Trade Technical College (Repeat Finding)
Los Angeles Valley College (Repeat Finding)
West Los Angeles College (Repeat Finding)
Compliance Requirement: Special Tests and Provisions – Return of Title IV Funds
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations 668.22 (a)(1) through (a)(5):
When a recipient of Title IV grant or loan assistance withdraws from an institution during a payment period or period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV aid earned by the student as of the student’s withdrawal date. If the total amount of Title IV assistance earned by the student is less than the amount that was disbursed to the student or on his or her behalf as of the date of the institution’s determination that the student withdrew, the difference must be returned to the Title IV programs as outlined in this section and no additional disbursements may be made to the student for the payment period or period of enrollment. If the amount the student earned is greater than the amount disbursed, the difference between the amounts must be treated as a post-withdrawal disbursement.
Per the Uniform Guidance Compliance Supplement:
Withdrawal Date:
If an institution is required to take attendance, the withdrawal date is the last date of academic attendance, as determined by the institution from its attendance records. An institution is required to take attendance if:
a. The institution is required to take attendance for some or all of its students by an entity outside of the
institution (such as the institution’s accrediting agency or state agency);
b. The institution itself has a requirement that its instructors take attendance; or
c. The institution or an outside entity has a requirement that can only be met by taking attendance or a
comparable process, including, but not limited to, requiring that students in a program demonstrate
attendance in the classes of that program or a portion of that program (34 CFR 668.22(b)(3)).
Note: As provided in the Department’s Program Integrity Q&As for Return of Title IV Funds, the monitoring
of whether online students log into classes does not by itself result in an institution being an institution that
is required to take attendance for Title IV, HEA program purposes because monitoring logins alone is not
monitoring academic engagement (as defined under 34 CFR 600.2). However, an institution that collects
and maintains information about students’ online activities for the purpose of tracking academic
engagement is considered to be an institution that is required to take attendance for programs involving
such tracking if that tracking:
1. Involves monitoring student attendance in a synchronous class, lecture, recitation, or field or laboratory
activity, physically or online via a distance education platform, where there is an opportunity for
interaction between the instructor and students; or
2. Is used to administratively withdraw students or to enforce an institutional attendance policy.
If an institution is not required to take attendance, the withdrawal date is (1) the date, as determined by the
institution, that the student began the withdrawal process prescribed by the institution; (2) the date, as
determined by the institution, that the student otherwise provided official notification to the institution, in
writing or orally, of his or her intent to withdraw; (3) if the student ceases attendance without providing
official notification to the institution of his or her withdrawal, the midpoint of the payment period or, if
applicable, the period of enrollment; (4) if the institution determines that a student did not begin the
withdrawal process or otherwise notify the institution of the intent to withdraw due to illness, accident,
grievous personal loss or other circumstances beyond the student’s control, the date the institution
determines is related to that circumstance; (5) if a student does not return from an approved leave of
absence, the date that the institution determines the student began the leave of absence; or (6) if the
student takes an unapproved leave of absence, the date that the student began the leave of absence.
Notwithstanding the above, an institution that is not required to take attendance may use as the withdrawal
date, the last date of attendance at an academically related activity as documented by the institution (34
CFR668.22(c) and (l)).
Title IV funds may be expended only towards the education of the students who can be proven to have
been in attendance at the institution. In a distance education context, documenting that a student has
logged into an online distance education platform or system is not sufficient, by itself, to demonstrate
attendance by the student. To avoid returning all funds for a student that did not begin attendance, an
institution must be able to document “attendance at any class.” To qualify as a last date of attendance for
Return of Title IV purposes, an institution must demonstrate that a student participated in class or was
otherwise engaged in an academically related activity, such as by contributing to an online discussion or
initiating contact with a faculty member to ask a course-related question.
Timing of Return of Title IV Funds
Returns of Title IV funds are required to be deposited or transferred into the SFA account or electronic fund
transfers initiated to ED as soon as possible, but no later than 45 days after the date the institution
determines that the student withdrew. Returns by check are late if the check is issued more than 45 days
after the institution determined the student withdrew or the date on the canceled check shows the check
was endorsed more than 60 days after the date the institution determined that the student withdrew (34
CFR 668.173(b)).
An institution that is not required to take attendance must determine the withdrawal date for a student who
withdraws without providing notification to the institution no later than 30 days after the end of the earlier of
the (1) payment period or period of enrollment, (2) academic year in which the student withdrew, or
(3) educational program from which the student withdrew (34 CFR 668.22(j)). The institution must also
notify the recipient of Title IV loans returned (34 CFR 685.306(a)(2)).
Identified Condition:
See schedule of findings and questioned costs
Description
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
We noted 1 of 15 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out, or never began attendance that had an incorrect calculation of
percentage of completion for Spring 2023 based on the student’s actual number of days completed
during the enrollment period. The student was enrolled in a session module course, which is a program
that does not span the entire length of the payment period or period of enrollment. For this type of
course, the student’s “actively enrolled days” should have been used in the return of Title IV funds
calculation. This error resulted in an overstatement of the institutional return by $13 and an
overstatement of the student’s return by $21. The effect of the overstatement of the student’s return did
not result in a questioned cost due to grant protection.
Los Angeles Southwest College
We noted 6 of 20 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out or never began attendance for Fall 2022 that had had an incorrect
calculation of the percentage of completion based on the student’s number of days completed during
the enrollment period.
For 3 students, these errors resulted in:
• 1 student with an understatement of institutional return of $37 and an understatement of student
return of $287.
• 1 student with an understatement of institutional return of $11 and an understatement of student
return of $197.
• 1 student with an overstatement of institutional return of $10 and overstatement of student return of
$20. The effect of the above overstatement of the student return did not result in questioned costs
due to grant protection.
For the remaining 3 students, we noted these students were enrolled in a session module course,
which is a program that does not span the entire length of the payment period or period of enrollment.
For this type of course, the student’s “actively enrolled days” should have been used in the return of
Title IV funds calculation These errors resulted in:
• 1 student with an overstatement of institutional return of $30.
• 1 student with an overstatement of institutional return of $187.
• 1 student with an overstatement of institutional return of $21 and an overstatement of student
return of $9. The effect of the overstatement of the student return did not result in questioned costs
due to grant protection.
B. Untimely Notification of Grant Overpayment to the Secretary
We noted that 1 out of 15 students selected for compliance test work at East Los Angeles College that
owed an overpayment of $187 as a result of the student’s withdrawal was referred to the Secretary of
the Department of Education beyond the 30-day timeframe from the date of the institution’s
determination that the student withdrew and owed overpayments as a result of the student’s
withdrawal. The required notification was submitted to the National Student Loan Data System
(NSLDS) 260 days late.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The District has not yet implemented a formal process in place to monitor a student’s active
participation in an online class and engagement in academic activities related to a distance education
(DE) course in order to determine the reasonableness and accuracy of the student’s withdrawal date in
the system. Currently, the withdrawal date used in the calculation of return to Title IV funds is the actual
date the student initiates the withdrawal from the course in the system.
Cause and Effect:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The Financial Aid Technician who processed the Spring 2023 return to Title IV had an oversight on that
record during his review process. He had a family emergency during that period and had to leave in the
middle of his review process. As a result, he forgot to deduct the spring break period from the total
number of days for the enrollment period. This caused the calculation to be slightly off.
Los Angeles Southwest College
The person who was assigned the role of handling the return to Title IV program received limited
training before he assumed the duties of return to Title IV calculations while also having to maintain his
full load as a Financial Aid Technician. In addition to the limited training, there were changes as to how
the program was administered and modules were calculated. This is an arduous task for a seasoned
professional and a very challenging task for a novice at best. As with all newly assigned duties, given
more time he would have become an expert in handling this program with minimal to zero errors.
B. Untimely Notification of Grant Overpayment to the Secretary
Every two weeks a new batch of return to Title IV report is released to be processed. The urgency for
each report to be completed within a certain time frame created confusion for the NSLDS reporting due
date. The same Financial Aid Technician was in charge of completing each step of the process. East
Los Angeles College has the largest return to Title IV population. The demand to meet the deadline
process caused an oversight for the NSLDS report.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The calculation of return to Title IV funds is a complex process. The District has invested significant
resources to improve the accuracy of the process. The District is centralizing and automating the return
to Title IV process to minimize potential errors. However, there are still manual aspects to the process.
In particular, distance education courses (DE) require faculty to withdraw students from Canvas, the
online content delivery application, and Peoplesoft, the District’s student information system.
Peoplesoft is used to maintain student records and for administering aid. Incorrect information entered
into either system can lead to an incorrect return to Title IV calculation, resulting in institutional liability
and/or disciplinary action taken by the U.S. Department of Education.
Questioned Costs:
A. Incorrect Calculation of Return to Title IV Funds
See schedule of findings and questioned costs
The District has a known net understatement of the amount due from the student of $434 and a known
net overstatement of the amount due from the District of $213. The Projected total net understatement
of amounts due from both the student and District is $4,006 as follows:
See schedule of findings and questioned costs.
This is computed by dividing the errors found in samples per term (Summer term – net understatement
$0 and Fall/Spring terms – net understatement $221 over the total Pell awards disbursed in the sample
size per term (Summer term – $5,000 and Fall/Spring terms – $176,293) multiplied by the total Pell
awards disbursed for the identified colleges per term (Summer term – $67,595 and Fall/Spring terms –
$3,195,662). The computation is made on a per-term basis on a campus level and not on a
district-wide level.
B. Untimely Notification of Grant Overpayment to the Secretary
None.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
None.
Recommendation:
We recommend that the District evaluate and improve its existing process and control procedures related
to the return of Title IV funds, including notification and return due date requirements. This will help ensure
1) that the returns of Title IV funds are accurately calculated and 2) compliance with the notification and
return due date requirements, in accordance with the Uniform Guidance and the Code of Federal
Regulation.
We recommend that the District implement additional controls at the course instructor level to effectively
monitor student participation and engagement in academic activities related to DE courses in order for the
instructor to determine the reasonableness and accuracy of a student’s withdrawal date listed in the
system. This will help ensure that the withdrawal date used in the calculation of the return of Title IV funds
is accurate.
Views of Responsible Officials and Planned Corrective Actions:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The corrective action plan that will be put in place is to develop a chart with a predetermined number of
days based on the enrollment period. This will avoid the manual counting of the number of days for
each student. We also trained an additional staff member to help with the workload. This will ensure
that errors will be caught before the completion of the review process. Implementation will begin in
Spring 2024. Staff is currently being trained.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Spring 2024
Los Angeles Southwest College
The corrective action that we are implementing to remediate this finding is to move the campus return
to Title IV processing to the “R2T4 Unit” at the District Office.
Personnel Responsible for Implementation: Muniece R. Bruton
Position of Responsible Personnel: Financial Aid Manager
Expected Date of Implementation: December 1, 2023
B. Untimely Notification of Grant Overpayment to Students and Secretary
East Los Angeles College
The Corrective Action plan is being implemented by providing an additional staff member to assist with
the return to Title IV process along with helping with the validation to ensure calculation, notification,
and reporting to NSLDS will be completed on a timely basis. A reminder is set in the Financial Aid
Technician Outlook calendar to help remind them to help meet the deadline of the reporting
requirement.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Fall 2023
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
In the fall 2022 term, the District implemented training for all Distance Education (DE) faculty members
to reduce the risk of data entry errors. DE faculty receive follow-up notifications at the beginning of
every term). In addition, the District attempted to conduct random sampling to ensure the accuracy of
the data entry. However, the District did not have the authorization or resources to perform sampling
during the audit period. As a result, the corrective action plan (CAP) was only partially implemented
during fiscal year 2023. In fall 2023, the District secured the human resources and required
authorizations to conduct random sampling of the faculty data entry. The District’s Internal Audit
Department (IAD) is performing random sampling of all campuses. As of fall 2023, all corrective actions
have been fully implemented.
Personnel Responsible for Implementation: Steve Giorgi, Betsy Regalado, Keyna Crenshaw
Position of Responsible Personnel: Financial Aid Manager, Associate Vice Chancellor of Educational
Programs and Institutional Effectiveness, LACCD Supervising Auditor)
Expected Date of Implementation: Fall 2023
Finding FA 2023‑03: Special Tests and Provision: Gramm Leach Bliley Act ‑ Student Information
Security – Formally Establish and Document Risk Acceptance Process, Perform Regular Backup
Restoration Tests, Perform Timely Access Revocation and Regular Access Reviews, Perform
Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards, Maintain and Review Logs
of Users' Activity for both SAP and PS SIS, Implement Data-at-Rest Encryption for Devices Storing
Customer Data, Enforce Strict Compliance on Controls over SAP Direct to Production Changes (Repeat
Finding)
Federal Program Information
Assistance Listing Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: Various
Federal Award Year: July 1, 2022, to June 30, 2023
Compliance Requirement: Special Tests and Provisions – Gramm Leach Bliley Act –
Student Information Security
Criteria or Specific Requirement:
The Gramm-Leach-Bliley Act (Pub. L. No. 106-102) (GLBA) requires financial institutions to explain their
information-sharing practices to their customers and to safeguard sensitive data (16 CFR 314). The Federal
Trade Commission considers Title IV-eligible institutions that participate in Title IV Educational Assistance
Programs as “financial institutions” and subject to the Gramm-Leach-Bliley Act because they appear to be
significantly engaged in wiring funds to consumers (16 CFR 313.3(k)(2)(vi)). Institutions agree to comply with
GLBA in their Program Participation Agreement with ED. Institutions must protect student financial aid
information, with particular attention to information provided to institutions by ED or otherwise obtained in
support of the administration of the Federal student financial aid programs (16 CFR 314.3; HEA 483(a)(3)(E)
and HEA 485B(d)(2)).
On December 9, 2021, the FTC issued final regulations for 16 CFR Part 314 to implement the GLBA
information safeguarding standards that institutions must implement. These regulations significantly modified
the requirements that institutions must meet under GLBA. The regulations established minimum standards that
institutions must meet. The FTC stated that it “believes many of the requirements outlined in the Final Rule are
so fundamental to any information security program that the information security programs of many financial
institutions will already include them if those programs are in compliance with the current Safeguards Rule.”
Institutions are required to be in compliance with the revised requirements no later than June 9, 2023.
Institutions are required to develop, implement, and maintain a comprehensive information security program
that is written in one or more readily accessible parts. The regulations require the written information security
program to include nine elements for institutions with 5,000 or more customers, (16 CFR 314.3(a)). The written
information security program for institutions with fewer than 5,000 customers must address seven elements
(16 CFR 314.3(a) and 16 CFR 314.6). In the preamble to the Final Rule, the FTC stated, “Proposed § 314.4
[Elements] altered the current Rule’s required elements of an information security program and added several
new elements.” The FTC also stated, “[t]he elements for the information security programs set forth in this
section [16 CFR 314.4} are high-level principles that set forth basic issues the programs must address, and do
not prescribe how they will be addressed.” The elements that an institution must address in its written
information security program are at 16 CFR 314.4. At a minimum, an institution’s written information security
program:
• Designates a qualified individual responsible for overseeing and implementing the institution’s information
security program and enforcing the information security program in compliance (16 CFR 314.4(a)).
• Provides for the information security program to be based on a risk assessment that identifies reasonably
foreseeable internal and external risks to the security, confidentiality, and integrity of customer information
(as the term customer information applies to the institution) that could result in the unauthorized disclosure,
misuse, alteration, destruction, or other compromise of such information, and assesses the sufficiency of
any safeguards in place to control these risks (16 CFR 314.4(b)).
• Provides for the design and implementation of safeguards to control the risks the institution identifies
through its risk assessment (16 CFR 314.4(c)). At a minimum, the institution’s written information security
program must address the implementation of the minimum safeguards identified in 16 CFR 314.4(c)(1)
through (8). The eight minimum safeguards that the written information security program must address are
summarized as follows:
– Implement and periodically review access controls.
– Conduct a periodic inventory of data, noting where it’s collected, stored, or transmitted.
– Encrypt customer information on the institution’s system and when it’s in transit.
– Assess apps developed by the institution.
– Implement multi-factor authentication for anyone accessing customer information on the institution’s
system.
– Dispose of customer information securely
– Anticipate and evaluate changes to the information system or network.
– Maintain a log of authorized users’ activity and keep an eye out for unauthorized access.
• Provides for the institution to regularly test or otherwise monitor the effectiveness of the safeguards it has
implemented (16 CFR 314.4(d)).
• Provides for the implementation of policies and procedures to ensure that personnel are able to enact the
information security program (16 CFR 314.4(e)(1)).
• Addresses how the institution will oversee its information system service providers (16 CFR 314.4(f)).
• Provides for the evaluation and adjustment of its information security program in light of the results of the
required testing and monitoring; any material changes to its operations or business arrangements; the
results of the required risk assessments; or any other circumstances that it knows or has reason to know
may have a material impact the institution’s information security program (16 CFR 314.4(g)).
The first element that an institution’s written information security program must address is the designation of an
individual with responsibility for implementing and enforcing an institution’s written information security
program. The regulations refer to this individual as the Qualified Individual. If an institution has not designated a
Qualified Individual, it is not in compliance with the GLBA requirements. The Qualified Individual has ultimate
responsibility and accountability for implementing and enforcing the institution’s information security program
(16 CFR 314.4(a)). The regulations do provide for an institution to use a service provider as a Qualified
Individual. In cases where an institution uses a service provider as the Qualified Individual, the institution must:
• Retain responsibility for compliance with GLBA.
• Designate a senior member of its personnel responsible for direction and oversight of the Qualified
Individual; and
• Require the service provider or affiliate to maintain an information security program that protects the
institution in accordance with the requirements of the regulations at 16 CFR Part 314(a)(1) through (3).
Because the written information security program may be in one or more readily accessible parts and the
Qualified Individual is responsible for implementing and monitoring the information security program, ED
expects that the Qualified Individual would be able to provide the written information security program that
addresses the elements required for the written information security program to the auditors.
Identified Conditions:
A. Formally Establish and Document Risk Acceptance Process (repeat finding)
The District’s Written Information Security Program does not explicitly define the criteria for accepting
potential risks. A related process document, which was committed to be completed in the prior year, is
still in development as of September 2023.
B. Perform Regular Backup Restoration Tests (repeat finding)
The District performed a comprehensive Tabletop Disaster Recovery (DR) exercise for both SAP and
SIS during the audit period. As part of the exercise, the DR Team simulated a scenario, fully supported
with recovery considerations, steps, results, recovery challenges, and key recommendations to
improve moving forward – the exercise was also reviewed and approved by the Vice Chancellor and
Chief Information Officer. However, a key activity which is the actual backup restoration testing was not
performed as part of the tabletop exercise or at any point during the audit period.
C. Perform Timely Access Revocation and Regular Access Reviews (repeat finding)
Based on a test of controls to verify that access of terminated employees is timely removed in Active
Directory (AD), SAP, and PeopleSoft Student Information System (PS SIS), we noted that out of the
terminated employees subject to testing:
1. 13 users were active in AD, three (3) of whom have logged in after their termination.
2. 76 users were still active in SAP, 19 of whom have logged in after their termination.
3. 81 users were still active in PS SIS, 42 of whom have logged in after their termination.
Moreover, while a privileged user access review is performed for AD, there is no review performed to
check the validity of regular users in AD and the validity and appropriateness of users in SAP and SIS.
Employee functions and/or responsibilities may change over time; thus, previously provisioned access
may no longer be valid. Furthermore, a new compliance requirement, which requires institutions to
perform periodic access reviews for physical access in the data centers where the critical student
information systems are hosted [16 CFR 314.4(c)(1)], was also not performed during the audit period.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
16 CFR 314.4(f), a new compliance requirement, requires institutions to periodically assess service
providers based on the risk they present and the continued adequacy of their safeguards. However, we
noted that contracts for the following service providers were renewed by the District without sufficient
information security review from 2020 to 2022 and the period thereafter.
a. XAP – used for requesting, sending, and receiving electronic transcripts.
b. Bank Mobile – used for student refund processing.
c. Campus Logic – used for student online verification processing.
These contracts were instituted before the adoption of the District’s Information Security Program and
thus, were adopted and renewed thereafter without an Information Security Review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
A new compliance requirement, which requires institutions to monitor and log the activity of authorized
users and detect unauthorized access or use of, or tampering with, customer information by such users
[16 CFR 314.4(c)(8)], is not currently implemented by the District.
F. Implement Data-at-Rest Encryption for Devices Storing Customer Data
A new compliance requirement, which requires institutions to protect by encryption all students’ data
held at rest [16 CFR 314.4(c)(3)], is not currently implemented by the District (e.g., SAP and SIS
servers).
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
SAP production client was opened on 10/03/2022 and 11/09/2022 without sufficient documentation that
it was authorized and approved. Opening the production client, if not controlled, carries a significant
risk since changes can be made directly to the production environment without transport requests,
thereby circumventing any established change management controls.
Cause and Effect:
A. Formally Establish and Document Risk Acceptance Process
The absence of a formal risk acceptance process can lead to inappropriate risk treatment and a lack of
oversight in managing risks, resulting in inconsistent approaches that may not align with the District’s
overall risk tolerance.
B. Perform Regular Backup Restoration Tests
Lack of proper restoration testing may hinder the District from recovering its data completely and
accurately.
C. Perform Timely Access Revocation and Regular Access Reviews
Failure to deactivate or remove accounts of terminated employees timely may result in unauthorized
access to the District’s resources and sensitive information. Furthermore, the absence of user access
reviews increases the risk of inappropriate users or access remaining undetected over time which may
be used to process unauthorized transactions or view confidential information.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Non-performance of review may result in the District relying on IT service providers with ineffective
information security controls making them susceptible to data breaches. A breach in a third-party
system may expose the District to financial, operational, legal, and reputational damages.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Without adequate logging and monitoring of users’ activity, security incidents, including suspicious and
unauthorized activities may not be detected and responded to in a timely manner.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
Data that is held to devices without encryption is vulnerable to unauthorized access, especially if
physical and logical controls are compromised. In the event of a breach, sensitive data, such as
students’ information may be exposed.
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
Insufficient controls over client opening may result in the implementation of unauthorized changes
directly into the production environment. This increases the risk that changes to the system may not
follow the District’s change management process (documentation, authorization, testing, and approval)
prior to the implementation of the change to the production environment.
Recommendation:
A. Formally Establish and Document Risk Acceptance Process
We recommend that the District establish and implement the District’s Risk Acceptance process that
details the criteria and conditions for accepting potential risks. We also recommend that the District
ensure this is aligned with the District’s objectives, overall risk tolerance, and current practices in
identifying, assessing, and mitigating risks.
B. Perform Regular Backup Restoration Tests
Together with the DR tabletop exercises, we recommend that backup restoration tests should be
performed at least once per year. Detailed testing schedules should be drafted based on DRP
specifications and required restoration of the critical systems. Documentation of such tests should be
maintained for full management awareness and approval.
C. Perform Timely Access Revocation and Regular Access Reviews
1. We recommend that the District revoke the access of terminated employees and review the
activities performed by those accounts after their termination date to ensure the validity and
appropriateness of activities/transactions performed by these accounts, if any.
2. Concurrently, the District should improve the account termination procedures to ensure that access
to terminated employees is timely revoked.
3. We also recommend that regular access reviews for AD, SAP, PS SIS, and the physical accesses
to data centers where these systems are hosted, are performed, and documented (for both regular
and privileged users) to ensure that only valid and appropriate users remain in the system and
have access to relevant information. The review may include, but is not limited to the following:
a. Document management control over the completeness and accuracy of the reports used in the
review.
b. Define designated functions/roles to perform the review.
c. Monitor timeliness of the performance of the review and execution of corrective actions as a
result of the review
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Revisit the District’s current practices for evaluating third-party provider’s information security to ensure
that all third-party are reviewed and evaluated regularly. At the minimum, the process should involve
continuous monitoring, contractual provisions summarizing security requirements, and a strategy for
addressing security vulnerabilities identified during reviews.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Formally establish a process for logging and monitoring users’ activity which includes collection,
retention, regular review, and documentation of user activity logs. The review should be aligned with
the District’s access management practices to ensure that only authorized users are allowed to access
information that is aligned with their functions and responsibilities.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
The District should establish and implement data-at-rest encryption for endpoint devices to ensure that
data is inaccessible to unauthorized users in cases when logical and physical measures are
compromised.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
Ensure that production client openings, particularly those related to direct production changes, strictly
adhere to the District’s Change Management Procedure. These client openings and the related
changes should be properly documented, authorized, and validated prior to implementation.
Views of Responsible Officials and Planned Corrective Actions:
A. Formally Establish and Document Risk Acceptance Process
Requirements for risk assessments and risk acceptance processes to comply with GLBA were
expanded in June of 2023. The District engaged a third-party consultant to conduct a GLBA-compliant
risk assessment and advise on recommended changes to the District’s Written Information Security
Plan (WISP) to comply with the new requirements. The findings and recommendations were presented
to the District in October of 2023 and are currently under review. The District will initiate a project to
formalize risk acceptance by December 31st, 2023, and implement the risk acceptance process by
June 30, 2024.
B. Perform Regular Backup Restoration Tests
The District has engaged with a third party to build a testing environment to physically test restoration
of the SIS environment. Initiation of the project is pending processing of the Purchase Order. The
District anticipates completion of the restoration by December 31st, 2023.
With respect to SAP, the District is currently engaged in an effort to migrate the SAP database to
HANA. When this project is complete, the same test environment will be capable of performing physical
recovery tests for SAP. The HANA migration is estimated to be completed on February 28th, 2024.
C. Perform Timely Access Revocation and Regular Access Reviews
With respect to the District’s Single Sign-On (ADFS or SSO) environments, the District engaged
professional services consultants to address this item by automating the disablement of employee
accounts based upon the termination of assignment. The work is currently underway. The target
completion of the process is December 15, 2023. With respect to the SAP environment, the District has
engaged with a vendor to implement Multifactor Authentication (MFA) in the SAP environment. Work
will begin upon processing the Purchase Order. Once both efforts are complete, disabling employee
accounts in SSO, SIS and SAP will be performed automatically based upon the termination of
assignments according to criteria established by Human Resources.
With respect to access reviews of SIS and SAP, the District is currently researching the export of user
audit logs to the District’s analysis environment to enable regular reviews. The new target to perform
regular access reviews for SAP and SIS is the end of Q1 2024.
With respect to physical access reviews, the District Information Security Team will perform an annual
review of relevant operational protocols for data center access with the appropriate internal teams and
perform an audit of data access at a minimum of once per year. The first annual protocol review will be
completed by December 1st, 2023. The first annual audit will commence no later than March 1st, 2024.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
To prevent recurrence, the LACCD Information Security Team will coordinate an annual review of
Administrative Protocol 3723A: Information Security Evaluation of Third-Party Providers with District
Financial Aid, Procurement and Educational Programming and Institutional Effectiveness (EPIE)
leadership teams to help assure future relevant contracts are provided to the Information Security
Team prior to renewal to allow for timely security review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
The District is currently researching the export of user audit logs to the District’s analysis environment
to enable regular reviews. The new target to perform regular access reviews for SAP and SIS is the
end of Q1 2024.
F. Implement data encryption for Devices Storing Customer Data
The District engaged a third-party consultant to perform a comprehensive review of PeopleSoft security
controls, including the implementation of encryption of financial aid data within PeopleSoft. The results
are pending. Based upon those recommendations, the District will work with encryption providers to
develop and implement field-level encryption of financial aid data in SIS as appropriate.
With respect to end-user devices storing sensitive data, the District recently adopted workstation
hardening requirements that include whole-disk encryption for desktop and laptop computers used by
personnel who routinely access sensitive information, including financial aid data. The District will
implement the standards on workstations used by employees in financial aid and institutional research
by June 30, 2024. Once this is complete, additional workstations will be encrypted in order of potential
risk.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
The requests for direct changes in SAP production will be tracked and included in our help desk
requests so that an auditable trail can be created leading to the purpose and completion of the
production changes. Additionally, direct production change requests will be reviewed and approved
following the LACCD Change Control process. Minor updates that do not fall within the change control
guidelines will require managerial approval within the help desk system.
Personnel Responsible for Implementation: Carmen V. Lidz
Position of Responsible Personnel: Vice Chancellor & Chief Information Officer
Finding FA 2023‑03: Special Tests and Provision: Gramm Leach Bliley Act ‑ Student Information
Security – Formally Establish and Document Risk Acceptance Process, Perform Regular Backup
Restoration Tests, Perform Timely Access Revocation and Regular Access Reviews, Perform
Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards, Maintain and Review Logs
of Users' Activity for both SAP and PS SIS, Implement Data-at-Rest Encryption for Devices Storing
Customer Data, Enforce Strict Compliance on Controls over SAP Direct to Production Changes (Repeat
Finding)
Federal Program Information
Assistance Listing Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: Various
Federal Award Year: July 1, 2022, to June 30, 2023
Compliance Requirement: Special Tests and Provisions – Gramm Leach Bliley Act –
Student Information Security
Criteria or Specific Requirement:
The Gramm-Leach-Bliley Act (Pub. L. No. 106-102) (GLBA) requires financial institutions to explain their
information-sharing practices to their customers and to safeguard sensitive data (16 CFR 314). The Federal
Trade Commission considers Title IV-eligible institutions that participate in Title IV Educational Assistance
Programs as “financial institutions” and subject to the Gramm-Leach-Bliley Act because they appear to be
significantly engaged in wiring funds to consumers (16 CFR 313.3(k)(2)(vi)). Institutions agree to comply with
GLBA in their Program Participation Agreement with ED. Institutions must protect student financial aid
information, with particular attention to information provided to institutions by ED or otherwise obtained in
support of the administration of the Federal student financial aid programs (16 CFR 314.3; HEA 483(a)(3)(E)
and HEA 485B(d)(2)).
On December 9, 2021, the FTC issued final regulations for 16 CFR Part 314 to implement the GLBA
information safeguarding standards that institutions must implement. These regulations significantly modified
the requirements that institutions must meet under GLBA. The regulations established minimum standards that
institutions must meet. The FTC stated that it “believes many of the requirements outlined in the Final Rule are
so fundamental to any information security program that the information security programs of many financial
institutions will already include them if those programs are in compliance with the current Safeguards Rule.”
Institutions are required to be in compliance with the revised requirements no later than June 9, 2023.
Institutions are required to develop, implement, and maintain a comprehensive information security program
that is written in one or more readily accessible parts. The regulations require the written information security
program to include nine elements for institutions with 5,000 or more customers, (16 CFR 314.3(a)). The written
information security program for institutions with fewer than 5,000 customers must address seven elements
(16 CFR 314.3(a) and 16 CFR 314.6). In the preamble to the Final Rule, the FTC stated, “Proposed § 314.4
[Elements] altered the current Rule’s required elements of an information security program and added several
new elements.” The FTC also stated, “[t]he elements for the information security programs set forth in this
section [16 CFR 314.4} are high-level principles that set forth basic issues the programs must address, and do
not prescribe how they will be addressed.” The elements that an institution must address in its written
information security program are at 16 CFR 314.4. At a minimum, an institution’s written information security
program:
• Designates a qualified individual responsible for overseeing and implementing the institution’s information
security program and enforcing the information security program in compliance (16 CFR 314.4(a)).
• Provides for the information security program to be based on a risk assessment that identifies reasonably
foreseeable internal and external risks to the security, confidentiality, and integrity of customer information
(as the term customer information applies to the institution) that could result in the unauthorized disclosure,
misuse, alteration, destruction, or other compromise of such information, and assesses the sufficiency of
any safeguards in place to control these risks (16 CFR 314.4(b)).
• Provides for the design and implementation of safeguards to control the risks the institution identifies
through its risk assessment (16 CFR 314.4(c)). At a minimum, the institution’s written information security
program must address the implementation of the minimum safeguards identified in 16 CFR 314.4(c)(1)
through (8). The eight minimum safeguards that the written information security program must address are
summarized as follows:
– Implement and periodically review access controls.
– Conduct a periodic inventory of data, noting where it’s collected, stored, or transmitted.
– Encrypt customer information on the institution’s system and when it’s in transit.
– Assess apps developed by the institution.
– Implement multi-factor authentication for anyone accessing customer information on the institution’s
system.
– Dispose of customer information securely
– Anticipate and evaluate changes to the information system or network.
– Maintain a log of authorized users’ activity and keep an eye out for unauthorized access.
• Provides for the institution to regularly test or otherwise monitor the effectiveness of the safeguards it has
implemented (16 CFR 314.4(d)).
• Provides for the implementation of policies and procedures to ensure that personnel are able to enact the
information security program (16 CFR 314.4(e)(1)).
• Addresses how the institution will oversee its information system service providers (16 CFR 314.4(f)).
• Provides for the evaluation and adjustment of its information security program in light of the results of the
required testing and monitoring; any material changes to its operations or business arrangements; the
results of the required risk assessments; or any other circumstances that it knows or has reason to know
may have a material impact the institution’s information security program (16 CFR 314.4(g)).
The first element that an institution’s written information security program must address is the designation of an
individual with responsibility for implementing and enforcing an institution’s written information security
program. The regulations refer to this individual as the Qualified Individual. If an institution has not designated a
Qualified Individual, it is not in compliance with the GLBA requirements. The Qualified Individual has ultimate
responsibility and accountability for implementing and enforcing the institution’s information security program
(16 CFR 314.4(a)). The regulations do provide for an institution to use a service provider as a Qualified
Individual. In cases where an institution uses a service provider as the Qualified Individual, the institution must:
• Retain responsibility for compliance with GLBA.
• Designate a senior member of its personnel responsible for direction and oversight of the Qualified
Individual; and
• Require the service provider or affiliate to maintain an information security program that protects the
institution in accordance with the requirements of the regulations at 16 CFR Part 314(a)(1) through (3).
Because the written information security program may be in one or more readily accessible parts and the
Qualified Individual is responsible for implementing and monitoring the information security program, ED
expects that the Qualified Individual would be able to provide the written information security program that
addresses the elements required for the written information security program to the auditors.
Identified Conditions:
A. Formally Establish and Document Risk Acceptance Process (repeat finding)
The District’s Written Information Security Program does not explicitly define the criteria for accepting
potential risks. A related process document, which was committed to be completed in the prior year, is
still in development as of September 2023.
B. Perform Regular Backup Restoration Tests (repeat finding)
The District performed a comprehensive Tabletop Disaster Recovery (DR) exercise for both SAP and
SIS during the audit period. As part of the exercise, the DR Team simulated a scenario, fully supported
with recovery considerations, steps, results, recovery challenges, and key recommendations to
improve moving forward – the exercise was also reviewed and approved by the Vice Chancellor and
Chief Information Officer. However, a key activity which is the actual backup restoration testing was not
performed as part of the tabletop exercise or at any point during the audit period.
C. Perform Timely Access Revocation and Regular Access Reviews (repeat finding)
Based on a test of controls to verify that access of terminated employees is timely removed in Active
Directory (AD), SAP, and PeopleSoft Student Information System (PS SIS), we noted that out of the
terminated employees subject to testing:
1. 13 users were active in AD, three (3) of whom have logged in after their termination.
2. 76 users were still active in SAP, 19 of whom have logged in after their termination.
3. 81 users were still active in PS SIS, 42 of whom have logged in after their termination.
Moreover, while a privileged user access review is performed for AD, there is no review performed to
check the validity of regular users in AD and the validity and appropriateness of users in SAP and SIS.
Employee functions and/or responsibilities may change over time; thus, previously provisioned access
may no longer be valid. Furthermore, a new compliance requirement, which requires institutions to
perform periodic access reviews for physical access in the data centers where the critical student
information systems are hosted [16 CFR 314.4(c)(1)], was also not performed during the audit period.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
16 CFR 314.4(f), a new compliance requirement, requires institutions to periodically assess service
providers based on the risk they present and the continued adequacy of their safeguards. However, we
noted that contracts for the following service providers were renewed by the District without sufficient
information security review from 2020 to 2022 and the period thereafter.
a. XAP – used for requesting, sending, and receiving electronic transcripts.
b. Bank Mobile – used for student refund processing.
c. Campus Logic – used for student online verification processing.
These contracts were instituted before the adoption of the District’s Information Security Program and
thus, were adopted and renewed thereafter without an Information Security Review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
A new compliance requirement, which requires institutions to monitor and log the activity of authorized
users and detect unauthorized access or use of, or tampering with, customer information by such users
[16 CFR 314.4(c)(8)], is not currently implemented by the District.
F. Implement Data-at-Rest Encryption for Devices Storing Customer Data
A new compliance requirement, which requires institutions to protect by encryption all students’ data
held at rest [16 CFR 314.4(c)(3)], is not currently implemented by the District (e.g., SAP and SIS
servers).
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
SAP production client was opened on 10/03/2022 and 11/09/2022 without sufficient documentation that
it was authorized and approved. Opening the production client, if not controlled, carries a significant
risk since changes can be made directly to the production environment without transport requests,
thereby circumventing any established change management controls.
Cause and Effect:
A. Formally Establish and Document Risk Acceptance Process
The absence of a formal risk acceptance process can lead to inappropriate risk treatment and a lack of
oversight in managing risks, resulting in inconsistent approaches that may not align with the District’s
overall risk tolerance.
B. Perform Regular Backup Restoration Tests
Lack of proper restoration testing may hinder the District from recovering its data completely and
accurately.
C. Perform Timely Access Revocation and Regular Access Reviews
Failure to deactivate or remove accounts of terminated employees timely may result in unauthorized
access to the District’s resources and sensitive information. Furthermore, the absence of user access
reviews increases the risk of inappropriate users or access remaining undetected over time which may
be used to process unauthorized transactions or view confidential information.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Non-performance of review may result in the District relying on IT service providers with ineffective
information security controls making them susceptible to data breaches. A breach in a third-party
system may expose the District to financial, operational, legal, and reputational damages.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Without adequate logging and monitoring of users’ activity, security incidents, including suspicious and
unauthorized activities may not be detected and responded to in a timely manner.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
Data that is held to devices without encryption is vulnerable to unauthorized access, especially if
physical and logical controls are compromised. In the event of a breach, sensitive data, such as
students’ information may be exposed.
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
Insufficient controls over client opening may result in the implementation of unauthorized changes
directly into the production environment. This increases the risk that changes to the system may not
follow the District’s change management process (documentation, authorization, testing, and approval)
prior to the implementation of the change to the production environment.
Recommendation:
A. Formally Establish and Document Risk Acceptance Process
We recommend that the District establish and implement the District’s Risk Acceptance process that
details the criteria and conditions for accepting potential risks. We also recommend that the District
ensure this is aligned with the District’s objectives, overall risk tolerance, and current practices in
identifying, assessing, and mitigating risks.
B. Perform Regular Backup Restoration Tests
Together with the DR tabletop exercises, we recommend that backup restoration tests should be
performed at least once per year. Detailed testing schedules should be drafted based on DRP
specifications and required restoration of the critical systems. Documentation of such tests should be
maintained for full management awareness and approval.
C. Perform Timely Access Revocation and Regular Access Reviews
1. We recommend that the District revoke the access of terminated employees and review the
activities performed by those accounts after their termination date to ensure the validity and
appropriateness of activities/transactions performed by these accounts, if any.
2. Concurrently, the District should improve the account termination procedures to ensure that access
to terminated employees is timely revoked.
3. We also recommend that regular access reviews for AD, SAP, PS SIS, and the physical accesses
to data centers where these systems are hosted, are performed, and documented (for both regular
and privileged users) to ensure that only valid and appropriate users remain in the system and
have access to relevant information. The review may include, but is not limited to the following:
a. Document management control over the completeness and accuracy of the reports used in the
review.
b. Define designated functions/roles to perform the review.
c. Monitor timeliness of the performance of the review and execution of corrective actions as a
result of the review
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Revisit the District’s current practices for evaluating third-party provider’s information security to ensure
that all third-party are reviewed and evaluated regularly. At the minimum, the process should involve
continuous monitoring, contractual provisions summarizing security requirements, and a strategy for
addressing security vulnerabilities identified during reviews.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Formally establish a process for logging and monitoring users’ activity which includes collection,
retention, regular review, and documentation of user activity logs. The review should be aligned with
the District’s access management practices to ensure that only authorized users are allowed to access
information that is aligned with their functions and responsibilities.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
The District should establish and implement data-at-rest encryption for endpoint devices to ensure that
data is inaccessible to unauthorized users in cases when logical and physical measures are
compromised.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
Ensure that production client openings, particularly those related to direct production changes, strictly
adhere to the District’s Change Management Procedure. These client openings and the related
changes should be properly documented, authorized, and validated prior to implementation.
Views of Responsible Officials and Planned Corrective Actions:
A. Formally Establish and Document Risk Acceptance Process
Requirements for risk assessments and risk acceptance processes to comply with GLBA were
expanded in June of 2023. The District engaged a third-party consultant to conduct a GLBA-compliant
risk assessment and advise on recommended changes to the District’s Written Information Security
Plan (WISP) to comply with the new requirements. The findings and recommendations were presented
to the District in October of 2023 and are currently under review. The District will initiate a project to
formalize risk acceptance by December 31st, 2023, and implement the risk acceptance process by
June 30, 2024.
B. Perform Regular Backup Restoration Tests
The District has engaged with a third party to build a testing environment to physically test restoration
of the SIS environment. Initiation of the project is pending processing of the Purchase Order. The
District anticipates completion of the restoration by December 31st, 2023.
With respect to SAP, the District is currently engaged in an effort to migrate the SAP database to
HANA. When this project is complete, the same test environment will be capable of performing physical
recovery tests for SAP. The HANA migration is estimated to be completed on February 28th, 2024.
C. Perform Timely Access Revocation and Regular Access Reviews
With respect to the District’s Single Sign-On (ADFS or SSO) environments, the District engaged
professional services consultants to address this item by automating the disablement of employee
accounts based upon the termination of assignment. The work is currently underway. The target
completion of the process is December 15, 2023. With respect to the SAP environment, the District has
engaged with a vendor to implement Multifactor Authentication (MFA) in the SAP environment. Work
will begin upon processing the Purchase Order. Once both efforts are complete, disabling employee
accounts in SSO, SIS and SAP will be performed automatically based upon the termination of
assignments according to criteria established by Human Resources.
With respect to access reviews of SIS and SAP, the District is currently researching the export of user
audit logs to the District’s analysis environment to enable regular reviews. The new target to perform
regular access reviews for SAP and SIS is the end of Q1 2024.
With respect to physical access reviews, the District Information Security Team will perform an annual
review of relevant operational protocols for data center access with the appropriate internal teams and
perform an audit of data access at a minimum of once per year. The first annual protocol review will be
completed by December 1st, 2023. The first annual audit will commence no later than March 1st, 2024.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
To prevent recurrence, the LACCD Information Security Team will coordinate an annual review of
Administrative Protocol 3723A: Information Security Evaluation of Third-Party Providers with District
Financial Aid, Procurement and Educational Programming and Institutional Effectiveness (EPIE)
leadership teams to help assure future relevant contracts are provided to the Information Security
Team prior to renewal to allow for timely security review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
The District is currently researching the export of user audit logs to the District’s analysis environment
to enable regular reviews. The new target to perform regular access reviews for SAP and SIS is the
end of Q1 2024.
F. Implement data encryption for Devices Storing Customer Data
The District engaged a third-party consultant to perform a comprehensive review of PeopleSoft security
controls, including the implementation of encryption of financial aid data within PeopleSoft. The results
are pending. Based upon those recommendations, the District will work with encryption providers to
develop and implement field-level encryption of financial aid data in SIS as appropriate.
With respect to end-user devices storing sensitive data, the District recently adopted workstation
hardening requirements that include whole-disk encryption for desktop and laptop computers used by
personnel who routinely access sensitive information, including financial aid data. The District will
implement the standards on workstations used by employees in financial aid and institutional research
by June 30, 2024. Once this is complete, additional workstations will be encrypted in order of potential
risk.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
The requests for direct changes in SAP production will be tracked and included in our help desk
requests so that an auditable trail can be created leading to the purpose and completion of the
production changes. Additionally, direct production change requests will be reviewed and approved
following the LACCD Change Control process. Minor updates that do not fall within the change control
guidelines will require managerial approval within the help desk system.
Personnel Responsible for Implementation: Carmen V. Lidz
Position of Responsible Personnel: Vice Chancellor & Chief Information Officer
Finding FA 2023‑03: Special Tests and Provision: Gramm Leach Bliley Act ‑ Student Information
Security – Formally Establish and Document Risk Acceptance Process, Perform Regular Backup
Restoration Tests, Perform Timely Access Revocation and Regular Access Reviews, Perform
Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards, Maintain and Review Logs
of Users' Activity for both SAP and PS SIS, Implement Data-at-Rest Encryption for Devices Storing
Customer Data, Enforce Strict Compliance on Controls over SAP Direct to Production Changes (Repeat
Finding)
Federal Program Information
Assistance Listing Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: Various
Federal Award Year: July 1, 2022, to June 30, 2023
Compliance Requirement: Special Tests and Provisions – Gramm Leach Bliley Act –
Student Information Security
Criteria or Specific Requirement:
The Gramm-Leach-Bliley Act (Pub. L. No. 106-102) (GLBA) requires financial institutions to explain their
information-sharing practices to their customers and to safeguard sensitive data (16 CFR 314). The Federal
Trade Commission considers Title IV-eligible institutions that participate in Title IV Educational Assistance
Programs as “financial institutions” and subject to the Gramm-Leach-Bliley Act because they appear to be
significantly engaged in wiring funds to consumers (16 CFR 313.3(k)(2)(vi)). Institutions agree to comply with
GLBA in their Program Participation Agreement with ED. Institutions must protect student financial aid
information, with particular attention to information provided to institutions by ED or otherwise obtained in
support of the administration of the Federal student financial aid programs (16 CFR 314.3; HEA 483(a)(3)(E)
and HEA 485B(d)(2)).
On December 9, 2021, the FTC issued final regulations for 16 CFR Part 314 to implement the GLBA
information safeguarding standards that institutions must implement. These regulations significantly modified
the requirements that institutions must meet under GLBA. The regulations established minimum standards that
institutions must meet. The FTC stated that it “believes many of the requirements outlined in the Final Rule are
so fundamental to any information security program that the information security programs of many financial
institutions will already include them if those programs are in compliance with the current Safeguards Rule.”
Institutions are required to be in compliance with the revised requirements no later than June 9, 2023.
Institutions are required to develop, implement, and maintain a comprehensive information security program
that is written in one or more readily accessible parts. The regulations require the written information security
program to include nine elements for institutions with 5,000 or more customers, (16 CFR 314.3(a)). The written
information security program for institutions with fewer than 5,000 customers must address seven elements
(16 CFR 314.3(a) and 16 CFR 314.6). In the preamble to the Final Rule, the FTC stated, “Proposed § 314.4
[Elements] altered the current Rule’s required elements of an information security program and added several
new elements.” The FTC also stated, “[t]he elements for the information security programs set forth in this
section [16 CFR 314.4} are high-level principles that set forth basic issues the programs must address, and do
not prescribe how they will be addressed.” The elements that an institution must address in its written
information security program are at 16 CFR 314.4. At a minimum, an institution’s written information security
program:
• Designates a qualified individual responsible for overseeing and implementing the institution’s information
security program and enforcing the information security program in compliance (16 CFR 314.4(a)).
• Provides for the information security program to be based on a risk assessment that identifies reasonably
foreseeable internal and external risks to the security, confidentiality, and integrity of customer information
(as the term customer information applies to the institution) that could result in the unauthorized disclosure,
misuse, alteration, destruction, or other compromise of such information, and assesses the sufficiency of
any safeguards in place to control these risks (16 CFR 314.4(b)).
• Provides for the design and implementation of safeguards to control the risks the institution identifies
through its risk assessment (16 CFR 314.4(c)). At a minimum, the institution’s written information security
program must address the implementation of the minimum safeguards identified in 16 CFR 314.4(c)(1)
through (8). The eight minimum safeguards that the written information security program must address are
summarized as follows:
– Implement and periodically review access controls.
– Conduct a periodic inventory of data, noting where it’s collected, stored, or transmitted.
– Encrypt customer information on the institution’s system and when it’s in transit.
– Assess apps developed by the institution.
– Implement multi-factor authentication for anyone accessing customer information on the institution’s
system.
– Dispose of customer information securely
– Anticipate and evaluate changes to the information system or network.
– Maintain a log of authorized users’ activity and keep an eye out for unauthorized access.
• Provides for the institution to regularly test or otherwise monitor the effectiveness of the safeguards it has
implemented (16 CFR 314.4(d)).
• Provides for the implementation of policies and procedures to ensure that personnel are able to enact the
information security program (16 CFR 314.4(e)(1)).
• Addresses how the institution will oversee its information system service providers (16 CFR 314.4(f)).
• Provides for the evaluation and adjustment of its information security program in light of the results of the
required testing and monitoring; any material changes to its operations or business arrangements; the
results of the required risk assessments; or any other circumstances that it knows or has reason to know
may have a material impact the institution’s information security program (16 CFR 314.4(g)).
The first element that an institution’s written information security program must address is the designation of an
individual with responsibility for implementing and enforcing an institution’s written information security
program. The regulations refer to this individual as the Qualified Individual. If an institution has not designated a
Qualified Individual, it is not in compliance with the GLBA requirements. The Qualified Individual has ultimate
responsibility and accountability for implementing and enforcing the institution’s information security program
(16 CFR 314.4(a)). The regulations do provide for an institution to use a service provider as a Qualified
Individual. In cases where an institution uses a service provider as the Qualified Individual, the institution must:
• Retain responsibility for compliance with GLBA.
• Designate a senior member of its personnel responsible for direction and oversight of the Qualified
Individual; and
• Require the service provider or affiliate to maintain an information security program that protects the
institution in accordance with the requirements of the regulations at 16 CFR Part 314(a)(1) through (3).
Because the written information security program may be in one or more readily accessible parts and the
Qualified Individual is responsible for implementing and monitoring the information security program, ED
expects that the Qualified Individual would be able to provide the written information security program that
addresses the elements required for the written information security program to the auditors.
Identified Conditions:
A. Formally Establish and Document Risk Acceptance Process (repeat finding)
The District’s Written Information Security Program does not explicitly define the criteria for accepting
potential risks. A related process document, which was committed to be completed in the prior year, is
still in development as of September 2023.
B. Perform Regular Backup Restoration Tests (repeat finding)
The District performed a comprehensive Tabletop Disaster Recovery (DR) exercise for both SAP and
SIS during the audit period. As part of the exercise, the DR Team simulated a scenario, fully supported
with recovery considerations, steps, results, recovery challenges, and key recommendations to
improve moving forward – the exercise was also reviewed and approved by the Vice Chancellor and
Chief Information Officer. However, a key activity which is the actual backup restoration testing was not
performed as part of the tabletop exercise or at any point during the audit period.
C. Perform Timely Access Revocation and Regular Access Reviews (repeat finding)
Based on a test of controls to verify that access of terminated employees is timely removed in Active
Directory (AD), SAP, and PeopleSoft Student Information System (PS SIS), we noted that out of the
terminated employees subject to testing:
1. 13 users were active in AD, three (3) of whom have logged in after their termination.
2. 76 users were still active in SAP, 19 of whom have logged in after their termination.
3. 81 users were still active in PS SIS, 42 of whom have logged in after their termination.
Moreover, while a privileged user access review is performed for AD, there is no review performed to
check the validity of regular users in AD and the validity and appropriateness of users in SAP and SIS.
Employee functions and/or responsibilities may change over time; thus, previously provisioned access
may no longer be valid. Furthermore, a new compliance requirement, which requires institutions to
perform periodic access reviews for physical access in the data centers where the critical student
information systems are hosted [16 CFR 314.4(c)(1)], was also not performed during the audit period.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
16 CFR 314.4(f), a new compliance requirement, requires institutions to periodically assess service
providers based on the risk they present and the continued adequacy of their safeguards. However, we
noted that contracts for the following service providers were renewed by the District without sufficient
information security review from 2020 to 2022 and the period thereafter.
a. XAP – used for requesting, sending, and receiving electronic transcripts.
b. Bank Mobile – used for student refund processing.
c. Campus Logic – used for student online verification processing.
These contracts were instituted before the adoption of the District’s Information Security Program and
thus, were adopted and renewed thereafter without an Information Security Review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
A new compliance requirement, which requires institutions to monitor and log the activity of authorized
users and detect unauthorized access or use of, or tampering with, customer information by such users
[16 CFR 314.4(c)(8)], is not currently implemented by the District.
F. Implement Data-at-Rest Encryption for Devices Storing Customer Data
A new compliance requirement, which requires institutions to protect by encryption all students’ data
held at rest [16 CFR 314.4(c)(3)], is not currently implemented by the District (e.g., SAP and SIS
servers).
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
SAP production client was opened on 10/03/2022 and 11/09/2022 without sufficient documentation that
it was authorized and approved. Opening the production client, if not controlled, carries a significant
risk since changes can be made directly to the production environment without transport requests,
thereby circumventing any established change management controls.
Cause and Effect:
A. Formally Establish and Document Risk Acceptance Process
The absence of a formal risk acceptance process can lead to inappropriate risk treatment and a lack of
oversight in managing risks, resulting in inconsistent approaches that may not align with the District’s
overall risk tolerance.
B. Perform Regular Backup Restoration Tests
Lack of proper restoration testing may hinder the District from recovering its data completely and
accurately.
C. Perform Timely Access Revocation and Regular Access Reviews
Failure to deactivate or remove accounts of terminated employees timely may result in unauthorized
access to the District’s resources and sensitive information. Furthermore, the absence of user access
reviews increases the risk of inappropriate users or access remaining undetected over time which may
be used to process unauthorized transactions or view confidential information.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Non-performance of review may result in the District relying on IT service providers with ineffective
information security controls making them susceptible to data breaches. A breach in a third-party
system may expose the District to financial, operational, legal, and reputational damages.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Without adequate logging and monitoring of users’ activity, security incidents, including suspicious and
unauthorized activities may not be detected and responded to in a timely manner.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
Data that is held to devices without encryption is vulnerable to unauthorized access, especially if
physical and logical controls are compromised. In the event of a breach, sensitive data, such as
students’ information may be exposed.
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
Insufficient controls over client opening may result in the implementation of unauthorized changes
directly into the production environment. This increases the risk that changes to the system may not
follow the District’s change management process (documentation, authorization, testing, and approval)
prior to the implementation of the change to the production environment.
Recommendation:
A. Formally Establish and Document Risk Acceptance Process
We recommend that the District establish and implement the District’s Risk Acceptance process that
details the criteria and conditions for accepting potential risks. We also recommend that the District
ensure this is aligned with the District’s objectives, overall risk tolerance, and current practices in
identifying, assessing, and mitigating risks.
B. Perform Regular Backup Restoration Tests
Together with the DR tabletop exercises, we recommend that backup restoration tests should be
performed at least once per year. Detailed testing schedules should be drafted based on DRP
specifications and required restoration of the critical systems. Documentation of such tests should be
maintained for full management awareness and approval.
C. Perform Timely Access Revocation and Regular Access Reviews
1. We recommend that the District revoke the access of terminated employees and review the
activities performed by those accounts after their termination date to ensure the validity and
appropriateness of activities/transactions performed by these accounts, if any.
2. Concurrently, the District should improve the account termination procedures to ensure that access
to terminated employees is timely revoked.
3. We also recommend that regular access reviews for AD, SAP, PS SIS, and the physical accesses
to data centers where these systems are hosted, are performed, and documented (for both regular
and privileged users) to ensure that only valid and appropriate users remain in the system and
have access to relevant information. The review may include, but is not limited to the following:
a. Document management control over the completeness and accuracy of the reports used in the
review.
b. Define designated functions/roles to perform the review.
c. Monitor timeliness of the performance of the review and execution of corrective actions as a
result of the review
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Revisit the District’s current practices for evaluating third-party provider’s information security to ensure
that all third-party are reviewed and evaluated regularly. At the minimum, the process should involve
continuous monitoring, contractual provisions summarizing security requirements, and a strategy for
addressing security vulnerabilities identified during reviews.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Formally establish a process for logging and monitoring users’ activity which includes collection,
retention, regular review, and documentation of user activity logs. The review should be aligned with
the District’s access management practices to ensure that only authorized users are allowed to access
information that is aligned with their functions and responsibilities.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
The District should establish and implement data-at-rest encryption for endpoint devices to ensure that
data is inaccessible to unauthorized users in cases when logical and physical measures are
compromised.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
Ensure that production client openings, particularly those related to direct production changes, strictly
adhere to the District’s Change Management Procedure. These client openings and the related
changes should be properly documented, authorized, and validated prior to implementation.
Views of Responsible Officials and Planned Corrective Actions:
A. Formally Establish and Document Risk Acceptance Process
Requirements for risk assessments and risk acceptance processes to comply with GLBA were
expanded in June of 2023. The District engaged a third-party consultant to conduct a GLBA-compliant
risk assessment and advise on recommended changes to the District’s Written Information Security
Plan (WISP) to comply with the new requirements. The findings and recommendations were presented
to the District in October of 2023 and are currently under review. The District will initiate a project to
formalize risk acceptance by December 31st, 2023, and implement the risk acceptance process by
June 30, 2024.
B. Perform Regular Backup Restoration Tests
The District has engaged with a third party to build a testing environment to physically test restoration
of the SIS environment. Initiation of the project is pending processing of the Purchase Order. The
District anticipates completion of the restoration by December 31st, 2023.
With respect to SAP, the District is currently engaged in an effort to migrate the SAP database to
HANA. When this project is complete, the same test environment will be capable of performing physical
recovery tests for SAP. The HANA migration is estimated to be completed on February 28th, 2024.
C. Perform Timely Access Revocation and Regular Access Reviews
With respect to the District’s Single Sign-On (ADFS or SSO) environments, the District engaged
professional services consultants to address this item by automating the disablement of employee
accounts based upon the termination of assignment. The work is currently underway. The target
completion of the process is December 15, 2023. With respect to the SAP environment, the District has
engaged with a vendor to implement Multifactor Authentication (MFA) in the SAP environment. Work
will begin upon processing the Purchase Order. Once both efforts are complete, disabling employee
accounts in SSO, SIS and SAP will be performed automatically based upon the termination of
assignments according to criteria established by Human Resources.
With respect to access reviews of SIS and SAP, the District is currently researching the export of user
audit logs to the District’s analysis environment to enable regular reviews. The new target to perform
regular access reviews for SAP and SIS is the end of Q1 2024.
With respect to physical access reviews, the District Information Security Team will perform an annual
review of relevant operational protocols for data center access with the appropriate internal teams and
perform an audit of data access at a minimum of once per year. The first annual protocol review will be
completed by December 1st, 2023. The first annual audit will commence no later than March 1st, 2024.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
To prevent recurrence, the LACCD Information Security Team will coordinate an annual review of
Administrative Protocol 3723A: Information Security Evaluation of Third-Party Providers with District
Financial Aid, Procurement and Educational Programming and Institutional Effectiveness (EPIE)
leadership teams to help assure future relevant contracts are provided to the Information Security
Team prior to renewal to allow for timely security review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
The District is currently researching the export of user audit logs to the District’s analysis environment
to enable regular reviews. The new target to perform regular access reviews for SAP and SIS is the
end of Q1 2024.
F. Implement data encryption for Devices Storing Customer Data
The District engaged a third-party consultant to perform a comprehensive review of PeopleSoft security
controls, including the implementation of encryption of financial aid data within PeopleSoft. The results
are pending. Based upon those recommendations, the District will work with encryption providers to
develop and implement field-level encryption of financial aid data in SIS as appropriate.
With respect to end-user devices storing sensitive data, the District recently adopted workstation
hardening requirements that include whole-disk encryption for desktop and laptop computers used by
personnel who routinely access sensitive information, including financial aid data. The District will
implement the standards on workstations used by employees in financial aid and institutional research
by June 30, 2024. Once this is complete, additional workstations will be encrypted in order of potential
risk.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
The requests for direct changes in SAP production will be tracked and included in our help desk
requests so that an auditable trail can be created leading to the purpose and completion of the
production changes. Additionally, direct production change requests will be reviewed and approved
following the LACCD Change Control process. Minor updates that do not fall within the change control
guidelines will require managerial approval within the help desk system.
Personnel Responsible for Implementation: Carmen V. Lidz
Position of Responsible Personnel: Vice Chancellor & Chief Information Officer
Finding FA 2023‑03: Special Tests and Provision: Gramm Leach Bliley Act ‑ Student Information
Security – Formally Establish and Document Risk Acceptance Process, Perform Regular Backup
Restoration Tests, Perform Timely Access Revocation and Regular Access Reviews, Perform
Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards, Maintain and Review Logs
of Users' Activity for both SAP and PS SIS, Implement Data-at-Rest Encryption for Devices Storing
Customer Data, Enforce Strict Compliance on Controls over SAP Direct to Production Changes (Repeat
Finding)
Federal Program Information
Assistance Listing Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: Various
Federal Award Year: July 1, 2022, to June 30, 2023
Compliance Requirement: Special Tests and Provisions – Gramm Leach Bliley Act –
Student Information Security
Criteria or Specific Requirement:
The Gramm-Leach-Bliley Act (Pub. L. No. 106-102) (GLBA) requires financial institutions to explain their
information-sharing practices to their customers and to safeguard sensitive data (16 CFR 314). The Federal
Trade Commission considers Title IV-eligible institutions that participate in Title IV Educational Assistance
Programs as “financial institutions” and subject to the Gramm-Leach-Bliley Act because they appear to be
significantly engaged in wiring funds to consumers (16 CFR 313.3(k)(2)(vi)). Institutions agree to comply with
GLBA in their Program Participation Agreement with ED. Institutions must protect student financial aid
information, with particular attention to information provided to institutions by ED or otherwise obtained in
support of the administration of the Federal student financial aid programs (16 CFR 314.3; HEA 483(a)(3)(E)
and HEA 485B(d)(2)).
On December 9, 2021, the FTC issued final regulations for 16 CFR Part 314 to implement the GLBA
information safeguarding standards that institutions must implement. These regulations significantly modified
the requirements that institutions must meet under GLBA. The regulations established minimum standards that
institutions must meet. The FTC stated that it “believes many of the requirements outlined in the Final Rule are
so fundamental to any information security program that the information security programs of many financial
institutions will already include them if those programs are in compliance with the current Safeguards Rule.”
Institutions are required to be in compliance with the revised requirements no later than June 9, 2023.
Institutions are required to develop, implement, and maintain a comprehensive information security program
that is written in one or more readily accessible parts. The regulations require the written information security
program to include nine elements for institutions with 5,000 or more customers, (16 CFR 314.3(a)). The written
information security program for institutions with fewer than 5,000 customers must address seven elements
(16 CFR 314.3(a) and 16 CFR 314.6). In the preamble to the Final Rule, the FTC stated, “Proposed § 314.4
[Elements] altered the current Rule’s required elements of an information security program and added several
new elements.” The FTC also stated, “[t]he elements for the information security programs set forth in this
section [16 CFR 314.4} are high-level principles that set forth basic issues the programs must address, and do
not prescribe how they will be addressed.” The elements that an institution must address in its written
information security program are at 16 CFR 314.4. At a minimum, an institution’s written information security
program:
• Designates a qualified individual responsible for overseeing and implementing the institution’s information
security program and enforcing the information security program in compliance (16 CFR 314.4(a)).
• Provides for the information security program to be based on a risk assessment that identifies reasonably
foreseeable internal and external risks to the security, confidentiality, and integrity of customer information
(as the term customer information applies to the institution) that could result in the unauthorized disclosure,
misuse, alteration, destruction, or other compromise of such information, and assesses the sufficiency of
any safeguards in place to control these risks (16 CFR 314.4(b)).
• Provides for the design and implementation of safeguards to control the risks the institution identifies
through its risk assessment (16 CFR 314.4(c)). At a minimum, the institution’s written information security
program must address the implementation of the minimum safeguards identified in 16 CFR 314.4(c)(1)
through (8). The eight minimum safeguards that the written information security program must address are
summarized as follows:
– Implement and periodically review access controls.
– Conduct a periodic inventory of data, noting where it’s collected, stored, or transmitted.
– Encrypt customer information on the institution’s system and when it’s in transit.
– Assess apps developed by the institution.
– Implement multi-factor authentication for anyone accessing customer information on the institution’s
system.
– Dispose of customer information securely
– Anticipate and evaluate changes to the information system or network.
– Maintain a log of authorized users’ activity and keep an eye out for unauthorized access.
• Provides for the institution to regularly test or otherwise monitor the effectiveness of the safeguards it has
implemented (16 CFR 314.4(d)).
• Provides for the implementation of policies and procedures to ensure that personnel are able to enact the
information security program (16 CFR 314.4(e)(1)).
• Addresses how the institution will oversee its information system service providers (16 CFR 314.4(f)).
• Provides for the evaluation and adjustment of its information security program in light of the results of the
required testing and monitoring; any material changes to its operations or business arrangements; the
results of the required risk assessments; or any other circumstances that it knows or has reason to know
may have a material impact the institution’s information security program (16 CFR 314.4(g)).
The first element that an institution’s written information security program must address is the designation of an
individual with responsibility for implementing and enforcing an institution’s written information security
program. The regulations refer to this individual as the Qualified Individual. If an institution has not designated a
Qualified Individual, it is not in compliance with the GLBA requirements. The Qualified Individual has ultimate
responsibility and accountability for implementing and enforcing the institution’s information security program
(16 CFR 314.4(a)). The regulations do provide for an institution to use a service provider as a Qualified
Individual. In cases where an institution uses a service provider as the Qualified Individual, the institution must:
• Retain responsibility for compliance with GLBA.
• Designate a senior member of its personnel responsible for direction and oversight of the Qualified
Individual; and
• Require the service provider or affiliate to maintain an information security program that protects the
institution in accordance with the requirements of the regulations at 16 CFR Part 314(a)(1) through (3).
Because the written information security program may be in one or more readily accessible parts and the
Qualified Individual is responsible for implementing and monitoring the information security program, ED
expects that the Qualified Individual would be able to provide the written information security program that
addresses the elements required for the written information security program to the auditors.
Identified Conditions:
A. Formally Establish and Document Risk Acceptance Process (repeat finding)
The District’s Written Information Security Program does not explicitly define the criteria for accepting
potential risks. A related process document, which was committed to be completed in the prior year, is
still in development as of September 2023.
B. Perform Regular Backup Restoration Tests (repeat finding)
The District performed a comprehensive Tabletop Disaster Recovery (DR) exercise for both SAP and
SIS during the audit period. As part of the exercise, the DR Team simulated a scenario, fully supported
with recovery considerations, steps, results, recovery challenges, and key recommendations to
improve moving forward – the exercise was also reviewed and approved by the Vice Chancellor and
Chief Information Officer. However, a key activity which is the actual backup restoration testing was not
performed as part of the tabletop exercise or at any point during the audit period.
C. Perform Timely Access Revocation and Regular Access Reviews (repeat finding)
Based on a test of controls to verify that access of terminated employees is timely removed in Active
Directory (AD), SAP, and PeopleSoft Student Information System (PS SIS), we noted that out of the
terminated employees subject to testing:
1. 13 users were active in AD, three (3) of whom have logged in after their termination.
2. 76 users were still active in SAP, 19 of whom have logged in after their termination.
3. 81 users were still active in PS SIS, 42 of whom have logged in after their termination.
Moreover, while a privileged user access review is performed for AD, there is no review performed to
check the validity of regular users in AD and the validity and appropriateness of users in SAP and SIS.
Employee functions and/or responsibilities may change over time; thus, previously provisioned access
may no longer be valid. Furthermore, a new compliance requirement, which requires institutions to
perform periodic access reviews for physical access in the data centers where the critical student
information systems are hosted [16 CFR 314.4(c)(1)], was also not performed during the audit period.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
16 CFR 314.4(f), a new compliance requirement, requires institutions to periodically assess service
providers based on the risk they present and the continued adequacy of their safeguards. However, we
noted that contracts for the following service providers were renewed by the District without sufficient
information security review from 2020 to 2022 and the period thereafter.
a. XAP – used for requesting, sending, and receiving electronic transcripts.
b. Bank Mobile – used for student refund processing.
c. Campus Logic – used for student online verification processing.
These contracts were instituted before the adoption of the District’s Information Security Program and
thus, were adopted and renewed thereafter without an Information Security Review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
A new compliance requirement, which requires institutions to monitor and log the activity of authorized
users and detect unauthorized access or use of, or tampering with, customer information by such users
[16 CFR 314.4(c)(8)], is not currently implemented by the District.
F. Implement Data-at-Rest Encryption for Devices Storing Customer Data
A new compliance requirement, which requires institutions to protect by encryption all students’ data
held at rest [16 CFR 314.4(c)(3)], is not currently implemented by the District (e.g., SAP and SIS
servers).
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
SAP production client was opened on 10/03/2022 and 11/09/2022 without sufficient documentation that
it was authorized and approved. Opening the production client, if not controlled, carries a significant
risk since changes can be made directly to the production environment without transport requests,
thereby circumventing any established change management controls.
Cause and Effect:
A. Formally Establish and Document Risk Acceptance Process
The absence of a formal risk acceptance process can lead to inappropriate risk treatment and a lack of
oversight in managing risks, resulting in inconsistent approaches that may not align with the District’s
overall risk tolerance.
B. Perform Regular Backup Restoration Tests
Lack of proper restoration testing may hinder the District from recovering its data completely and
accurately.
C. Perform Timely Access Revocation and Regular Access Reviews
Failure to deactivate or remove accounts of terminated employees timely may result in unauthorized
access to the District’s resources and sensitive information. Furthermore, the absence of user access
reviews increases the risk of inappropriate users or access remaining undetected over time which may
be used to process unauthorized transactions or view confidential information.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Non-performance of review may result in the District relying on IT service providers with ineffective
information security controls making them susceptible to data breaches. A breach in a third-party
system may expose the District to financial, operational, legal, and reputational damages.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Without adequate logging and monitoring of users’ activity, security incidents, including suspicious and
unauthorized activities may not be detected and responded to in a timely manner.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
Data that is held to devices without encryption is vulnerable to unauthorized access, especially if
physical and logical controls are compromised. In the event of a breach, sensitive data, such as
students’ information may be exposed.
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
Insufficient controls over client opening may result in the implementation of unauthorized changes
directly into the production environment. This increases the risk that changes to the system may not
follow the District’s change management process (documentation, authorization, testing, and approval)
prior to the implementation of the change to the production environment.
Recommendation:
A. Formally Establish and Document Risk Acceptance Process
We recommend that the District establish and implement the District’s Risk Acceptance process that
details the criteria and conditions for accepting potential risks. We also recommend that the District
ensure this is aligned with the District’s objectives, overall risk tolerance, and current practices in
identifying, assessing, and mitigating risks.
B. Perform Regular Backup Restoration Tests
Together with the DR tabletop exercises, we recommend that backup restoration tests should be
performed at least once per year. Detailed testing schedules should be drafted based on DRP
specifications and required restoration of the critical systems. Documentation of such tests should be
maintained for full management awareness and approval.
C. Perform Timely Access Revocation and Regular Access Reviews
1. We recommend that the District revoke the access of terminated employees and review the
activities performed by those accounts after their termination date to ensure the validity and
appropriateness of activities/transactions performed by these accounts, if any.
2. Concurrently, the District should improve the account termination procedures to ensure that access
to terminated employees is timely revoked.
3. We also recommend that regular access reviews for AD, SAP, PS SIS, and the physical accesses
to data centers where these systems are hosted, are performed, and documented (for both regular
and privileged users) to ensure that only valid and appropriate users remain in the system and
have access to relevant information. The review may include, but is not limited to the following:
a. Document management control over the completeness and accuracy of the reports used in the
review.
b. Define designated functions/roles to perform the review.
c. Monitor timeliness of the performance of the review and execution of corrective actions as a
result of the review
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Revisit the District’s current practices for evaluating third-party provider’s information security to ensure
that all third-party are reviewed and evaluated regularly. At the minimum, the process should involve
continuous monitoring, contractual provisions summarizing security requirements, and a strategy for
addressing security vulnerabilities identified during reviews.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Formally establish a process for logging and monitoring users’ activity which includes collection,
retention, regular review, and documentation of user activity logs. The review should be aligned with
the District’s access management practices to ensure that only authorized users are allowed to access
information that is aligned with their functions and responsibilities.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
The District should establish and implement data-at-rest encryption for endpoint devices to ensure that
data is inaccessible to unauthorized users in cases when logical and physical measures are
compromised.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
Ensure that production client openings, particularly those related to direct production changes, strictly
adhere to the District’s Change Management Procedure. These client openings and the related
changes should be properly documented, authorized, and validated prior to implementation.
Views of Responsible Officials and Planned Corrective Actions:
A. Formally Establish and Document Risk Acceptance Process
Requirements for risk assessments and risk acceptance processes to comply with GLBA were
expanded in June of 2023. The District engaged a third-party consultant to conduct a GLBA-compliant
risk assessment and advise on recommended changes to the District’s Written Information Security
Plan (WISP) to comply with the new requirements. The findings and recommendations were presented
to the District in October of 2023 and are currently under review. The District will initiate a project to
formalize risk acceptance by December 31st, 2023, and implement the risk acceptance process by
June 30, 2024.
B. Perform Regular Backup Restoration Tests
The District has engaged with a third party to build a testing environment to physically test restoration
of the SIS environment. Initiation of the project is pending processing of the Purchase Order. The
District anticipates completion of the restoration by December 31st, 2023.
With respect to SAP, the District is currently engaged in an effort to migrate the SAP database to
HANA. When this project is complete, the same test environment will be capable of performing physical
recovery tests for SAP. The HANA migration is estimated to be completed on February 28th, 2024.
C. Perform Timely Access Revocation and Regular Access Reviews
With respect to the District’s Single Sign-On (ADFS or SSO) environments, the District engaged
professional services consultants to address this item by automating the disablement of employee
accounts based upon the termination of assignment. The work is currently underway. The target
completion of the process is December 15, 2023. With respect to the SAP environment, the District has
engaged with a vendor to implement Multifactor Authentication (MFA) in the SAP environment. Work
will begin upon processing the Purchase Order. Once both efforts are complete, disabling employee
accounts in SSO, SIS and SAP will be performed automatically based upon the termination of
assignments according to criteria established by Human Resources.
With respect to access reviews of SIS and SAP, the District is currently researching the export of user
audit logs to the District’s analysis environment to enable regular reviews. The new target to perform
regular access reviews for SAP and SIS is the end of Q1 2024.
With respect to physical access reviews, the District Information Security Team will perform an annual
review of relevant operational protocols for data center access with the appropriate internal teams and
perform an audit of data access at a minimum of once per year. The first annual protocol review will be
completed by December 1st, 2023. The first annual audit will commence no later than March 1st, 2024.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
To prevent recurrence, the LACCD Information Security Team will coordinate an annual review of
Administrative Protocol 3723A: Information Security Evaluation of Third-Party Providers with District
Financial Aid, Procurement and Educational Programming and Institutional Effectiveness (EPIE)
leadership teams to help assure future relevant contracts are provided to the Information Security
Team prior to renewal to allow for timely security review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
The District is currently researching the export of user audit logs to the District’s analysis environment
to enable regular reviews. The new target to perform regular access reviews for SAP and SIS is the
end of Q1 2024.
F. Implement data encryption for Devices Storing Customer Data
The District engaged a third-party consultant to perform a comprehensive review of PeopleSoft security
controls, including the implementation of encryption of financial aid data within PeopleSoft. The results
are pending. Based upon those recommendations, the District will work with encryption providers to
develop and implement field-level encryption of financial aid data in SIS as appropriate.
With respect to end-user devices storing sensitive data, the District recently adopted workstation
hardening requirements that include whole-disk encryption for desktop and laptop computers used by
personnel who routinely access sensitive information, including financial aid data. The District will
implement the standards on workstations used by employees in financial aid and institutional research
by June 30, 2024. Once this is complete, additional workstations will be encrypted in order of potential
risk.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
The requests for direct changes in SAP production will be tracked and included in our help desk
requests so that an auditable trail can be created leading to the purpose and completion of the
production changes. Additionally, direct production change requests will be reviewed and approved
following the LACCD Change Control process. Minor updates that do not fall within the change control
guidelines will require managerial approval within the help desk system.
Personnel Responsible for Implementation: Carmen V. Lidz
Position of Responsible Personnel: Vice Chancellor & Chief Information Officer
Finding FA 2023‑03: Special Tests and Provision: Gramm Leach Bliley Act ‑ Student Information
Security – Formally Establish and Document Risk Acceptance Process, Perform Regular Backup
Restoration Tests, Perform Timely Access Revocation and Regular Access Reviews, Perform
Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards, Maintain and Review Logs
of Users' Activity for both SAP and PS SIS, Implement Data-at-Rest Encryption for Devices Storing
Customer Data, Enforce Strict Compliance on Controls over SAP Direct to Production Changes (Repeat
Finding)
Federal Program Information
Assistance Listing Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: Various
Federal Award Year: July 1, 2022, to June 30, 2023
Compliance Requirement: Special Tests and Provisions – Gramm Leach Bliley Act –
Student Information Security
Criteria or Specific Requirement:
The Gramm-Leach-Bliley Act (Pub. L. No. 106-102) (GLBA) requires financial institutions to explain their
information-sharing practices to their customers and to safeguard sensitive data (16 CFR 314). The Federal
Trade Commission considers Title IV-eligible institutions that participate in Title IV Educational Assistance
Programs as “financial institutions” and subject to the Gramm-Leach-Bliley Act because they appear to be
significantly engaged in wiring funds to consumers (16 CFR 313.3(k)(2)(vi)). Institutions agree to comply with
GLBA in their Program Participation Agreement with ED. Institutions must protect student financial aid
information, with particular attention to information provided to institutions by ED or otherwise obtained in
support of the administration of the Federal student financial aid programs (16 CFR 314.3; HEA 483(a)(3)(E)
and HEA 485B(d)(2)).
On December 9, 2021, the FTC issued final regulations for 16 CFR Part 314 to implement the GLBA
information safeguarding standards that institutions must implement. These regulations significantly modified
the requirements that institutions must meet under GLBA. The regulations established minimum standards that
institutions must meet. The FTC stated that it “believes many of the requirements outlined in the Final Rule are
so fundamental to any information security program that the information security programs of many financial
institutions will already include them if those programs are in compliance with the current Safeguards Rule.”
Institutions are required to be in compliance with the revised requirements no later than June 9, 2023.
Institutions are required to develop, implement, and maintain a comprehensive information security program
that is written in one or more readily accessible parts. The regulations require the written information security
program to include nine elements for institutions with 5,000 or more customers, (16 CFR 314.3(a)). The written
information security program for institutions with fewer than 5,000 customers must address seven elements
(16 CFR 314.3(a) and 16 CFR 314.6). In the preamble to the Final Rule, the FTC stated, “Proposed § 314.4
[Elements] altered the current Rule’s required elements of an information security program and added several
new elements.” The FTC also stated, “[t]he elements for the information security programs set forth in this
section [16 CFR 314.4} are high-level principles that set forth basic issues the programs must address, and do
not prescribe how they will be addressed.” The elements that an institution must address in its written
information security program are at 16 CFR 314.4. At a minimum, an institution’s written information security
program:
• Designates a qualified individual responsible for overseeing and implementing the institution’s information
security program and enforcing the information security program in compliance (16 CFR 314.4(a)).
• Provides for the information security program to be based on a risk assessment that identifies reasonably
foreseeable internal and external risks to the security, confidentiality, and integrity of customer information
(as the term customer information applies to the institution) that could result in the unauthorized disclosure,
misuse, alteration, destruction, or other compromise of such information, and assesses the sufficiency of
any safeguards in place to control these risks (16 CFR 314.4(b)).
• Provides for the design and implementation of safeguards to control the risks the institution identifies
through its risk assessment (16 CFR 314.4(c)). At a minimum, the institution’s written information security
program must address the implementation of the minimum safeguards identified in 16 CFR 314.4(c)(1)
through (8). The eight minimum safeguards that the written information security program must address are
summarized as follows:
– Implement and periodically review access controls.
– Conduct a periodic inventory of data, noting where it’s collected, stored, or transmitted.
– Encrypt customer information on the institution’s system and when it’s in transit.
– Assess apps developed by the institution.
– Implement multi-factor authentication for anyone accessing customer information on the institution’s
system.
– Dispose of customer information securely
– Anticipate and evaluate changes to the information system or network.
– Maintain a log of authorized users’ activity and keep an eye out for unauthorized access.
• Provides for the institution to regularly test or otherwise monitor the effectiveness of the safeguards it has
implemented (16 CFR 314.4(d)).
• Provides for the implementation of policies and procedures to ensure that personnel are able to enact the
information security program (16 CFR 314.4(e)(1)).
• Addresses how the institution will oversee its information system service providers (16 CFR 314.4(f)).
• Provides for the evaluation and adjustment of its information security program in light of the results of the
required testing and monitoring; any material changes to its operations or business arrangements; the
results of the required risk assessments; or any other circumstances that it knows or has reason to know
may have a material impact the institution’s information security program (16 CFR 314.4(g)).
The first element that an institution’s written information security program must address is the designation of an
individual with responsibility for implementing and enforcing an institution’s written information security
program. The regulations refer to this individual as the Qualified Individual. If an institution has not designated a
Qualified Individual, it is not in compliance with the GLBA requirements. The Qualified Individual has ultimate
responsibility and accountability for implementing and enforcing the institution’s information security program
(16 CFR 314.4(a)). The regulations do provide for an institution to use a service provider as a Qualified
Individual. In cases where an institution uses a service provider as the Qualified Individual, the institution must:
• Retain responsibility for compliance with GLBA.
• Designate a senior member of its personnel responsible for direction and oversight of the Qualified
Individual; and
• Require the service provider or affiliate to maintain an information security program that protects the
institution in accordance with the requirements of the regulations at 16 CFR Part 314(a)(1) through (3).
Because the written information security program may be in one or more readily accessible parts and the
Qualified Individual is responsible for implementing and monitoring the information security program, ED
expects that the Qualified Individual would be able to provide the written information security program that
addresses the elements required for the written information security program to the auditors.
Identified Conditions:
A. Formally Establish and Document Risk Acceptance Process (repeat finding)
The District’s Written Information Security Program does not explicitly define the criteria for accepting
potential risks. A related process document, which was committed to be completed in the prior year, is
still in development as of September 2023.
B. Perform Regular Backup Restoration Tests (repeat finding)
The District performed a comprehensive Tabletop Disaster Recovery (DR) exercise for both SAP and
SIS during the audit period. As part of the exercise, the DR Team simulated a scenario, fully supported
with recovery considerations, steps, results, recovery challenges, and key recommendations to
improve moving forward – the exercise was also reviewed and approved by the Vice Chancellor and
Chief Information Officer. However, a key activity which is the actual backup restoration testing was not
performed as part of the tabletop exercise or at any point during the audit period.
C. Perform Timely Access Revocation and Regular Access Reviews (repeat finding)
Based on a test of controls to verify that access of terminated employees is timely removed in Active
Directory (AD), SAP, and PeopleSoft Student Information System (PS SIS), we noted that out of the
terminated employees subject to testing:
1. 13 users were active in AD, three (3) of whom have logged in after their termination.
2. 76 users were still active in SAP, 19 of whom have logged in after their termination.
3. 81 users were still active in PS SIS, 42 of whom have logged in after their termination.
Moreover, while a privileged user access review is performed for AD, there is no review performed to
check the validity of regular users in AD and the validity and appropriateness of users in SAP and SIS.
Employee functions and/or responsibilities may change over time; thus, previously provisioned access
may no longer be valid. Furthermore, a new compliance requirement, which requires institutions to
perform periodic access reviews for physical access in the data centers where the critical student
information systems are hosted [16 CFR 314.4(c)(1)], was also not performed during the audit period.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
16 CFR 314.4(f), a new compliance requirement, requires institutions to periodically assess service
providers based on the risk they present and the continued adequacy of their safeguards. However, we
noted that contracts for the following service providers were renewed by the District without sufficient
information security review from 2020 to 2022 and the period thereafter.
a. XAP – used for requesting, sending, and receiving electronic transcripts.
b. Bank Mobile – used for student refund processing.
c. Campus Logic – used for student online verification processing.
These contracts were instituted before the adoption of the District’s Information Security Program and
thus, were adopted and renewed thereafter without an Information Security Review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
A new compliance requirement, which requires institutions to monitor and log the activity of authorized
users and detect unauthorized access or use of, or tampering with, customer information by such users
[16 CFR 314.4(c)(8)], is not currently implemented by the District.
F. Implement Data-at-Rest Encryption for Devices Storing Customer Data
A new compliance requirement, which requires institutions to protect by encryption all students’ data
held at rest [16 CFR 314.4(c)(3)], is not currently implemented by the District (e.g., SAP and SIS
servers).
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
SAP production client was opened on 10/03/2022 and 11/09/2022 without sufficient documentation that
it was authorized and approved. Opening the production client, if not controlled, carries a significant
risk since changes can be made directly to the production environment without transport requests,
thereby circumventing any established change management controls.
Cause and Effect:
A. Formally Establish and Document Risk Acceptance Process
The absence of a formal risk acceptance process can lead to inappropriate risk treatment and a lack of
oversight in managing risks, resulting in inconsistent approaches that may not align with the District’s
overall risk tolerance.
B. Perform Regular Backup Restoration Tests
Lack of proper restoration testing may hinder the District from recovering its data completely and
accurately.
C. Perform Timely Access Revocation and Regular Access Reviews
Failure to deactivate or remove accounts of terminated employees timely may result in unauthorized
access to the District’s resources and sensitive information. Furthermore, the absence of user access
reviews increases the risk of inappropriate users or access remaining undetected over time which may
be used to process unauthorized transactions or view confidential information.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Non-performance of review may result in the District relying on IT service providers with ineffective
information security controls making them susceptible to data breaches. A breach in a third-party
system may expose the District to financial, operational, legal, and reputational damages.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Without adequate logging and monitoring of users’ activity, security incidents, including suspicious and
unauthorized activities may not be detected and responded to in a timely manner.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
Data that is held to devices without encryption is vulnerable to unauthorized access, especially if
physical and logical controls are compromised. In the event of a breach, sensitive data, such as
students’ information may be exposed.
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
Insufficient controls over client opening may result in the implementation of unauthorized changes
directly into the production environment. This increases the risk that changes to the system may not
follow the District’s change management process (documentation, authorization, testing, and approval)
prior to the implementation of the change to the production environment.
Recommendation:
A. Formally Establish and Document Risk Acceptance Process
We recommend that the District establish and implement the District’s Risk Acceptance process that
details the criteria and conditions for accepting potential risks. We also recommend that the District
ensure this is aligned with the District’s objectives, overall risk tolerance, and current practices in
identifying, assessing, and mitigating risks.
B. Perform Regular Backup Restoration Tests
Together with the DR tabletop exercises, we recommend that backup restoration tests should be
performed at least once per year. Detailed testing schedules should be drafted based on DRP
specifications and required restoration of the critical systems. Documentation of such tests should be
maintained for full management awareness and approval.
C. Perform Timely Access Revocation and Regular Access Reviews
1. We recommend that the District revoke the access of terminated employees and review the
activities performed by those accounts after their termination date to ensure the validity and
appropriateness of activities/transactions performed by these accounts, if any.
2. Concurrently, the District should improve the account termination procedures to ensure that access
to terminated employees is timely revoked.
3. We also recommend that regular access reviews for AD, SAP, PS SIS, and the physical accesses
to data centers where these systems are hosted, are performed, and documented (for both regular
and privileged users) to ensure that only valid and appropriate users remain in the system and
have access to relevant information. The review may include, but is not limited to the following:
a. Document management control over the completeness and accuracy of the reports used in the
review.
b. Define designated functions/roles to perform the review.
c. Monitor timeliness of the performance of the review and execution of corrective actions as a
result of the review
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Revisit the District’s current practices for evaluating third-party provider’s information security to ensure
that all third-party are reviewed and evaluated regularly. At the minimum, the process should involve
continuous monitoring, contractual provisions summarizing security requirements, and a strategy for
addressing security vulnerabilities identified during reviews.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Formally establish a process for logging and monitoring users’ activity which includes collection,
retention, regular review, and documentation of user activity logs. The review should be aligned with
the District’s access management practices to ensure that only authorized users are allowed to access
information that is aligned with their functions and responsibilities.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
The District should establish and implement data-at-rest encryption for endpoint devices to ensure that
data is inaccessible to unauthorized users in cases when logical and physical measures are
compromised.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
Ensure that production client openings, particularly those related to direct production changes, strictly
adhere to the District’s Change Management Procedure. These client openings and the related
changes should be properly documented, authorized, and validated prior to implementation.
Views of Responsible Officials and Planned Corrective Actions:
A. Formally Establish and Document Risk Acceptance Process
Requirements for risk assessments and risk acceptance processes to comply with GLBA were
expanded in June of 2023. The District engaged a third-party consultant to conduct a GLBA-compliant
risk assessment and advise on recommended changes to the District’s Written Information Security
Plan (WISP) to comply with the new requirements. The findings and recommendations were presented
to the District in October of 2023 and are currently under review. The District will initiate a project to
formalize risk acceptance by December 31st, 2023, and implement the risk acceptance process by
June 30, 2024.
B. Perform Regular Backup Restoration Tests
The District has engaged with a third party to build a testing environment to physically test restoration
of the SIS environment. Initiation of the project is pending processing of the Purchase Order. The
District anticipates completion of the restoration by December 31st, 2023.
With respect to SAP, the District is currently engaged in an effort to migrate the SAP database to
HANA. When this project is complete, the same test environment will be capable of performing physical
recovery tests for SAP. The HANA migration is estimated to be completed on February 28th, 2024.
C. Perform Timely Access Revocation and Regular Access Reviews
With respect to the District’s Single Sign-On (ADFS or SSO) environments, the District engaged
professional services consultants to address this item by automating the disablement of employee
accounts based upon the termination of assignment. The work is currently underway. The target
completion of the process is December 15, 2023. With respect to the SAP environment, the District has
engaged with a vendor to implement Multifactor Authentication (MFA) in the SAP environment. Work
will begin upon processing the Purchase Order. Once both efforts are complete, disabling employee
accounts in SSO, SIS and SAP will be performed automatically based upon the termination of
assignments according to criteria established by Human Resources.
With respect to access reviews of SIS and SAP, the District is currently researching the export of user
audit logs to the District’s analysis environment to enable regular reviews. The new target to perform
regular access reviews for SAP and SIS is the end of Q1 2024.
With respect to physical access reviews, the District Information Security Team will perform an annual
review of relevant operational protocols for data center access with the appropriate internal teams and
perform an audit of data access at a minimum of once per year. The first annual protocol review will be
completed by December 1st, 2023. The first annual audit will commence no later than March 1st, 2024.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
To prevent recurrence, the LACCD Information Security Team will coordinate an annual review of
Administrative Protocol 3723A: Information Security Evaluation of Third-Party Providers with District
Financial Aid, Procurement and Educational Programming and Institutional Effectiveness (EPIE)
leadership teams to help assure future relevant contracts are provided to the Information Security
Team prior to renewal to allow for timely security review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
The District is currently researching the export of user audit logs to the District’s analysis environment
to enable regular reviews. The new target to perform regular access reviews for SAP and SIS is the
end of Q1 2024.
F. Implement data encryption for Devices Storing Customer Data
The District engaged a third-party consultant to perform a comprehensive review of PeopleSoft security
controls, including the implementation of encryption of financial aid data within PeopleSoft. The results
are pending. Based upon those recommendations, the District will work with encryption providers to
develop and implement field-level encryption of financial aid data in SIS as appropriate.
With respect to end-user devices storing sensitive data, the District recently adopted workstation
hardening requirements that include whole-disk encryption for desktop and laptop computers used by
personnel who routinely access sensitive information, including financial aid data. The District will
implement the standards on workstations used by employees in financial aid and institutional research
by June 30, 2024. Once this is complete, additional workstations will be encrypted in order of potential
risk.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
The requests for direct changes in SAP production will be tracked and included in our help desk
requests so that an auditable trail can be created leading to the purpose and completion of the
production changes. Additionally, direct production change requests will be reviewed and approved
following the LACCD Change Control process. Minor updates that do not fall within the change control
guidelines will require managerial approval within the help desk system.
Personnel Responsible for Implementation: Carmen V. Lidz
Position of Responsible Personnel: Vice Chancellor & Chief Information Officer
Finding FA 2023‑03: Special Tests and Provision: Gramm Leach Bliley Act ‑ Student Information
Security – Formally Establish and Document Risk Acceptance Process, Perform Regular Backup
Restoration Tests, Perform Timely Access Revocation and Regular Access Reviews, Perform
Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards, Maintain and Review Logs
of Users' Activity for both SAP and PS SIS, Implement Data-at-Rest Encryption for Devices Storing
Customer Data, Enforce Strict Compliance on Controls over SAP Direct to Production Changes (Repeat
Finding)
Federal Program Information
Assistance Listing Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: Various
Federal Award Year: July 1, 2022, to June 30, 2023
Compliance Requirement: Special Tests and Provisions – Gramm Leach Bliley Act –
Student Information Security
Criteria or Specific Requirement:
The Gramm-Leach-Bliley Act (Pub. L. No. 106-102) (GLBA) requires financial institutions to explain their
information-sharing practices to their customers and to safeguard sensitive data (16 CFR 314). The Federal
Trade Commission considers Title IV-eligible institutions that participate in Title IV Educational Assistance
Programs as “financial institutions” and subject to the Gramm-Leach-Bliley Act because they appear to be
significantly engaged in wiring funds to consumers (16 CFR 313.3(k)(2)(vi)). Institutions agree to comply with
GLBA in their Program Participation Agreement with ED. Institutions must protect student financial aid
information, with particular attention to information provided to institutions by ED or otherwise obtained in
support of the administration of the Federal student financial aid programs (16 CFR 314.3; HEA 483(a)(3)(E)
and HEA 485B(d)(2)).
On December 9, 2021, the FTC issued final regulations for 16 CFR Part 314 to implement the GLBA
information safeguarding standards that institutions must implement. These regulations significantly modified
the requirements that institutions must meet under GLBA. The regulations established minimum standards that
institutions must meet. The FTC stated that it “believes many of the requirements outlined in the Final Rule are
so fundamental to any information security program that the information security programs of many financial
institutions will already include them if those programs are in compliance with the current Safeguards Rule.”
Institutions are required to be in compliance with the revised requirements no later than June 9, 2023.
Institutions are required to develop, implement, and maintain a comprehensive information security program
that is written in one or more readily accessible parts. The regulations require the written information security
program to include nine elements for institutions with 5,000 or more customers, (16 CFR 314.3(a)). The written
information security program for institutions with fewer than 5,000 customers must address seven elements
(16 CFR 314.3(a) and 16 CFR 314.6). In the preamble to the Final Rule, the FTC stated, “Proposed § 314.4
[Elements] altered the current Rule’s required elements of an information security program and added several
new elements.” The FTC also stated, “[t]he elements for the information security programs set forth in this
section [16 CFR 314.4} are high-level principles that set forth basic issues the programs must address, and do
not prescribe how they will be addressed.” The elements that an institution must address in its written
information security program are at 16 CFR 314.4. At a minimum, an institution’s written information security
program:
• Designates a qualified individual responsible for overseeing and implementing the institution’s information
security program and enforcing the information security program in compliance (16 CFR 314.4(a)).
• Provides for the information security program to be based on a risk assessment that identifies reasonably
foreseeable internal and external risks to the security, confidentiality, and integrity of customer information
(as the term customer information applies to the institution) that could result in the unauthorized disclosure,
misuse, alteration, destruction, or other compromise of such information, and assesses the sufficiency of
any safeguards in place to control these risks (16 CFR 314.4(b)).
• Provides for the design and implementation of safeguards to control the risks the institution identifies
through its risk assessment (16 CFR 314.4(c)). At a minimum, the institution’s written information security
program must address the implementation of the minimum safeguards identified in 16 CFR 314.4(c)(1)
through (8). The eight minimum safeguards that the written information security program must address are
summarized as follows:
– Implement and periodically review access controls.
– Conduct a periodic inventory of data, noting where it’s collected, stored, or transmitted.
– Encrypt customer information on the institution’s system and when it’s in transit.
– Assess apps developed by the institution.
– Implement multi-factor authentication for anyone accessing customer information on the institution’s
system.
– Dispose of customer information securely
– Anticipate and evaluate changes to the information system or network.
– Maintain a log of authorized users’ activity and keep an eye out for unauthorized access.
• Provides for the institution to regularly test or otherwise monitor the effectiveness of the safeguards it has
implemented (16 CFR 314.4(d)).
• Provides for the implementation of policies and procedures to ensure that personnel are able to enact the
information security program (16 CFR 314.4(e)(1)).
• Addresses how the institution will oversee its information system service providers (16 CFR 314.4(f)).
• Provides for the evaluation and adjustment of its information security program in light of the results of the
required testing and monitoring; any material changes to its operations or business arrangements; the
results of the required risk assessments; or any other circumstances that it knows or has reason to know
may have a material impact the institution’s information security program (16 CFR 314.4(g)).
The first element that an institution’s written information security program must address is the designation of an
individual with responsibility for implementing and enforcing an institution’s written information security
program. The regulations refer to this individual as the Qualified Individual. If an institution has not designated a
Qualified Individual, it is not in compliance with the GLBA requirements. The Qualified Individual has ultimate
responsibility and accountability for implementing and enforcing the institution’s information security program
(16 CFR 314.4(a)). The regulations do provide for an institution to use a service provider as a Qualified
Individual. In cases where an institution uses a service provider as the Qualified Individual, the institution must:
• Retain responsibility for compliance with GLBA.
• Designate a senior member of its personnel responsible for direction and oversight of the Qualified
Individual; and
• Require the service provider or affiliate to maintain an information security program that protects the
institution in accordance with the requirements of the regulations at 16 CFR Part 314(a)(1) through (3).
Because the written information security program may be in one or more readily accessible parts and the
Qualified Individual is responsible for implementing and monitoring the information security program, ED
expects that the Qualified Individual would be able to provide the written information security program that
addresses the elements required for the written information security program to the auditors.
Identified Conditions:
A. Formally Establish and Document Risk Acceptance Process (repeat finding)
The District’s Written Information Security Program does not explicitly define the criteria for accepting
potential risks. A related process document, which was committed to be completed in the prior year, is
still in development as of September 2023.
B. Perform Regular Backup Restoration Tests (repeat finding)
The District performed a comprehensive Tabletop Disaster Recovery (DR) exercise for both SAP and
SIS during the audit period. As part of the exercise, the DR Team simulated a scenario, fully supported
with recovery considerations, steps, results, recovery challenges, and key recommendations to
improve moving forward – the exercise was also reviewed and approved by the Vice Chancellor and
Chief Information Officer. However, a key activity which is the actual backup restoration testing was not
performed as part of the tabletop exercise or at any point during the audit period.
C. Perform Timely Access Revocation and Regular Access Reviews (repeat finding)
Based on a test of controls to verify that access of terminated employees is timely removed in Active
Directory (AD), SAP, and PeopleSoft Student Information System (PS SIS), we noted that out of the
terminated employees subject to testing:
1. 13 users were active in AD, three (3) of whom have logged in after their termination.
2. 76 users were still active in SAP, 19 of whom have logged in after their termination.
3. 81 users were still active in PS SIS, 42 of whom have logged in after their termination.
Moreover, while a privileged user access review is performed for AD, there is no review performed to
check the validity of regular users in AD and the validity and appropriateness of users in SAP and SIS.
Employee functions and/or responsibilities may change over time; thus, previously provisioned access
may no longer be valid. Furthermore, a new compliance requirement, which requires institutions to
perform periodic access reviews for physical access in the data centers where the critical student
information systems are hosted [16 CFR 314.4(c)(1)], was also not performed during the audit period.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
16 CFR 314.4(f), a new compliance requirement, requires institutions to periodically assess service
providers based on the risk they present and the continued adequacy of their safeguards. However, we
noted that contracts for the following service providers were renewed by the District without sufficient
information security review from 2020 to 2022 and the period thereafter.
a. XAP – used for requesting, sending, and receiving electronic transcripts.
b. Bank Mobile – used for student refund processing.
c. Campus Logic – used for student online verification processing.
These contracts were instituted before the adoption of the District’s Information Security Program and
thus, were adopted and renewed thereafter without an Information Security Review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
A new compliance requirement, which requires institutions to monitor and log the activity of authorized
users and detect unauthorized access or use of, or tampering with, customer information by such users
[16 CFR 314.4(c)(8)], is not currently implemented by the District.
F. Implement Data-at-Rest Encryption for Devices Storing Customer Data
A new compliance requirement, which requires institutions to protect by encryption all students’ data
held at rest [16 CFR 314.4(c)(3)], is not currently implemented by the District (e.g., SAP and SIS
servers).
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
SAP production client was opened on 10/03/2022 and 11/09/2022 without sufficient documentation that
it was authorized and approved. Opening the production client, if not controlled, carries a significant
risk since changes can be made directly to the production environment without transport requests,
thereby circumventing any established change management controls.
Cause and Effect:
A. Formally Establish and Document Risk Acceptance Process
The absence of a formal risk acceptance process can lead to inappropriate risk treatment and a lack of
oversight in managing risks, resulting in inconsistent approaches that may not align with the District’s
overall risk tolerance.
B. Perform Regular Backup Restoration Tests
Lack of proper restoration testing may hinder the District from recovering its data completely and
accurately.
C. Perform Timely Access Revocation and Regular Access Reviews
Failure to deactivate or remove accounts of terminated employees timely may result in unauthorized
access to the District’s resources and sensitive information. Furthermore, the absence of user access
reviews increases the risk of inappropriate users or access remaining undetected over time which may
be used to process unauthorized transactions or view confidential information.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Non-performance of review may result in the District relying on IT service providers with ineffective
information security controls making them susceptible to data breaches. A breach in a third-party
system may expose the District to financial, operational, legal, and reputational damages.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Without adequate logging and monitoring of users’ activity, security incidents, including suspicious and
unauthorized activities may not be detected and responded to in a timely manner.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
Data that is held to devices without encryption is vulnerable to unauthorized access, especially if
physical and logical controls are compromised. In the event of a breach, sensitive data, such as
students’ information may be exposed.
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
Insufficient controls over client opening may result in the implementation of unauthorized changes
directly into the production environment. This increases the risk that changes to the system may not
follow the District’s change management process (documentation, authorization, testing, and approval)
prior to the implementation of the change to the production environment.
Recommendation:
A. Formally Establish and Document Risk Acceptance Process
We recommend that the District establish and implement the District’s Risk Acceptance process that
details the criteria and conditions for accepting potential risks. We also recommend that the District
ensure this is aligned with the District’s objectives, overall risk tolerance, and current practices in
identifying, assessing, and mitigating risks.
B. Perform Regular Backup Restoration Tests
Together with the DR tabletop exercises, we recommend that backup restoration tests should be
performed at least once per year. Detailed testing schedules should be drafted based on DRP
specifications and required restoration of the critical systems. Documentation of such tests should be
maintained for full management awareness and approval.
C. Perform Timely Access Revocation and Regular Access Reviews
1. We recommend that the District revoke the access of terminated employees and review the
activities performed by those accounts after their termination date to ensure the validity and
appropriateness of activities/transactions performed by these accounts, if any.
2. Concurrently, the District should improve the account termination procedures to ensure that access
to terminated employees is timely revoked.
3. We also recommend that regular access reviews for AD, SAP, PS SIS, and the physical accesses
to data centers where these systems are hosted, are performed, and documented (for both regular
and privileged users) to ensure that only valid and appropriate users remain in the system and
have access to relevant information. The review may include, but is not limited to the following:
a. Document management control over the completeness and accuracy of the reports used in the
review.
b. Define designated functions/roles to perform the review.
c. Monitor timeliness of the performance of the review and execution of corrective actions as a
result of the review
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Revisit the District’s current practices for evaluating third-party provider’s information security to ensure
that all third-party are reviewed and evaluated regularly. At the minimum, the process should involve
continuous monitoring, contractual provisions summarizing security requirements, and a strategy for
addressing security vulnerabilities identified during reviews.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Formally establish a process for logging and monitoring users’ activity which includes collection,
retention, regular review, and documentation of user activity logs. The review should be aligned with
the District’s access management practices to ensure that only authorized users are allowed to access
information that is aligned with their functions and responsibilities.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
The District should establish and implement data-at-rest encryption for endpoint devices to ensure that
data is inaccessible to unauthorized users in cases when logical and physical measures are
compromised.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
Ensure that production client openings, particularly those related to direct production changes, strictly
adhere to the District’s Change Management Procedure. These client openings and the related
changes should be properly documented, authorized, and validated prior to implementation.
Views of Responsible Officials and Planned Corrective Actions:
A. Formally Establish and Document Risk Acceptance Process
Requirements for risk assessments and risk acceptance processes to comply with GLBA were
expanded in June of 2023. The District engaged a third-party consultant to conduct a GLBA-compliant
risk assessment and advise on recommended changes to the District’s Written Information Security
Plan (WISP) to comply with the new requirements. The findings and recommendations were presented
to the District in October of 2023 and are currently under review. The District will initiate a project to
formalize risk acceptance by December 31st, 2023, and implement the risk acceptance process by
June 30, 2024.
B. Perform Regular Backup Restoration Tests
The District has engaged with a third party to build a testing environment to physically test restoration
of the SIS environment. Initiation of the project is pending processing of the Purchase Order. The
District anticipates completion of the restoration by December 31st, 2023.
With respect to SAP, the District is currently engaged in an effort to migrate the SAP database to
HANA. When this project is complete, the same test environment will be capable of performing physical
recovery tests for SAP. The HANA migration is estimated to be completed on February 28th, 2024.
C. Perform Timely Access Revocation and Regular Access Reviews
With respect to the District’s Single Sign-On (ADFS or SSO) environments, the District engaged
professional services consultants to address this item by automating the disablement of employee
accounts based upon the termination of assignment. The work is currently underway. The target
completion of the process is December 15, 2023. With respect to the SAP environment, the District has
engaged with a vendor to implement Multifactor Authentication (MFA) in the SAP environment. Work
will begin upon processing the Purchase Order. Once both efforts are complete, disabling employee
accounts in SSO, SIS and SAP will be performed automatically based upon the termination of
assignments according to criteria established by Human Resources.
With respect to access reviews of SIS and SAP, the District is currently researching the export of user
audit logs to the District’s analysis environment to enable regular reviews. The new target to perform
regular access reviews for SAP and SIS is the end of Q1 2024.
With respect to physical access reviews, the District Information Security Team will perform an annual
review of relevant operational protocols for data center access with the appropriate internal teams and
perform an audit of data access at a minimum of once per year. The first annual protocol review will be
completed by December 1st, 2023. The first annual audit will commence no later than March 1st, 2024.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
To prevent recurrence, the LACCD Information Security Team will coordinate an annual review of
Administrative Protocol 3723A: Information Security Evaluation of Third-Party Providers with District
Financial Aid, Procurement and Educational Programming and Institutional Effectiveness (EPIE)
leadership teams to help assure future relevant contracts are provided to the Information Security
Team prior to renewal to allow for timely security review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
The District is currently researching the export of user audit logs to the District’s analysis environment
to enable regular reviews. The new target to perform regular access reviews for SAP and SIS is the
end of Q1 2024.
F. Implement data encryption for Devices Storing Customer Data
The District engaged a third-party consultant to perform a comprehensive review of PeopleSoft security
controls, including the implementation of encryption of financial aid data within PeopleSoft. The results
are pending. Based upon those recommendations, the District will work with encryption providers to
develop and implement field-level encryption of financial aid data in SIS as appropriate.
With respect to end-user devices storing sensitive data, the District recently adopted workstation
hardening requirements that include whole-disk encryption for desktop and laptop computers used by
personnel who routinely access sensitive information, including financial aid data. The District will
implement the standards on workstations used by employees in financial aid and institutional research
by June 30, 2024. Once this is complete, additional workstations will be encrypted in order of potential
risk.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
The requests for direct changes in SAP production will be tracked and included in our help desk
requests so that an auditable trail can be created leading to the purpose and completion of the
production changes. Additionally, direct production change requests will be reviewed and approved
following the LACCD Change Control process. Minor updates that do not fall within the change control
guidelines will require managerial approval within the help desk system.
Personnel Responsible for Implementation: Carmen V. Lidz
Position of Responsible Personnel: Vice Chancellor & Chief Information Officer
Finding FA 2023-004: Special Tests and Provisions – Using a Servicer or Financial Institution to Deliver
Title IV Credit Balances to a Card or Other Access Device – Failure to Submit URL to the Secretary of
Education for Publication in a Centralized Database Accessible to the Public
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.063, and 93.364
Federal Program Name: Student Financial Assistance Cluster:
Federal Supplement Educational Opportunity Grants
(FSEOG)
Federal Work-Study Program (FWS)
Federal Perkins Loan Program
Federal Pell Grant Program
Federal Direct Student Loans
Nursing Student Loans (NSL)
Federal Agency: U.S. Department of Education (ED)
Passed Through Entity: N/A
Federal Award Number: FSEOG
P007A210450, P007A210365, P007A210451,
P007A210452, P007A210453, P007A210455,
P007A210456, P007A210457, P007A210676
FWS
P033A210450, P033A210365, P033A210451,
P033A210452, P033A210453, P033A210455,
P033A210456, P033A210457, P033A210676
Pell
P063P210033, P063P215263, P063P210034,
P063P210658, P063P210035, P063P215261,
P063P215260, P063P210036, P063P215262
NSL
P268K220033, P268K225263, P268K220034,
P268K220658, P268K220035, P268K225261,
P268K225260, P268K220036, P268K225262
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Community College District
Compliance Requirement: Special Tests and Provisions: Using a Servicer or
Financial Institution to Deliver Title IV Credit Balances to
a Card or Other Access Device
Criteria or Specific Requirements:
Per 34 Code of Federal Regulations 668.164 Disbursing Funds:
In Tier One (T1) arrangement, an institution located in a State has a contract with a third-party servicer under
which the servicer performs one or more of the functions associated with processing direct payments of Title IV,
HEA program funds on behalf of the institution. The institution or third-party servicer makes payments to one or
more financial accounts that are offered to students under the contract; a financial account where information
about the account is communicated directly to students by the third-party servicer, or the institution on behalf of
or in conjunction with the third-party servicer; or a financial account where information about the account is
communicated directly to students by an entity contracting with or affiliated with the third-party servicer.
Institutions with a T1 arrangement should ensure that no later than September 1, 2017, and then no later than
60 days following the most recently completed award year thereafter, disclose conspicuously on the institution’s
Website and in a format established by the Secretary of Education the total consideration for the most recently
completed award year, monetary and non-monetary, paid or received by the parties under the terms of the
contract; and for any year in which the institution’s enrolled students open 30 or more financial accounts under
the T1 arrangement, the number of students who had financial accounts under the contract at any time during
the most recently completed award year, and the mean and median of the actual costs incurred by those
account holders.
The institution should also provide the Secretary with an up-to-date Uniform Resource Locator (URL) for the
contract and contract data as described above for publication in a centralized database accessible to the public.
Identified Condition:
We noted that the District’s URL link to the contract with BMTX, Inc. (BankMobile) and other required
information was not included in the latest Cash Management Contracts Database published by ED on
March 2022 as the District was unable to provide the URL link to ED for the award year ended June 30, 2023.
Cause and Effect:
Due to a miscommunication between the District staff and Bankmobile staff, the website link was not submitted
to the Department of Education, although the report was published and available to the public.
Questioned Costs:
None.
Recommendation:
We recommend that the District review its roles and responsibilities with Bankmobile and implement control
procedures to ensure that the District remains compliant with the requirements of Uniform Guidance and the
Code of Federal Regulation.
Views of Responsible Officials and Planned Corrective Actions:
The District has taken responsibility for providing the Department of Education with the website link and will
provide that going forward.
Personnel Responsible for Implementation: Nyame-Tease Prempeh
Position of Responsible Personnel: Assistant Director of Accounting
Expected Date of Implementation: November 1, 2023
Finding FA 2023-004: Special Tests and Provisions – Using a Servicer or Financial Institution to Deliver
Title IV Credit Balances to a Card or Other Access Device – Failure to Submit URL to the Secretary of
Education for Publication in a Centralized Database Accessible to the Public
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.063, and 93.364
Federal Program Name: Student Financial Assistance Cluster:
Federal Supplement Educational Opportunity Grants
(FSEOG)
Federal Work-Study Program (FWS)
Federal Perkins Loan Program
Federal Pell Grant Program
Federal Direct Student Loans
Nursing Student Loans (NSL)
Federal Agency: U.S. Department of Education (ED)
Passed Through Entity: N/A
Federal Award Number: FSEOG
P007A210450, P007A210365, P007A210451,
P007A210452, P007A210453, P007A210455,
P007A210456, P007A210457, P007A210676
FWS
P033A210450, P033A210365, P033A210451,
P033A210452, P033A210453, P033A210455,
P033A210456, P033A210457, P033A210676
Pell
P063P210033, P063P215263, P063P210034,
P063P210658, P063P210035, P063P215261,
P063P215260, P063P210036, P063P215262
NSL
P268K220033, P268K225263, P268K220034,
P268K220658, P268K220035, P268K225261,
P268K225260, P268K220036, P268K225262
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Community College District
Compliance Requirement: Special Tests and Provisions: Using a Servicer or
Financial Institution to Deliver Title IV Credit Balances to
a Card or Other Access Device
Criteria or Specific Requirements:
Per 34 Code of Federal Regulations 668.164 Disbursing Funds:
In Tier One (T1) arrangement, an institution located in a State has a contract with a third-party servicer under
which the servicer performs one or more of the functions associated with processing direct payments of Title IV,
HEA program funds on behalf of the institution. The institution or third-party servicer makes payments to one or
more financial accounts that are offered to students under the contract; a financial account where information
about the account is communicated directly to students by the third-party servicer, or the institution on behalf of
or in conjunction with the third-party servicer; or a financial account where information about the account is
communicated directly to students by an entity contracting with or affiliated with the third-party servicer.
Institutions with a T1 arrangement should ensure that no later than September 1, 2017, and then no later than
60 days following the most recently completed award year thereafter, disclose conspicuously on the institution’s
Website and in a format established by the Secretary of Education the total consideration for the most recently
completed award year, monetary and non-monetary, paid or received by the parties under the terms of the
contract; and for any year in which the institution’s enrolled students open 30 or more financial accounts under
the T1 arrangement, the number of students who had financial accounts under the contract at any time during
the most recently completed award year, and the mean and median of the actual costs incurred by those
account holders.
The institution should also provide the Secretary with an up-to-date Uniform Resource Locator (URL) for the
contract and contract data as described above for publication in a centralized database accessible to the public.
Identified Condition:
We noted that the District’s URL link to the contract with BMTX, Inc. (BankMobile) and other required
information was not included in the latest Cash Management Contracts Database published by ED on
March 2022 as the District was unable to provide the URL link to ED for the award year ended June 30, 2023.
Cause and Effect:
Due to a miscommunication between the District staff and Bankmobile staff, the website link was not submitted
to the Department of Education, although the report was published and available to the public.
Questioned Costs:
None.
Recommendation:
We recommend that the District review its roles and responsibilities with Bankmobile and implement control
procedures to ensure that the District remains compliant with the requirements of Uniform Guidance and the
Code of Federal Regulation.
Views of Responsible Officials and Planned Corrective Actions:
The District has taken responsibility for providing the Department of Education with the website link and will
provide that going forward.
Personnel Responsible for Implementation: Nyame-Tease Prempeh
Position of Responsible Personnel: Assistant Director of Accounting
Expected Date of Implementation: November 1, 2023
Finding FA 2023-004: Special Tests and Provisions – Using a Servicer or Financial Institution to Deliver
Title IV Credit Balances to a Card or Other Access Device – Failure to Submit URL to the Secretary of
Education for Publication in a Centralized Database Accessible to the Public
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.063, and 93.364
Federal Program Name: Student Financial Assistance Cluster:
Federal Supplement Educational Opportunity Grants
(FSEOG)
Federal Work-Study Program (FWS)
Federal Perkins Loan Program
Federal Pell Grant Program
Federal Direct Student Loans
Nursing Student Loans (NSL)
Federal Agency: U.S. Department of Education (ED)
Passed Through Entity: N/A
Federal Award Number: FSEOG
P007A210450, P007A210365, P007A210451,
P007A210452, P007A210453, P007A210455,
P007A210456, P007A210457, P007A210676
FWS
P033A210450, P033A210365, P033A210451,
P033A210452, P033A210453, P033A210455,
P033A210456, P033A210457, P033A210676
Pell
P063P210033, P063P215263, P063P210034,
P063P210658, P063P210035, P063P215261,
P063P215260, P063P210036, P063P215262
NSL
P268K220033, P268K225263, P268K220034,
P268K220658, P268K220035, P268K225261,
P268K225260, P268K220036, P268K225262
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Community College District
Compliance Requirement: Special Tests and Provisions: Using a Servicer or
Financial Institution to Deliver Title IV Credit Balances to
a Card or Other Access Device
Criteria or Specific Requirements:
Per 34 Code of Federal Regulations 668.164 Disbursing Funds:
In Tier One (T1) arrangement, an institution located in a State has a contract with a third-party servicer under
which the servicer performs one or more of the functions associated with processing direct payments of Title IV,
HEA program funds on behalf of the institution. The institution or third-party servicer makes payments to one or
more financial accounts that are offered to students under the contract; a financial account where information
about the account is communicated directly to students by the third-party servicer, or the institution on behalf of
or in conjunction with the third-party servicer; or a financial account where information about the account is
communicated directly to students by an entity contracting with or affiliated with the third-party servicer.
Institutions with a T1 arrangement should ensure that no later than September 1, 2017, and then no later than
60 days following the most recently completed award year thereafter, disclose conspicuously on the institution’s
Website and in a format established by the Secretary of Education the total consideration for the most recently
completed award year, monetary and non-monetary, paid or received by the parties under the terms of the
contract; and for any year in which the institution’s enrolled students open 30 or more financial accounts under
the T1 arrangement, the number of students who had financial accounts under the contract at any time during
the most recently completed award year, and the mean and median of the actual costs incurred by those
account holders.
The institution should also provide the Secretary with an up-to-date Uniform Resource Locator (URL) for the
contract and contract data as described above for publication in a centralized database accessible to the public.
Identified Condition:
We noted that the District’s URL link to the contract with BMTX, Inc. (BankMobile) and other required
information was not included in the latest Cash Management Contracts Database published by ED on
March 2022 as the District was unable to provide the URL link to ED for the award year ended June 30, 2023.
Cause and Effect:
Due to a miscommunication between the District staff and Bankmobile staff, the website link was not submitted
to the Department of Education, although the report was published and available to the public.
Questioned Costs:
None.
Recommendation:
We recommend that the District review its roles and responsibilities with Bankmobile and implement control
procedures to ensure that the District remains compliant with the requirements of Uniform Guidance and the
Code of Federal Regulation.
Views of Responsible Officials and Planned Corrective Actions:
The District has taken responsibility for providing the Department of Education with the website link and will
provide that going forward.
Personnel Responsible for Implementation: Nyame-Tease Prempeh
Position of Responsible Personnel: Assistant Director of Accounting
Expected Date of Implementation: November 1, 2023
Finding FA 2023-004: Special Tests and Provisions – Using a Servicer or Financial Institution to Deliver
Title IV Credit Balances to a Card or Other Access Device – Failure to Submit URL to the Secretary of
Education for Publication in a Centralized Database Accessible to the Public
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.063, and 93.364
Federal Program Name: Student Financial Assistance Cluster:
Federal Supplement Educational Opportunity Grants
(FSEOG)
Federal Work-Study Program (FWS)
Federal Perkins Loan Program
Federal Pell Grant Program
Federal Direct Student Loans
Nursing Student Loans (NSL)
Federal Agency: U.S. Department of Education (ED)
Passed Through Entity: N/A
Federal Award Number: FSEOG
P007A210450, P007A210365, P007A210451,
P007A210452, P007A210453, P007A210455,
P007A210456, P007A210457, P007A210676
FWS
P033A210450, P033A210365, P033A210451,
P033A210452, P033A210453, P033A210455,
P033A210456, P033A210457, P033A210676
Pell
P063P210033, P063P215263, P063P210034,
P063P210658, P063P210035, P063P215261,
P063P215260, P063P210036, P063P215262
NSL
P268K220033, P268K225263, P268K220034,
P268K220658, P268K220035, P268K225261,
P268K225260, P268K220036, P268K225262
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Community College District
Compliance Requirement: Special Tests and Provisions: Using a Servicer or
Financial Institution to Deliver Title IV Credit Balances to
a Card or Other Access Device
Criteria or Specific Requirements:
Per 34 Code of Federal Regulations 668.164 Disbursing Funds:
In Tier One (T1) arrangement, an institution located in a State has a contract with a third-party servicer under
which the servicer performs one or more of the functions associated with processing direct payments of Title IV,
HEA program funds on behalf of the institution. The institution or third-party servicer makes payments to one or
more financial accounts that are offered to students under the contract; a financial account where information
about the account is communicated directly to students by the third-party servicer, or the institution on behalf of
or in conjunction with the third-party servicer; or a financial account where information about the account is
communicated directly to students by an entity contracting with or affiliated with the third-party servicer.
Institutions with a T1 arrangement should ensure that no later than September 1, 2017, and then no later than
60 days following the most recently completed award year thereafter, disclose conspicuously on the institution’s
Website and in a format established by the Secretary of Education the total consideration for the most recently
completed award year, monetary and non-monetary, paid or received by the parties under the terms of the
contract; and for any year in which the institution’s enrolled students open 30 or more financial accounts under
the T1 arrangement, the number of students who had financial accounts under the contract at any time during
the most recently completed award year, and the mean and median of the actual costs incurred by those
account holders.
The institution should also provide the Secretary with an up-to-date Uniform Resource Locator (URL) for the
contract and contract data as described above for publication in a centralized database accessible to the public.
Identified Condition:
We noted that the District’s URL link to the contract with BMTX, Inc. (BankMobile) and other required
information was not included in the latest Cash Management Contracts Database published by ED on
March 2022 as the District was unable to provide the URL link to ED for the award year ended June 30, 2023.
Cause and Effect:
Due to a miscommunication between the District staff and Bankmobile staff, the website link was not submitted
to the Department of Education, although the report was published and available to the public.
Questioned Costs:
None.
Recommendation:
We recommend that the District review its roles and responsibilities with Bankmobile and implement control
procedures to ensure that the District remains compliant with the requirements of Uniform Guidance and the
Code of Federal Regulation.
Views of Responsible Officials and Planned Corrective Actions:
The District has taken responsibility for providing the Department of Education with the website link and will
provide that going forward.
Personnel Responsible for Implementation: Nyame-Tease Prempeh
Position of Responsible Personnel: Assistant Director of Accounting
Expected Date of Implementation: November 1, 2023
Finding FA 2023-005: Reporting – Untimely and Incomplete Posting of Quarterly Reports to the
College’s Website and Inaccurate Reported Expenditures Captured in the Published Website’s
Quarterly Reports.
Federal Catalog Number: ALN 84.425E, 84.425F, and 84.425L
Federal Program Name: Higher Education Emergency Relief Fund
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P425E200844, P425F202148, P425L200439,
P425E204139, P425F203076, P425L200440
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Pierce College
Los Angeles Trade Technical College
Compliance Requirement: Reporting
Criteria or Specific Requirements:
Per U.S. Department of Education Notice of Public Posting Requirement of Grant Information for Higher
Education Emergency Relief Fund (HEERF) Grantees:
The Certification and Agreements for the Coronavirus Response and Relief Supplemental Appropriations Act of
2021 (CRRSAA) and American Rescue Plan (ARP) (a)(1) and (a)(4) funds provide that each institution applying
for HEERF funds must promptly and timely provide a detailed accounting of the use and expenditure of the
funds in such manner and with such frequency as the Secretary may require. Each HEERF participating
institution must post the information listed below on the institution’s primary website, as an initial report under
the CRRSAA and ARP (a)(1) and (a)(4) programs. This report is associated with the approved information
collection under OMB control number 1801–0005.
This information must appear in a format and location that is easily accessible to the public. This information
must also be updated no later than 10 days after the end of each calendar quarter
(September 30, December 31, March 31, and June 30) thereafter, unless the Secretary specifies an alternative
method of reporting.
Identified Condition:
A. Untimely Posting of Quarterly Reports on the College’s Website
We noted that Los Angeles Pierce College’s Quarterly Budget and Expenditure Report for all HEERF I,
II, and III grant funds covering the quarter ending December 31, 2022, and March 31, 2023, were not
publicly posted on the college’s primary website.
B. Incomplete Posting of Published Links Related to the Quarterly Report on the College’s Website
We noted that Los Angeles Trade Technical College’s Quarterly Budget and Expenditure Report for all
HEERF I, II, and III grant funds covering the quarter ending June 30, 2023, was not completely posted
on the college’s primary website. The link to the quarterly report ending June 30, 2023, was published
on time, but the link incorrectly redirects to the March 31, 2023, quarterly report.
C. Inaccuracy of Quarterly Expenditures Reported on the College’s Website
We noted that the expenditures reported in Los Angeles Pierce College’s Quarterly Budget and
Expenditure Report for all HEERF I, II, and III grant funds covering the quarter ending
December 31, 2022, and June 30, 2023, were inaccurate.
• For the quarter ending December 31, 2022, the expenditures were overstated by $284,593 due to
the inclusion of the expenditures already reported from the previous quarter ending
September 30, 2022. Per inquiry, the preparer inadvertently reported the expenditures on a
cumulative basis.
• For the quarter ending June 30, 2023, the expenditures were erroneously reported at zero amounts
which resulted in an understatement by the actual expenditures incurred amounting to $2,007,950.
Cause and Effect:
Los Angeles Trade Technical College
The reports were posted to the website on time. However, due to a clerical error, the link for the June 30, 2023,
report directed users to the March 31, 2023, report. The effect was that, although the correct file existed on the
server, there was no link for users to access it. This has been corrected.
Los Angeles Pierce College
The college experienced a break in the coordination of the report review which resulted in an error on the
published report. There was also a misunderstanding about accumulating data from prior reported periods.
Questioned Costs:
None.
Recommendation:
We recommend that the campuses review their approval process prior to posting the reports online by having
formal preparer and approver signoffs to ensure that the supporting documents correctly match the reports
posted online. Additionally, we recommend the campuses enhance coordination between the report approver and the website manager to ensure that the reports are properly linked in the backend of the website and are
timely posted if already prepared.
Views of Responsible Officials and Planned Corrective Actions:
Los Angeles Trade Technical College
The cause of the incorrect link was a clerical error, and the error has since been corrected, the condition no
longer exists and is resolved.
Personnel Responsible for Implementation: LATTC – Charalambos Ziogas/Daniel Friedman
Position of Responsible Personnel: VPAS/CFA
Expected Date of Implementation: October 16, 2023
Los Angeles Pierce College
The college will work with District staff to update the process of reviewing, approving, and publishing or
providing the reports to appropriate websites and agencies.
Personnel Responsible for Implementation: Ron Paquette
Position of Responsible Personnel: Associate Vice President, Admin Services
Expected Date of Implementation: November 1, 2023
Finding FA 2023-005: Reporting – Untimely and Incomplete Posting of Quarterly Reports to the
College’s Website and Inaccurate Reported Expenditures Captured in the Published Website’s
Quarterly Reports.
Federal Catalog Number: ALN 84.425E, 84.425F, and 84.425L
Federal Program Name: Higher Education Emergency Relief Fund
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P425E200844, P425F202148, P425L200439,
P425E204139, P425F203076, P425L200440
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Pierce College
Los Angeles Trade Technical College
Compliance Requirement: Reporting
Criteria or Specific Requirements:
Per U.S. Department of Education Notice of Public Posting Requirement of Grant Information for Higher
Education Emergency Relief Fund (HEERF) Grantees:
The Certification and Agreements for the Coronavirus Response and Relief Supplemental Appropriations Act of
2021 (CRRSAA) and American Rescue Plan (ARP) (a)(1) and (a)(4) funds provide that each institution applying
for HEERF funds must promptly and timely provide a detailed accounting of the use and expenditure of the
funds in such manner and with such frequency as the Secretary may require. Each HEERF participating
institution must post the information listed below on the institution’s primary website, as an initial report under
the CRRSAA and ARP (a)(1) and (a)(4) programs. This report is associated with the approved information
collection under OMB control number 1801–0005.
This information must appear in a format and location that is easily accessible to the public. This information
must also be updated no later than 10 days after the end of each calendar quarter
(September 30, December 31, March 31, and June 30) thereafter, unless the Secretary specifies an alternative
method of reporting.
Identified Condition:
A. Untimely Posting of Quarterly Reports on the College’s Website
We noted that Los Angeles Pierce College’s Quarterly Budget and Expenditure Report for all HEERF I,
II, and III grant funds covering the quarter ending December 31, 2022, and March 31, 2023, were not
publicly posted on the college’s primary website.
B. Incomplete Posting of Published Links Related to the Quarterly Report on the College’s Website
We noted that Los Angeles Trade Technical College’s Quarterly Budget and Expenditure Report for all
HEERF I, II, and III grant funds covering the quarter ending June 30, 2023, was not completely posted
on the college’s primary website. The link to the quarterly report ending June 30, 2023, was published
on time, but the link incorrectly redirects to the March 31, 2023, quarterly report.
C. Inaccuracy of Quarterly Expenditures Reported on the College’s Website
We noted that the expenditures reported in Los Angeles Pierce College’s Quarterly Budget and
Expenditure Report for all HEERF I, II, and III grant funds covering the quarter ending
December 31, 2022, and June 30, 2023, were inaccurate.
• For the quarter ending December 31, 2022, the expenditures were overstated by $284,593 due to
the inclusion of the expenditures already reported from the previous quarter ending
September 30, 2022. Per inquiry, the preparer inadvertently reported the expenditures on a
cumulative basis.
• For the quarter ending June 30, 2023, the expenditures were erroneously reported at zero amounts
which resulted in an understatement by the actual expenditures incurred amounting to $2,007,950.
Cause and Effect:
Los Angeles Trade Technical College
The reports were posted to the website on time. However, due to a clerical error, the link for the June 30, 2023,
report directed users to the March 31, 2023, report. The effect was that, although the correct file existed on the
server, there was no link for users to access it. This has been corrected.
Los Angeles Pierce College
The college experienced a break in the coordination of the report review which resulted in an error on the
published report. There was also a misunderstanding about accumulating data from prior reported periods.
Questioned Costs:
None.
Recommendation:
We recommend that the campuses review their approval process prior to posting the reports online by having
formal preparer and approver signoffs to ensure that the supporting documents correctly match the reports
posted online. Additionally, we recommend the campuses enhance coordination between the report approver and the website manager to ensure that the reports are properly linked in the backend of the website and are
timely posted if already prepared.
Views of Responsible Officials and Planned Corrective Actions:
Los Angeles Trade Technical College
The cause of the incorrect link was a clerical error, and the error has since been corrected, the condition no
longer exists and is resolved.
Personnel Responsible for Implementation: LATTC – Charalambos Ziogas/Daniel Friedman
Position of Responsible Personnel: VPAS/CFA
Expected Date of Implementation: October 16, 2023
Los Angeles Pierce College
The college will work with District staff to update the process of reviewing, approving, and publishing or
providing the reports to appropriate websites and agencies.
Personnel Responsible for Implementation: Ron Paquette
Position of Responsible Personnel: Associate Vice President, Admin Services
Expected Date of Implementation: November 1, 2023
Finding FA 2023-005: Reporting – Untimely and Incomplete Posting of Quarterly Reports to the
College’s Website and Inaccurate Reported Expenditures Captured in the Published Website’s
Quarterly Reports.
Federal Catalog Number: ALN 84.425E, 84.425F, and 84.425L
Federal Program Name: Higher Education Emergency Relief Fund
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P425E200844, P425F202148, P425L200439,
P425E204139, P425F203076, P425L200440
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Pierce College
Los Angeles Trade Technical College
Compliance Requirement: Reporting
Criteria or Specific Requirements:
Per U.S. Department of Education Notice of Public Posting Requirement of Grant Information for Higher
Education Emergency Relief Fund (HEERF) Grantees:
The Certification and Agreements for the Coronavirus Response and Relief Supplemental Appropriations Act of
2021 (CRRSAA) and American Rescue Plan (ARP) (a)(1) and (a)(4) funds provide that each institution applying
for HEERF funds must promptly and timely provide a detailed accounting of the use and expenditure of the
funds in such manner and with such frequency as the Secretary may require. Each HEERF participating
institution must post the information listed below on the institution’s primary website, as an initial report under
the CRRSAA and ARP (a)(1) and (a)(4) programs. This report is associated with the approved information
collection under OMB control number 1801–0005.
This information must appear in a format and location that is easily accessible to the public. This information
must also be updated no later than 10 days after the end of each calendar quarter
(September 30, December 31, March 31, and June 30) thereafter, unless the Secretary specifies an alternative
method of reporting.
Identified Condition:
A. Untimely Posting of Quarterly Reports on the College’s Website
We noted that Los Angeles Pierce College’s Quarterly Budget and Expenditure Report for all HEERF I,
II, and III grant funds covering the quarter ending December 31, 2022, and March 31, 2023, were not
publicly posted on the college’s primary website.
B. Incomplete Posting of Published Links Related to the Quarterly Report on the College’s Website
We noted that Los Angeles Trade Technical College’s Quarterly Budget and Expenditure Report for all
HEERF I, II, and III grant funds covering the quarter ending June 30, 2023, was not completely posted
on the college’s primary website. The link to the quarterly report ending June 30, 2023, was published
on time, but the link incorrectly redirects to the March 31, 2023, quarterly report.
C. Inaccuracy of Quarterly Expenditures Reported on the College’s Website
We noted that the expenditures reported in Los Angeles Pierce College’s Quarterly Budget and
Expenditure Report for all HEERF I, II, and III grant funds covering the quarter ending
December 31, 2022, and June 30, 2023, were inaccurate.
• For the quarter ending December 31, 2022, the expenditures were overstated by $284,593 due to
the inclusion of the expenditures already reported from the previous quarter ending
September 30, 2022. Per inquiry, the preparer inadvertently reported the expenditures on a
cumulative basis.
• For the quarter ending June 30, 2023, the expenditures were erroneously reported at zero amounts
which resulted in an understatement by the actual expenditures incurred amounting to $2,007,950.
Cause and Effect:
Los Angeles Trade Technical College
The reports were posted to the website on time. However, due to a clerical error, the link for the June 30, 2023,
report directed users to the March 31, 2023, report. The effect was that, although the correct file existed on the
server, there was no link for users to access it. This has been corrected.
Los Angeles Pierce College
The college experienced a break in the coordination of the report review which resulted in an error on the
published report. There was also a misunderstanding about accumulating data from prior reported periods.
Questioned Costs:
None.
Recommendation:
We recommend that the campuses review their approval process prior to posting the reports online by having
formal preparer and approver signoffs to ensure that the supporting documents correctly match the reports
posted online. Additionally, we recommend the campuses enhance coordination between the report approver and the website manager to ensure that the reports are properly linked in the backend of the website and are
timely posted if already prepared.
Views of Responsible Officials and Planned Corrective Actions:
Los Angeles Trade Technical College
The cause of the incorrect link was a clerical error, and the error has since been corrected, the condition no
longer exists and is resolved.
Personnel Responsible for Implementation: LATTC – Charalambos Ziogas/Daniel Friedman
Position of Responsible Personnel: VPAS/CFA
Expected Date of Implementation: October 16, 2023
Los Angeles Pierce College
The college will work with District staff to update the process of reviewing, approving, and publishing or
providing the reports to appropriate websites and agencies.
Personnel Responsible for Implementation: Ron Paquette
Position of Responsible Personnel: Associate Vice President, Admin Services
Expected Date of Implementation: November 1, 2023
Finding FA 2023-006 Reporting: Untimely Submission of Quarterly Financial Reports
Federal Program Information
Federal Catalog Number: ALN 17.268
Federal Program Name: H-1B Job Training Grant
Federal Agency: U.S. Department of Labor
Passed Through Entity: N/A
Federal Award Number: HG-33046-19-60-A-6
Federal Award Year: July 1, 2022 to June 30, 2023
Campus: West Los Angeles College
Compliance Requirement: Reporting
Criteria or Specific Requirement:
Per the terms and conditions of the grant agreement, with the U.S. Department of Labor (DOL) – Employment
and Training Administration (ETA), all ETA recipients are required to report quarterly financial data on the
ETA-9130 Form. ETA-9130 reports are due no later than 45 calendar days after the end of each specified
reporting quarter.
Identified Condition:
We noted that 2 out of 4 quarterly financial reports ETA-9130 were certified late on the U.S. Department of
Labor website as follows:
See schedule of findings and questioned costs.
Per inquiry with the District, the Accounting Department attempted to certify the quarterly reports before the due
date but encountered log-in issues on the U.S. DOL website which prevented certifying timely. The District
requested a reporting extension from Joshua Hodges, Federal Project Officer for the Office of Special Initiatives
and Demonstrations, U.S. DOL-ETA. Mr. Hodges did not authorize the extension and suggested submitting the
quarterly reports via the Payment Management System (PMS) and coordinating with the agency’s technical
team to resolve issues.
Cause and Effect:
The District’s approval officers were available to certify the reports, however, due to technical issues with the
PMS system, certification could not be completed within the allotted time.
Questioned Costs:
None.
Recommendation:
We recommend the district schedule and finalize its quarterly reports submission a week or two before the due
date to ensure that sufficient time is available to resolve unforeseen issues, such as the technical problems with
the U.S DOL website. Otherwise, an authorized waiver from the agency must be secured for late reporting.
Views of Responsible Officials and Planned Corrective Actions:
The District will review reporting timelines and reschedule to allow additional time for unforeseen issues.
Personnel Responsible for Implementation: Nyame-Tease Prempeh
Position of Responsible Personnel: Assistant Director of Accounting
Expected Date of Implementation: November 1, 2023
Finding FA 2023-001: Eligibility: Incorrect Federal Pell Grant Amounts Awarded (Repeat Finding)
Federal Program Information
Assistance Listing Number: ALN 84.063
Federal Program Name: Student Financial Assistance Cluster.
Federal Pell Grant Program
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P063P200033 (Steve to Confirm)
Federal Award Year: July 1, 2022, to June 30, 2023
Campus: West Los Angeles College
Compliance Requirement: Eligibility
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations (CFR) 690.62 Calculation of a Federal Pell Grant, the amount of a student’s Pell Grant for an academic year is based upon the payment and disbursement schedules published by the Secretary for each award year. The Uniform Guidance Compliance Supplement states that the Department of Education provides institutions with Payment and Disbursement Schedules for determining Pell awards each year. The Payment or
Disbursement Schedule provides the maximum annual amount a student would receive for a full academic year for a given enrollment status, Expected Family Contribution (EFC), and Cost of Attendance (COA). The Payment Schedule is used to determine the annual award for full-time, three-quarter-time, half-time, and less-than-half-time students.
2 CFR section 200.303 requires that non-Federal entities receiving Federal awards establish and maintain internal control over the Federal awards that provide reasonable assurance that the non-Federal entity is managing the Federal awards in compliance with Federal statutes, regulations, and the terms and conditions of the Federal awards.
Identified Condition:
Of the twenty (20) students selected for eligibility test work at West Los Angeles College, we noted the following:
• 1 student had an incorrectly calculated Federal Pell Grant award, which resulted in an understatement of
the disbursement to the student by $773. The student was eligible to receive $1,273 yet received $500 in
Winter 2023.
Cause and Effect:
The institution has reviewed the student’s award and determined that the student was inadvertently disbursed $500 instead of $1,273 which is considered to be an underpayment. Once identified by the auditors, the award has since been corrected and refunded to the student. The Central Financial Aid Systems Unit and the District’s Student Information System (SIS) Information Technology department have reviewed both system controls and
manual intervention, but the cause remains undetermined.
Questioned Costs:
See schedule of findings and questioned costs
The District has a known net understatement of Pell Grant award disbursements of ($773). The projected total net understatement of the Pell Grant award disbursements is $186,345 as follows:
See schedule of findings and questioned costs
This is computed by dividing the error found in the samples per term (Fall/Winter term – net underpayment ($773) and Spring/Summer terms – $0) over the total Pell awards disbursed in the sample size per term (Winter term – $64,577, and Spring/Summer terms – $81,046) multiplied by the total Pell awards disbursed for the identified colleges per term (Fall/Winter term – $15,567,394 and Spring/Summer terms – $14,958,472). The computation is made on a per-term basis on a campus level and not on a district-wide level.
Recommendation:
We recommend that the District make the necessary system modifications to the PeopleSoft SIS to ensure student awards are properly calculated. This will help ensure that Federal Pell grants are properly awarded to students who meet the eligibility requirements.
Views of Responsible Officials and Planned Corrective Actions:
The District believes this error was an isolated incident and the effect is minimal as we performed an extensive
review of all nine campuses’ Pell grant award disbursements for the term and found that this was the only
similar award. The District will monitor disbursements and will perform reconciliation on a monthly basis.
Personnel Responsible for Implementation: FA Office and the Central Financial Aid Unit.
Position of Responsible Personnel: FA Managers
Expected Date of Implementation: Already Implemented
Finding FA 2023-002: Special Tests and Provision: Return of Title IV Funds: Incorrect Calculation of Return of Title IV Funds, Untimely Notification of Grant Overpayment to Students and Secretary, Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal Date (Repeat Finding)
Federal Program Information
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster;
Federal Pell Grant Program
Federal Direct Student Loans
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P007A210456, P063P215260, P268K225260
P007A210676, P063P215262, P268K225262, 21-C01-740
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles City College (Repeat Finding)
East Los Angeles College (Repeat Finding)
Los Angeles Harbor College (Repeat Finding)
Los Angeles Mission College (Repeat Finding)
Los Angeles Pierce College (Repeat Finding)
Los Angeles Southwest College (Repeat Finding)
Los Angeles Trade Technical College (Repeat Finding)
Los Angeles Valley College (Repeat Finding)
West Los Angeles College (Repeat Finding)
Compliance Requirement: Special Tests and Provisions – Return of Title IV Funds
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations 668.22 (a)(1) through (a)(5):
When a recipient of Title IV grant or loan assistance withdraws from an institution during a payment period or period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV aid earned by the student as of the student’s withdrawal date. If the total amount of Title IV assistance earned by the student is less than the amount that was disbursed to the student or on his or her behalf as of the date of the institution’s determination that the student withdrew, the difference must be returned to the Title IV programs as outlined in this section and no additional disbursements may be made to the student for the payment period or period of enrollment. If the amount the student earned is greater than the amount disbursed, the difference between the amounts must be treated as a post-withdrawal disbursement.
Per the Uniform Guidance Compliance Supplement:
Withdrawal Date:
If an institution is required to take attendance, the withdrawal date is the last date of academic attendance, as determined by the institution from its attendance records. An institution is required to take attendance if:
a. The institution is required to take attendance for some or all of its students by an entity outside of the
institution (such as the institution’s accrediting agency or state agency);
b. The institution itself has a requirement that its instructors take attendance; or
c. The institution or an outside entity has a requirement that can only be met by taking attendance or a
comparable process, including, but not limited to, requiring that students in a program demonstrate
attendance in the classes of that program or a portion of that program (34 CFR 668.22(b)(3)).
Note: As provided in the Department’s Program Integrity Q&As for Return of Title IV Funds, the monitoring
of whether online students log into classes does not by itself result in an institution being an institution that
is required to take attendance for Title IV, HEA program purposes because monitoring logins alone is not
monitoring academic engagement (as defined under 34 CFR 600.2). However, an institution that collects
and maintains information about students’ online activities for the purpose of tracking academic
engagement is considered to be an institution that is required to take attendance for programs involving
such tracking if that tracking:
1. Involves monitoring student attendance in a synchronous class, lecture, recitation, or field or laboratory
activity, physically or online via a distance education platform, where there is an opportunity for
interaction between the instructor and students; or
2. Is used to administratively withdraw students or to enforce an institutional attendance policy.
If an institution is not required to take attendance, the withdrawal date is (1) the date, as determined by the
institution, that the student began the withdrawal process prescribed by the institution; (2) the date, as
determined by the institution, that the student otherwise provided official notification to the institution, in
writing or orally, of his or her intent to withdraw; (3) if the student ceases attendance without providing
official notification to the institution of his or her withdrawal, the midpoint of the payment period or, if
applicable, the period of enrollment; (4) if the institution determines that a student did not begin the
withdrawal process or otherwise notify the institution of the intent to withdraw due to illness, accident,
grievous personal loss or other circumstances beyond the student’s control, the date the institution
determines is related to that circumstance; (5) if a student does not return from an approved leave of
absence, the date that the institution determines the student began the leave of absence; or (6) if the
student takes an unapproved leave of absence, the date that the student began the leave of absence.
Notwithstanding the above, an institution that is not required to take attendance may use as the withdrawal
date, the last date of attendance at an academically related activity as documented by the institution (34
CFR668.22(c) and (l)).
Title IV funds may be expended only towards the education of the students who can be proven to have
been in attendance at the institution. In a distance education context, documenting that a student has
logged into an online distance education platform or system is not sufficient, by itself, to demonstrate
attendance by the student. To avoid returning all funds for a student that did not begin attendance, an
institution must be able to document “attendance at any class.” To qualify as a last date of attendance for
Return of Title IV purposes, an institution must demonstrate that a student participated in class or was
otherwise engaged in an academically related activity, such as by contributing to an online discussion or
initiating contact with a faculty member to ask a course-related question.
Timing of Return of Title IV Funds
Returns of Title IV funds are required to be deposited or transferred into the SFA account or electronic fund
transfers initiated to ED as soon as possible, but no later than 45 days after the date the institution
determines that the student withdrew. Returns by check are late if the check is issued more than 45 days
after the institution determined the student withdrew or the date on the canceled check shows the check
was endorsed more than 60 days after the date the institution determined that the student withdrew (34
CFR 668.173(b)).
An institution that is not required to take attendance must determine the withdrawal date for a student who
withdraws without providing notification to the institution no later than 30 days after the end of the earlier of
the (1) payment period or period of enrollment, (2) academic year in which the student withdrew, or
(3) educational program from which the student withdrew (34 CFR 668.22(j)). The institution must also
notify the recipient of Title IV loans returned (34 CFR 685.306(a)(2)).
Identified Condition:
See schedule of findings and questioned costs
Description
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
We noted 1 of 15 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out, or never began attendance that had an incorrect calculation of
percentage of completion for Spring 2023 based on the student’s actual number of days completed
during the enrollment period. The student was enrolled in a session module course, which is a program
that does not span the entire length of the payment period or period of enrollment. For this type of
course, the student’s “actively enrolled days” should have been used in the return of Title IV funds
calculation. This error resulted in an overstatement of the institutional return by $13 and an
overstatement of the student’s return by $21. The effect of the overstatement of the student’s return did
not result in a questioned cost due to grant protection.
Los Angeles Southwest College
We noted 6 of 20 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out or never began attendance for Fall 2022 that had had an incorrect
calculation of the percentage of completion based on the student’s number of days completed during
the enrollment period.
For 3 students, these errors resulted in:
• 1 student with an understatement of institutional return of $37 and an understatement of student
return of $287.
• 1 student with an understatement of institutional return of $11 and an understatement of student
return of $197.
• 1 student with an overstatement of institutional return of $10 and overstatement of student return of
$20. The effect of the above overstatement of the student return did not result in questioned costs
due to grant protection.
For the remaining 3 students, we noted these students were enrolled in a session module course,
which is a program that does not span the entire length of the payment period or period of enrollment.
For this type of course, the student’s “actively enrolled days” should have been used in the return of
Title IV funds calculation These errors resulted in:
• 1 student with an overstatement of institutional return of $30.
• 1 student with an overstatement of institutional return of $187.
• 1 student with an overstatement of institutional return of $21 and an overstatement of student
return of $9. The effect of the overstatement of the student return did not result in questioned costs
due to grant protection.
B. Untimely Notification of Grant Overpayment to the Secretary
We noted that 1 out of 15 students selected for compliance test work at East Los Angeles College that
owed an overpayment of $187 as a result of the student’s withdrawal was referred to the Secretary of
the Department of Education beyond the 30-day timeframe from the date of the institution’s
determination that the student withdrew and owed overpayments as a result of the student’s
withdrawal. The required notification was submitted to the National Student Loan Data System
(NSLDS) 260 days late.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The District has not yet implemented a formal process in place to monitor a student’s active
participation in an online class and engagement in academic activities related to a distance education
(DE) course in order to determine the reasonableness and accuracy of the student’s withdrawal date in
the system. Currently, the withdrawal date used in the calculation of return to Title IV funds is the actual
date the student initiates the withdrawal from the course in the system.
Cause and Effect:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The Financial Aid Technician who processed the Spring 2023 return to Title IV had an oversight on that
record during his review process. He had a family emergency during that period and had to leave in the
middle of his review process. As a result, he forgot to deduct the spring break period from the total
number of days for the enrollment period. This caused the calculation to be slightly off.
Los Angeles Southwest College
The person who was assigned the role of handling the return to Title IV program received limited
training before he assumed the duties of return to Title IV calculations while also having to maintain his
full load as a Financial Aid Technician. In addition to the limited training, there were changes as to how
the program was administered and modules were calculated. This is an arduous task for a seasoned
professional and a very challenging task for a novice at best. As with all newly assigned duties, given
more time he would have become an expert in handling this program with minimal to zero errors.
B. Untimely Notification of Grant Overpayment to the Secretary
Every two weeks a new batch of return to Title IV report is released to be processed. The urgency for
each report to be completed within a certain time frame created confusion for the NSLDS reporting due
date. The same Financial Aid Technician was in charge of completing each step of the process. East
Los Angeles College has the largest return to Title IV population. The demand to meet the deadline
process caused an oversight for the NSLDS report.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The calculation of return to Title IV funds is a complex process. The District has invested significant
resources to improve the accuracy of the process. The District is centralizing and automating the return
to Title IV process to minimize potential errors. However, there are still manual aspects to the process.
In particular, distance education courses (DE) require faculty to withdraw students from Canvas, the
online content delivery application, and Peoplesoft, the District’s student information system.
Peoplesoft is used to maintain student records and for administering aid. Incorrect information entered
into either system can lead to an incorrect return to Title IV calculation, resulting in institutional liability
and/or disciplinary action taken by the U.S. Department of Education.
Questioned Costs:
A. Incorrect Calculation of Return to Title IV Funds
See schedule of findings and questioned costs
The District has a known net understatement of the amount due from the student of $434 and a known
net overstatement of the amount due from the District of $213. The Projected total net understatement
of amounts due from both the student and District is $4,006 as follows:
See schedule of findings and questioned costs.
This is computed by dividing the errors found in samples per term (Summer term – net understatement
$0 and Fall/Spring terms – net understatement $221 over the total Pell awards disbursed in the sample
size per term (Summer term – $5,000 and Fall/Spring terms – $176,293) multiplied by the total Pell
awards disbursed for the identified colleges per term (Summer term – $67,595 and Fall/Spring terms –
$3,195,662). The computation is made on a per-term basis on a campus level and not on a
district-wide level.
B. Untimely Notification of Grant Overpayment to the Secretary
None.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
None.
Recommendation:
We recommend that the District evaluate and improve its existing process and control procedures related
to the return of Title IV funds, including notification and return due date requirements. This will help ensure
1) that the returns of Title IV funds are accurately calculated and 2) compliance with the notification and
return due date requirements, in accordance with the Uniform Guidance and the Code of Federal
Regulation.
We recommend that the District implement additional controls at the course instructor level to effectively
monitor student participation and engagement in academic activities related to DE courses in order for the
instructor to determine the reasonableness and accuracy of a student’s withdrawal date listed in the
system. This will help ensure that the withdrawal date used in the calculation of the return of Title IV funds
is accurate.
Views of Responsible Officials and Planned Corrective Actions:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The corrective action plan that will be put in place is to develop a chart with a predetermined number of
days based on the enrollment period. This will avoid the manual counting of the number of days for
each student. We also trained an additional staff member to help with the workload. This will ensure
that errors will be caught before the completion of the review process. Implementation will begin in
Spring 2024. Staff is currently being trained.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Spring 2024
Los Angeles Southwest College
The corrective action that we are implementing to remediate this finding is to move the campus return
to Title IV processing to the “R2T4 Unit” at the District Office.
Personnel Responsible for Implementation: Muniece R. Bruton
Position of Responsible Personnel: Financial Aid Manager
Expected Date of Implementation: December 1, 2023
B. Untimely Notification of Grant Overpayment to Students and Secretary
East Los Angeles College
The Corrective Action plan is being implemented by providing an additional staff member to assist with
the return to Title IV process along with helping with the validation to ensure calculation, notification,
and reporting to NSLDS will be completed on a timely basis. A reminder is set in the Financial Aid
Technician Outlook calendar to help remind them to help meet the deadline of the reporting
requirement.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Fall 2023
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
In the fall 2022 term, the District implemented training for all Distance Education (DE) faculty members
to reduce the risk of data entry errors. DE faculty receive follow-up notifications at the beginning of
every term). In addition, the District attempted to conduct random sampling to ensure the accuracy of
the data entry. However, the District did not have the authorization or resources to perform sampling
during the audit period. As a result, the corrective action plan (CAP) was only partially implemented
during fiscal year 2023. In fall 2023, the District secured the human resources and required
authorizations to conduct random sampling of the faculty data entry. The District’s Internal Audit
Department (IAD) is performing random sampling of all campuses. As of fall 2023, all corrective actions
have been fully implemented.
Personnel Responsible for Implementation: Steve Giorgi, Betsy Regalado, Keyna Crenshaw
Position of Responsible Personnel: Financial Aid Manager, Associate Vice Chancellor of Educational
Programs and Institutional Effectiveness, LACCD Supervising Auditor)
Expected Date of Implementation: Fall 2023
Finding FA 2023-002: Special Tests and Provision: Return of Title IV Funds: Incorrect Calculation of Return of Title IV Funds, Untimely Notification of Grant Overpayment to Students and Secretary, Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal Date (Repeat Finding)
Federal Program Information
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster;
Federal Pell Grant Program
Federal Direct Student Loans
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P007A210456, P063P215260, P268K225260
P007A210676, P063P215262, P268K225262, 21-C01-740
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles City College (Repeat Finding)
East Los Angeles College (Repeat Finding)
Los Angeles Harbor College (Repeat Finding)
Los Angeles Mission College (Repeat Finding)
Los Angeles Pierce College (Repeat Finding)
Los Angeles Southwest College (Repeat Finding)
Los Angeles Trade Technical College (Repeat Finding)
Los Angeles Valley College (Repeat Finding)
West Los Angeles College (Repeat Finding)
Compliance Requirement: Special Tests and Provisions – Return of Title IV Funds
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations 668.22 (a)(1) through (a)(5):
When a recipient of Title IV grant or loan assistance withdraws from an institution during a payment period or period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV aid earned by the student as of the student’s withdrawal date. If the total amount of Title IV assistance earned by the student is less than the amount that was disbursed to the student or on his or her behalf as of the date of the institution’s determination that the student withdrew, the difference must be returned to the Title IV programs as outlined in this section and no additional disbursements may be made to the student for the payment period or period of enrollment. If the amount the student earned is greater than the amount disbursed, the difference between the amounts must be treated as a post-withdrawal disbursement.
Per the Uniform Guidance Compliance Supplement:
Withdrawal Date:
If an institution is required to take attendance, the withdrawal date is the last date of academic attendance, as determined by the institution from its attendance records. An institution is required to take attendance if:
a. The institution is required to take attendance for some or all of its students by an entity outside of the
institution (such as the institution’s accrediting agency or state agency);
b. The institution itself has a requirement that its instructors take attendance; or
c. The institution or an outside entity has a requirement that can only be met by taking attendance or a
comparable process, including, but not limited to, requiring that students in a program demonstrate
attendance in the classes of that program or a portion of that program (34 CFR 668.22(b)(3)).
Note: As provided in the Department’s Program Integrity Q&As for Return of Title IV Funds, the monitoring
of whether online students log into classes does not by itself result in an institution being an institution that
is required to take attendance for Title IV, HEA program purposes because monitoring logins alone is not
monitoring academic engagement (as defined under 34 CFR 600.2). However, an institution that collects
and maintains information about students’ online activities for the purpose of tracking academic
engagement is considered to be an institution that is required to take attendance for programs involving
such tracking if that tracking:
1. Involves monitoring student attendance in a synchronous class, lecture, recitation, or field or laboratory
activity, physically or online via a distance education platform, where there is an opportunity for
interaction between the instructor and students; or
2. Is used to administratively withdraw students or to enforce an institutional attendance policy.
If an institution is not required to take attendance, the withdrawal date is (1) the date, as determined by the
institution, that the student began the withdrawal process prescribed by the institution; (2) the date, as
determined by the institution, that the student otherwise provided official notification to the institution, in
writing or orally, of his or her intent to withdraw; (3) if the student ceases attendance without providing
official notification to the institution of his or her withdrawal, the midpoint of the payment period or, if
applicable, the period of enrollment; (4) if the institution determines that a student did not begin the
withdrawal process or otherwise notify the institution of the intent to withdraw due to illness, accident,
grievous personal loss or other circumstances beyond the student’s control, the date the institution
determines is related to that circumstance; (5) if a student does not return from an approved leave of
absence, the date that the institution determines the student began the leave of absence; or (6) if the
student takes an unapproved leave of absence, the date that the student began the leave of absence.
Notwithstanding the above, an institution that is not required to take attendance may use as the withdrawal
date, the last date of attendance at an academically related activity as documented by the institution (34
CFR668.22(c) and (l)).
Title IV funds may be expended only towards the education of the students who can be proven to have
been in attendance at the institution. In a distance education context, documenting that a student has
logged into an online distance education platform or system is not sufficient, by itself, to demonstrate
attendance by the student. To avoid returning all funds for a student that did not begin attendance, an
institution must be able to document “attendance at any class.” To qualify as a last date of attendance for
Return of Title IV purposes, an institution must demonstrate that a student participated in class or was
otherwise engaged in an academically related activity, such as by contributing to an online discussion or
initiating contact with a faculty member to ask a course-related question.
Timing of Return of Title IV Funds
Returns of Title IV funds are required to be deposited or transferred into the SFA account or electronic fund
transfers initiated to ED as soon as possible, but no later than 45 days after the date the institution
determines that the student withdrew. Returns by check are late if the check is issued more than 45 days
after the institution determined the student withdrew or the date on the canceled check shows the check
was endorsed more than 60 days after the date the institution determined that the student withdrew (34
CFR 668.173(b)).
An institution that is not required to take attendance must determine the withdrawal date for a student who
withdraws without providing notification to the institution no later than 30 days after the end of the earlier of
the (1) payment period or period of enrollment, (2) academic year in which the student withdrew, or
(3) educational program from which the student withdrew (34 CFR 668.22(j)). The institution must also
notify the recipient of Title IV loans returned (34 CFR 685.306(a)(2)).
Identified Condition:
See schedule of findings and questioned costs
Description
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
We noted 1 of 15 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out, or never began attendance that had an incorrect calculation of
percentage of completion for Spring 2023 based on the student’s actual number of days completed
during the enrollment period. The student was enrolled in a session module course, which is a program
that does not span the entire length of the payment period or period of enrollment. For this type of
course, the student’s “actively enrolled days” should have been used in the return of Title IV funds
calculation. This error resulted in an overstatement of the institutional return by $13 and an
overstatement of the student’s return by $21. The effect of the overstatement of the student’s return did
not result in a questioned cost due to grant protection.
Los Angeles Southwest College
We noted 6 of 20 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out or never began attendance for Fall 2022 that had had an incorrect
calculation of the percentage of completion based on the student’s number of days completed during
the enrollment period.
For 3 students, these errors resulted in:
• 1 student with an understatement of institutional return of $37 and an understatement of student
return of $287.
• 1 student with an understatement of institutional return of $11 and an understatement of student
return of $197.
• 1 student with an overstatement of institutional return of $10 and overstatement of student return of
$20. The effect of the above overstatement of the student return did not result in questioned costs
due to grant protection.
For the remaining 3 students, we noted these students were enrolled in a session module course,
which is a program that does not span the entire length of the payment period or period of enrollment.
For this type of course, the student’s “actively enrolled days” should have been used in the return of
Title IV funds calculation These errors resulted in:
• 1 student with an overstatement of institutional return of $30.
• 1 student with an overstatement of institutional return of $187.
• 1 student with an overstatement of institutional return of $21 and an overstatement of student
return of $9. The effect of the overstatement of the student return did not result in questioned costs
due to grant protection.
B. Untimely Notification of Grant Overpayment to the Secretary
We noted that 1 out of 15 students selected for compliance test work at East Los Angeles College that
owed an overpayment of $187 as a result of the student’s withdrawal was referred to the Secretary of
the Department of Education beyond the 30-day timeframe from the date of the institution’s
determination that the student withdrew and owed overpayments as a result of the student’s
withdrawal. The required notification was submitted to the National Student Loan Data System
(NSLDS) 260 days late.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The District has not yet implemented a formal process in place to monitor a student’s active
participation in an online class and engagement in academic activities related to a distance education
(DE) course in order to determine the reasonableness and accuracy of the student’s withdrawal date in
the system. Currently, the withdrawal date used in the calculation of return to Title IV funds is the actual
date the student initiates the withdrawal from the course in the system.
Cause and Effect:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The Financial Aid Technician who processed the Spring 2023 return to Title IV had an oversight on that
record during his review process. He had a family emergency during that period and had to leave in the
middle of his review process. As a result, he forgot to deduct the spring break period from the total
number of days for the enrollment period. This caused the calculation to be slightly off.
Los Angeles Southwest College
The person who was assigned the role of handling the return to Title IV program received limited
training before he assumed the duties of return to Title IV calculations while also having to maintain his
full load as a Financial Aid Technician. In addition to the limited training, there were changes as to how
the program was administered and modules were calculated. This is an arduous task for a seasoned
professional and a very challenging task for a novice at best. As with all newly assigned duties, given
more time he would have become an expert in handling this program with minimal to zero errors.
B. Untimely Notification of Grant Overpayment to the Secretary
Every two weeks a new batch of return to Title IV report is released to be processed. The urgency for
each report to be completed within a certain time frame created confusion for the NSLDS reporting due
date. The same Financial Aid Technician was in charge of completing each step of the process. East
Los Angeles College has the largest return to Title IV population. The demand to meet the deadline
process caused an oversight for the NSLDS report.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The calculation of return to Title IV funds is a complex process. The District has invested significant
resources to improve the accuracy of the process. The District is centralizing and automating the return
to Title IV process to minimize potential errors. However, there are still manual aspects to the process.
In particular, distance education courses (DE) require faculty to withdraw students from Canvas, the
online content delivery application, and Peoplesoft, the District’s student information system.
Peoplesoft is used to maintain student records and for administering aid. Incorrect information entered
into either system can lead to an incorrect return to Title IV calculation, resulting in institutional liability
and/or disciplinary action taken by the U.S. Department of Education.
Questioned Costs:
A. Incorrect Calculation of Return to Title IV Funds
See schedule of findings and questioned costs
The District has a known net understatement of the amount due from the student of $434 and a known
net overstatement of the amount due from the District of $213. The Projected total net understatement
of amounts due from both the student and District is $4,006 as follows:
See schedule of findings and questioned costs.
This is computed by dividing the errors found in samples per term (Summer term – net understatement
$0 and Fall/Spring terms – net understatement $221 over the total Pell awards disbursed in the sample
size per term (Summer term – $5,000 and Fall/Spring terms – $176,293) multiplied by the total Pell
awards disbursed for the identified colleges per term (Summer term – $67,595 and Fall/Spring terms –
$3,195,662). The computation is made on a per-term basis on a campus level and not on a
district-wide level.
B. Untimely Notification of Grant Overpayment to the Secretary
None.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
None.
Recommendation:
We recommend that the District evaluate and improve its existing process and control procedures related
to the return of Title IV funds, including notification and return due date requirements. This will help ensure
1) that the returns of Title IV funds are accurately calculated and 2) compliance with the notification and
return due date requirements, in accordance with the Uniform Guidance and the Code of Federal
Regulation.
We recommend that the District implement additional controls at the course instructor level to effectively
monitor student participation and engagement in academic activities related to DE courses in order for the
instructor to determine the reasonableness and accuracy of a student’s withdrawal date listed in the
system. This will help ensure that the withdrawal date used in the calculation of the return of Title IV funds
is accurate.
Views of Responsible Officials and Planned Corrective Actions:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The corrective action plan that will be put in place is to develop a chart with a predetermined number of
days based on the enrollment period. This will avoid the manual counting of the number of days for
each student. We also trained an additional staff member to help with the workload. This will ensure
that errors will be caught before the completion of the review process. Implementation will begin in
Spring 2024. Staff is currently being trained.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Spring 2024
Los Angeles Southwest College
The corrective action that we are implementing to remediate this finding is to move the campus return
to Title IV processing to the “R2T4 Unit” at the District Office.
Personnel Responsible for Implementation: Muniece R. Bruton
Position of Responsible Personnel: Financial Aid Manager
Expected Date of Implementation: December 1, 2023
B. Untimely Notification of Grant Overpayment to Students and Secretary
East Los Angeles College
The Corrective Action plan is being implemented by providing an additional staff member to assist with
the return to Title IV process along with helping with the validation to ensure calculation, notification,
and reporting to NSLDS will be completed on a timely basis. A reminder is set in the Financial Aid
Technician Outlook calendar to help remind them to help meet the deadline of the reporting
requirement.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Fall 2023
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
In the fall 2022 term, the District implemented training for all Distance Education (DE) faculty members
to reduce the risk of data entry errors. DE faculty receive follow-up notifications at the beginning of
every term). In addition, the District attempted to conduct random sampling to ensure the accuracy of
the data entry. However, the District did not have the authorization or resources to perform sampling
during the audit period. As a result, the corrective action plan (CAP) was only partially implemented
during fiscal year 2023. In fall 2023, the District secured the human resources and required
authorizations to conduct random sampling of the faculty data entry. The District’s Internal Audit
Department (IAD) is performing random sampling of all campuses. As of fall 2023, all corrective actions
have been fully implemented.
Personnel Responsible for Implementation: Steve Giorgi, Betsy Regalado, Keyna Crenshaw
Position of Responsible Personnel: Financial Aid Manager, Associate Vice Chancellor of Educational
Programs and Institutional Effectiveness, LACCD Supervising Auditor)
Expected Date of Implementation: Fall 2023
Finding FA 2023-002: Special Tests and Provision: Return of Title IV Funds: Incorrect Calculation of Return of Title IV Funds, Untimely Notification of Grant Overpayment to Students and Secretary, Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal Date (Repeat Finding)
Federal Program Information
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster;
Federal Pell Grant Program
Federal Direct Student Loans
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P007A210456, P063P215260, P268K225260
P007A210676, P063P215262, P268K225262, 21-C01-740
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles City College (Repeat Finding)
East Los Angeles College (Repeat Finding)
Los Angeles Harbor College (Repeat Finding)
Los Angeles Mission College (Repeat Finding)
Los Angeles Pierce College (Repeat Finding)
Los Angeles Southwest College (Repeat Finding)
Los Angeles Trade Technical College (Repeat Finding)
Los Angeles Valley College (Repeat Finding)
West Los Angeles College (Repeat Finding)
Compliance Requirement: Special Tests and Provisions – Return of Title IV Funds
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations 668.22 (a)(1) through (a)(5):
When a recipient of Title IV grant or loan assistance withdraws from an institution during a payment period or period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV aid earned by the student as of the student’s withdrawal date. If the total amount of Title IV assistance earned by the student is less than the amount that was disbursed to the student or on his or her behalf as of the date of the institution’s determination that the student withdrew, the difference must be returned to the Title IV programs as outlined in this section and no additional disbursements may be made to the student for the payment period or period of enrollment. If the amount the student earned is greater than the amount disbursed, the difference between the amounts must be treated as a post-withdrawal disbursement.
Per the Uniform Guidance Compliance Supplement:
Withdrawal Date:
If an institution is required to take attendance, the withdrawal date is the last date of academic attendance, as determined by the institution from its attendance records. An institution is required to take attendance if:
a. The institution is required to take attendance for some or all of its students by an entity outside of the
institution (such as the institution’s accrediting agency or state agency);
b. The institution itself has a requirement that its instructors take attendance; or
c. The institution or an outside entity has a requirement that can only be met by taking attendance or a
comparable process, including, but not limited to, requiring that students in a program demonstrate
attendance in the classes of that program or a portion of that program (34 CFR 668.22(b)(3)).
Note: As provided in the Department’s Program Integrity Q&As for Return of Title IV Funds, the monitoring
of whether online students log into classes does not by itself result in an institution being an institution that
is required to take attendance for Title IV, HEA program purposes because monitoring logins alone is not
monitoring academic engagement (as defined under 34 CFR 600.2). However, an institution that collects
and maintains information about students’ online activities for the purpose of tracking academic
engagement is considered to be an institution that is required to take attendance for programs involving
such tracking if that tracking:
1. Involves monitoring student attendance in a synchronous class, lecture, recitation, or field or laboratory
activity, physically or online via a distance education platform, where there is an opportunity for
interaction between the instructor and students; or
2. Is used to administratively withdraw students or to enforce an institutional attendance policy.
If an institution is not required to take attendance, the withdrawal date is (1) the date, as determined by the
institution, that the student began the withdrawal process prescribed by the institution; (2) the date, as
determined by the institution, that the student otherwise provided official notification to the institution, in
writing or orally, of his or her intent to withdraw; (3) if the student ceases attendance without providing
official notification to the institution of his or her withdrawal, the midpoint of the payment period or, if
applicable, the period of enrollment; (4) if the institution determines that a student did not begin the
withdrawal process or otherwise notify the institution of the intent to withdraw due to illness, accident,
grievous personal loss or other circumstances beyond the student’s control, the date the institution
determines is related to that circumstance; (5) if a student does not return from an approved leave of
absence, the date that the institution determines the student began the leave of absence; or (6) if the
student takes an unapproved leave of absence, the date that the student began the leave of absence.
Notwithstanding the above, an institution that is not required to take attendance may use as the withdrawal
date, the last date of attendance at an academically related activity as documented by the institution (34
CFR668.22(c) and (l)).
Title IV funds may be expended only towards the education of the students who can be proven to have
been in attendance at the institution. In a distance education context, documenting that a student has
logged into an online distance education platform or system is not sufficient, by itself, to demonstrate
attendance by the student. To avoid returning all funds for a student that did not begin attendance, an
institution must be able to document “attendance at any class.” To qualify as a last date of attendance for
Return of Title IV purposes, an institution must demonstrate that a student participated in class or was
otherwise engaged in an academically related activity, such as by contributing to an online discussion or
initiating contact with a faculty member to ask a course-related question.
Timing of Return of Title IV Funds
Returns of Title IV funds are required to be deposited or transferred into the SFA account or electronic fund
transfers initiated to ED as soon as possible, but no later than 45 days after the date the institution
determines that the student withdrew. Returns by check are late if the check is issued more than 45 days
after the institution determined the student withdrew or the date on the canceled check shows the check
was endorsed more than 60 days after the date the institution determined that the student withdrew (34
CFR 668.173(b)).
An institution that is not required to take attendance must determine the withdrawal date for a student who
withdraws without providing notification to the institution no later than 30 days after the end of the earlier of
the (1) payment period or period of enrollment, (2) academic year in which the student withdrew, or
(3) educational program from which the student withdrew (34 CFR 668.22(j)). The institution must also
notify the recipient of Title IV loans returned (34 CFR 685.306(a)(2)).
Identified Condition:
See schedule of findings and questioned costs
Description
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
We noted 1 of 15 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out, or never began attendance that had an incorrect calculation of
percentage of completion for Spring 2023 based on the student’s actual number of days completed
during the enrollment period. The student was enrolled in a session module course, which is a program
that does not span the entire length of the payment period or period of enrollment. For this type of
course, the student’s “actively enrolled days” should have been used in the return of Title IV funds
calculation. This error resulted in an overstatement of the institutional return by $13 and an
overstatement of the student’s return by $21. The effect of the overstatement of the student’s return did
not result in a questioned cost due to grant protection.
Los Angeles Southwest College
We noted 6 of 20 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out or never began attendance for Fall 2022 that had had an incorrect
calculation of the percentage of completion based on the student’s number of days completed during
the enrollment period.
For 3 students, these errors resulted in:
• 1 student with an understatement of institutional return of $37 and an understatement of student
return of $287.
• 1 student with an understatement of institutional return of $11 and an understatement of student
return of $197.
• 1 student with an overstatement of institutional return of $10 and overstatement of student return of
$20. The effect of the above overstatement of the student return did not result in questioned costs
due to grant protection.
For the remaining 3 students, we noted these students were enrolled in a session module course,
which is a program that does not span the entire length of the payment period or period of enrollment.
For this type of course, the student’s “actively enrolled days” should have been used in the return of
Title IV funds calculation These errors resulted in:
• 1 student with an overstatement of institutional return of $30.
• 1 student with an overstatement of institutional return of $187.
• 1 student with an overstatement of institutional return of $21 and an overstatement of student
return of $9. The effect of the overstatement of the student return did not result in questioned costs
due to grant protection.
B. Untimely Notification of Grant Overpayment to the Secretary
We noted that 1 out of 15 students selected for compliance test work at East Los Angeles College that
owed an overpayment of $187 as a result of the student’s withdrawal was referred to the Secretary of
the Department of Education beyond the 30-day timeframe from the date of the institution’s
determination that the student withdrew and owed overpayments as a result of the student’s
withdrawal. The required notification was submitted to the National Student Loan Data System
(NSLDS) 260 days late.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The District has not yet implemented a formal process in place to monitor a student’s active
participation in an online class and engagement in academic activities related to a distance education
(DE) course in order to determine the reasonableness and accuracy of the student’s withdrawal date in
the system. Currently, the withdrawal date used in the calculation of return to Title IV funds is the actual
date the student initiates the withdrawal from the course in the system.
Cause and Effect:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The Financial Aid Technician who processed the Spring 2023 return to Title IV had an oversight on that
record during his review process. He had a family emergency during that period and had to leave in the
middle of his review process. As a result, he forgot to deduct the spring break period from the total
number of days for the enrollment period. This caused the calculation to be slightly off.
Los Angeles Southwest College
The person who was assigned the role of handling the return to Title IV program received limited
training before he assumed the duties of return to Title IV calculations while also having to maintain his
full load as a Financial Aid Technician. In addition to the limited training, there were changes as to how
the program was administered and modules were calculated. This is an arduous task for a seasoned
professional and a very challenging task for a novice at best. As with all newly assigned duties, given
more time he would have become an expert in handling this program with minimal to zero errors.
B. Untimely Notification of Grant Overpayment to the Secretary
Every two weeks a new batch of return to Title IV report is released to be processed. The urgency for
each report to be completed within a certain time frame created confusion for the NSLDS reporting due
date. The same Financial Aid Technician was in charge of completing each step of the process. East
Los Angeles College has the largest return to Title IV population. The demand to meet the deadline
process caused an oversight for the NSLDS report.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The calculation of return to Title IV funds is a complex process. The District has invested significant
resources to improve the accuracy of the process. The District is centralizing and automating the return
to Title IV process to minimize potential errors. However, there are still manual aspects to the process.
In particular, distance education courses (DE) require faculty to withdraw students from Canvas, the
online content delivery application, and Peoplesoft, the District’s student information system.
Peoplesoft is used to maintain student records and for administering aid. Incorrect information entered
into either system can lead to an incorrect return to Title IV calculation, resulting in institutional liability
and/or disciplinary action taken by the U.S. Department of Education.
Questioned Costs:
A. Incorrect Calculation of Return to Title IV Funds
See schedule of findings and questioned costs
The District has a known net understatement of the amount due from the student of $434 and a known
net overstatement of the amount due from the District of $213. The Projected total net understatement
of amounts due from both the student and District is $4,006 as follows:
See schedule of findings and questioned costs.
This is computed by dividing the errors found in samples per term (Summer term – net understatement
$0 and Fall/Spring terms – net understatement $221 over the total Pell awards disbursed in the sample
size per term (Summer term – $5,000 and Fall/Spring terms – $176,293) multiplied by the total Pell
awards disbursed for the identified colleges per term (Summer term – $67,595 and Fall/Spring terms –
$3,195,662). The computation is made on a per-term basis on a campus level and not on a
district-wide level.
B. Untimely Notification of Grant Overpayment to the Secretary
None.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
None.
Recommendation:
We recommend that the District evaluate and improve its existing process and control procedures related
to the return of Title IV funds, including notification and return due date requirements. This will help ensure
1) that the returns of Title IV funds are accurately calculated and 2) compliance with the notification and
return due date requirements, in accordance with the Uniform Guidance and the Code of Federal
Regulation.
We recommend that the District implement additional controls at the course instructor level to effectively
monitor student participation and engagement in academic activities related to DE courses in order for the
instructor to determine the reasonableness and accuracy of a student’s withdrawal date listed in the
system. This will help ensure that the withdrawal date used in the calculation of the return of Title IV funds
is accurate.
Views of Responsible Officials and Planned Corrective Actions:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The corrective action plan that will be put in place is to develop a chart with a predetermined number of
days based on the enrollment period. This will avoid the manual counting of the number of days for
each student. We also trained an additional staff member to help with the workload. This will ensure
that errors will be caught before the completion of the review process. Implementation will begin in
Spring 2024. Staff is currently being trained.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Spring 2024
Los Angeles Southwest College
The corrective action that we are implementing to remediate this finding is to move the campus return
to Title IV processing to the “R2T4 Unit” at the District Office.
Personnel Responsible for Implementation: Muniece R. Bruton
Position of Responsible Personnel: Financial Aid Manager
Expected Date of Implementation: December 1, 2023
B. Untimely Notification of Grant Overpayment to Students and Secretary
East Los Angeles College
The Corrective Action plan is being implemented by providing an additional staff member to assist with
the return to Title IV process along with helping with the validation to ensure calculation, notification,
and reporting to NSLDS will be completed on a timely basis. A reminder is set in the Financial Aid
Technician Outlook calendar to help remind them to help meet the deadline of the reporting
requirement.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Fall 2023
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
In the fall 2022 term, the District implemented training for all Distance Education (DE) faculty members
to reduce the risk of data entry errors. DE faculty receive follow-up notifications at the beginning of
every term). In addition, the District attempted to conduct random sampling to ensure the accuracy of
the data entry. However, the District did not have the authorization or resources to perform sampling
during the audit period. As a result, the corrective action plan (CAP) was only partially implemented
during fiscal year 2023. In fall 2023, the District secured the human resources and required
authorizations to conduct random sampling of the faculty data entry. The District’s Internal Audit
Department (IAD) is performing random sampling of all campuses. As of fall 2023, all corrective actions
have been fully implemented.
Personnel Responsible for Implementation: Steve Giorgi, Betsy Regalado, Keyna Crenshaw
Position of Responsible Personnel: Financial Aid Manager, Associate Vice Chancellor of Educational
Programs and Institutional Effectiveness, LACCD Supervising Auditor)
Expected Date of Implementation: Fall 2023
Finding FA 2023-002: Special Tests and Provision: Return of Title IV Funds: Incorrect Calculation of Return of Title IV Funds, Untimely Notification of Grant Overpayment to Students and Secretary, Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal Date (Repeat Finding)
Federal Program Information
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster;
Federal Pell Grant Program
Federal Direct Student Loans
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P007A210456, P063P215260, P268K225260
P007A210676, P063P215262, P268K225262, 21-C01-740
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles City College (Repeat Finding)
East Los Angeles College (Repeat Finding)
Los Angeles Harbor College (Repeat Finding)
Los Angeles Mission College (Repeat Finding)
Los Angeles Pierce College (Repeat Finding)
Los Angeles Southwest College (Repeat Finding)
Los Angeles Trade Technical College (Repeat Finding)
Los Angeles Valley College (Repeat Finding)
West Los Angeles College (Repeat Finding)
Compliance Requirement: Special Tests and Provisions – Return of Title IV Funds
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations 668.22 (a)(1) through (a)(5):
When a recipient of Title IV grant or loan assistance withdraws from an institution during a payment period or period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV aid earned by the student as of the student’s withdrawal date. If the total amount of Title IV assistance earned by the student is less than the amount that was disbursed to the student or on his or her behalf as of the date of the institution’s determination that the student withdrew, the difference must be returned to the Title IV programs as outlined in this section and no additional disbursements may be made to the student for the payment period or period of enrollment. If the amount the student earned is greater than the amount disbursed, the difference between the amounts must be treated as a post-withdrawal disbursement.
Per the Uniform Guidance Compliance Supplement:
Withdrawal Date:
If an institution is required to take attendance, the withdrawal date is the last date of academic attendance, as determined by the institution from its attendance records. An institution is required to take attendance if:
a. The institution is required to take attendance for some or all of its students by an entity outside of the
institution (such as the institution’s accrediting agency or state agency);
b. The institution itself has a requirement that its instructors take attendance; or
c. The institution or an outside entity has a requirement that can only be met by taking attendance or a
comparable process, including, but not limited to, requiring that students in a program demonstrate
attendance in the classes of that program or a portion of that program (34 CFR 668.22(b)(3)).
Note: As provided in the Department’s Program Integrity Q&As for Return of Title IV Funds, the monitoring
of whether online students log into classes does not by itself result in an institution being an institution that
is required to take attendance for Title IV, HEA program purposes because monitoring logins alone is not
monitoring academic engagement (as defined under 34 CFR 600.2). However, an institution that collects
and maintains information about students’ online activities for the purpose of tracking academic
engagement is considered to be an institution that is required to take attendance for programs involving
such tracking if that tracking:
1. Involves monitoring student attendance in a synchronous class, lecture, recitation, or field or laboratory
activity, physically or online via a distance education platform, where there is an opportunity for
interaction between the instructor and students; or
2. Is used to administratively withdraw students or to enforce an institutional attendance policy.
If an institution is not required to take attendance, the withdrawal date is (1) the date, as determined by the
institution, that the student began the withdrawal process prescribed by the institution; (2) the date, as
determined by the institution, that the student otherwise provided official notification to the institution, in
writing or orally, of his or her intent to withdraw; (3) if the student ceases attendance without providing
official notification to the institution of his or her withdrawal, the midpoint of the payment period or, if
applicable, the period of enrollment; (4) if the institution determines that a student did not begin the
withdrawal process or otherwise notify the institution of the intent to withdraw due to illness, accident,
grievous personal loss or other circumstances beyond the student’s control, the date the institution
determines is related to that circumstance; (5) if a student does not return from an approved leave of
absence, the date that the institution determines the student began the leave of absence; or (6) if the
student takes an unapproved leave of absence, the date that the student began the leave of absence.
Notwithstanding the above, an institution that is not required to take attendance may use as the withdrawal
date, the last date of attendance at an academically related activity as documented by the institution (34
CFR668.22(c) and (l)).
Title IV funds may be expended only towards the education of the students who can be proven to have
been in attendance at the institution. In a distance education context, documenting that a student has
logged into an online distance education platform or system is not sufficient, by itself, to demonstrate
attendance by the student. To avoid returning all funds for a student that did not begin attendance, an
institution must be able to document “attendance at any class.” To qualify as a last date of attendance for
Return of Title IV purposes, an institution must demonstrate that a student participated in class or was
otherwise engaged in an academically related activity, such as by contributing to an online discussion or
initiating contact with a faculty member to ask a course-related question.
Timing of Return of Title IV Funds
Returns of Title IV funds are required to be deposited or transferred into the SFA account or electronic fund
transfers initiated to ED as soon as possible, but no later than 45 days after the date the institution
determines that the student withdrew. Returns by check are late if the check is issued more than 45 days
after the institution determined the student withdrew or the date on the canceled check shows the check
was endorsed more than 60 days after the date the institution determined that the student withdrew (34
CFR 668.173(b)).
An institution that is not required to take attendance must determine the withdrawal date for a student who
withdraws without providing notification to the institution no later than 30 days after the end of the earlier of
the (1) payment period or period of enrollment, (2) academic year in which the student withdrew, or
(3) educational program from which the student withdrew (34 CFR 668.22(j)). The institution must also
notify the recipient of Title IV loans returned (34 CFR 685.306(a)(2)).
Identified Condition:
See schedule of findings and questioned costs
Description
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
We noted 1 of 15 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out, or never began attendance that had an incorrect calculation of
percentage of completion for Spring 2023 based on the student’s actual number of days completed
during the enrollment period. The student was enrolled in a session module course, which is a program
that does not span the entire length of the payment period or period of enrollment. For this type of
course, the student’s “actively enrolled days” should have been used in the return of Title IV funds
calculation. This error resulted in an overstatement of the institutional return by $13 and an
overstatement of the student’s return by $21. The effect of the overstatement of the student’s return did
not result in a questioned cost due to grant protection.
Los Angeles Southwest College
We noted 6 of 20 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out or never began attendance for Fall 2022 that had had an incorrect
calculation of the percentage of completion based on the student’s number of days completed during
the enrollment period.
For 3 students, these errors resulted in:
• 1 student with an understatement of institutional return of $37 and an understatement of student
return of $287.
• 1 student with an understatement of institutional return of $11 and an understatement of student
return of $197.
• 1 student with an overstatement of institutional return of $10 and overstatement of student return of
$20. The effect of the above overstatement of the student return did not result in questioned costs
due to grant protection.
For the remaining 3 students, we noted these students were enrolled in a session module course,
which is a program that does not span the entire length of the payment period or period of enrollment.
For this type of course, the student’s “actively enrolled days” should have been used in the return of
Title IV funds calculation These errors resulted in:
• 1 student with an overstatement of institutional return of $30.
• 1 student with an overstatement of institutional return of $187.
• 1 student with an overstatement of institutional return of $21 and an overstatement of student
return of $9. The effect of the overstatement of the student return did not result in questioned costs
due to grant protection.
B. Untimely Notification of Grant Overpayment to the Secretary
We noted that 1 out of 15 students selected for compliance test work at East Los Angeles College that
owed an overpayment of $187 as a result of the student’s withdrawal was referred to the Secretary of
the Department of Education beyond the 30-day timeframe from the date of the institution’s
determination that the student withdrew and owed overpayments as a result of the student’s
withdrawal. The required notification was submitted to the National Student Loan Data System
(NSLDS) 260 days late.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The District has not yet implemented a formal process in place to monitor a student’s active
participation in an online class and engagement in academic activities related to a distance education
(DE) course in order to determine the reasonableness and accuracy of the student’s withdrawal date in
the system. Currently, the withdrawal date used in the calculation of return to Title IV funds is the actual
date the student initiates the withdrawal from the course in the system.
Cause and Effect:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The Financial Aid Technician who processed the Spring 2023 return to Title IV had an oversight on that
record during his review process. He had a family emergency during that period and had to leave in the
middle of his review process. As a result, he forgot to deduct the spring break period from the total
number of days for the enrollment period. This caused the calculation to be slightly off.
Los Angeles Southwest College
The person who was assigned the role of handling the return to Title IV program received limited
training before he assumed the duties of return to Title IV calculations while also having to maintain his
full load as a Financial Aid Technician. In addition to the limited training, there were changes as to how
the program was administered and modules were calculated. This is an arduous task for a seasoned
professional and a very challenging task for a novice at best. As with all newly assigned duties, given
more time he would have become an expert in handling this program with minimal to zero errors.
B. Untimely Notification of Grant Overpayment to the Secretary
Every two weeks a new batch of return to Title IV report is released to be processed. The urgency for
each report to be completed within a certain time frame created confusion for the NSLDS reporting due
date. The same Financial Aid Technician was in charge of completing each step of the process. East
Los Angeles College has the largest return to Title IV population. The demand to meet the deadline
process caused an oversight for the NSLDS report.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The calculation of return to Title IV funds is a complex process. The District has invested significant
resources to improve the accuracy of the process. The District is centralizing and automating the return
to Title IV process to minimize potential errors. However, there are still manual aspects to the process.
In particular, distance education courses (DE) require faculty to withdraw students from Canvas, the
online content delivery application, and Peoplesoft, the District’s student information system.
Peoplesoft is used to maintain student records and for administering aid. Incorrect information entered
into either system can lead to an incorrect return to Title IV calculation, resulting in institutional liability
and/or disciplinary action taken by the U.S. Department of Education.
Questioned Costs:
A. Incorrect Calculation of Return to Title IV Funds
See schedule of findings and questioned costs
The District has a known net understatement of the amount due from the student of $434 and a known
net overstatement of the amount due from the District of $213. The Projected total net understatement
of amounts due from both the student and District is $4,006 as follows:
See schedule of findings and questioned costs.
This is computed by dividing the errors found in samples per term (Summer term – net understatement
$0 and Fall/Spring terms – net understatement $221 over the total Pell awards disbursed in the sample
size per term (Summer term – $5,000 and Fall/Spring terms – $176,293) multiplied by the total Pell
awards disbursed for the identified colleges per term (Summer term – $67,595 and Fall/Spring terms –
$3,195,662). The computation is made on a per-term basis on a campus level and not on a
district-wide level.
B. Untimely Notification of Grant Overpayment to the Secretary
None.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
None.
Recommendation:
We recommend that the District evaluate and improve its existing process and control procedures related
to the return of Title IV funds, including notification and return due date requirements. This will help ensure
1) that the returns of Title IV funds are accurately calculated and 2) compliance with the notification and
return due date requirements, in accordance with the Uniform Guidance and the Code of Federal
Regulation.
We recommend that the District implement additional controls at the course instructor level to effectively
monitor student participation and engagement in academic activities related to DE courses in order for the
instructor to determine the reasonableness and accuracy of a student’s withdrawal date listed in the
system. This will help ensure that the withdrawal date used in the calculation of the return of Title IV funds
is accurate.
Views of Responsible Officials and Planned Corrective Actions:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The corrective action plan that will be put in place is to develop a chart with a predetermined number of
days based on the enrollment period. This will avoid the manual counting of the number of days for
each student. We also trained an additional staff member to help with the workload. This will ensure
that errors will be caught before the completion of the review process. Implementation will begin in
Spring 2024. Staff is currently being trained.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Spring 2024
Los Angeles Southwest College
The corrective action that we are implementing to remediate this finding is to move the campus return
to Title IV processing to the “R2T4 Unit” at the District Office.
Personnel Responsible for Implementation: Muniece R. Bruton
Position of Responsible Personnel: Financial Aid Manager
Expected Date of Implementation: December 1, 2023
B. Untimely Notification of Grant Overpayment to Students and Secretary
East Los Angeles College
The Corrective Action plan is being implemented by providing an additional staff member to assist with
the return to Title IV process along with helping with the validation to ensure calculation, notification,
and reporting to NSLDS will be completed on a timely basis. A reminder is set in the Financial Aid
Technician Outlook calendar to help remind them to help meet the deadline of the reporting
requirement.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Fall 2023
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
In the fall 2022 term, the District implemented training for all Distance Education (DE) faculty members
to reduce the risk of data entry errors. DE faculty receive follow-up notifications at the beginning of
every term). In addition, the District attempted to conduct random sampling to ensure the accuracy of
the data entry. However, the District did not have the authorization or resources to perform sampling
during the audit period. As a result, the corrective action plan (CAP) was only partially implemented
during fiscal year 2023. In fall 2023, the District secured the human resources and required
authorizations to conduct random sampling of the faculty data entry. The District’s Internal Audit
Department (IAD) is performing random sampling of all campuses. As of fall 2023, all corrective actions
have been fully implemented.
Personnel Responsible for Implementation: Steve Giorgi, Betsy Regalado, Keyna Crenshaw
Position of Responsible Personnel: Financial Aid Manager, Associate Vice Chancellor of Educational
Programs and Institutional Effectiveness, LACCD Supervising Auditor)
Expected Date of Implementation: Fall 2023
Finding FA 2023-002: Special Tests and Provision: Return of Title IV Funds: Incorrect Calculation of Return of Title IV Funds, Untimely Notification of Grant Overpayment to Students and Secretary, Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal Date (Repeat Finding)
Federal Program Information
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster;
Federal Pell Grant Program
Federal Direct Student Loans
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P007A210456, P063P215260, P268K225260
P007A210676, P063P215262, P268K225262, 21-C01-740
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles City College (Repeat Finding)
East Los Angeles College (Repeat Finding)
Los Angeles Harbor College (Repeat Finding)
Los Angeles Mission College (Repeat Finding)
Los Angeles Pierce College (Repeat Finding)
Los Angeles Southwest College (Repeat Finding)
Los Angeles Trade Technical College (Repeat Finding)
Los Angeles Valley College (Repeat Finding)
West Los Angeles College (Repeat Finding)
Compliance Requirement: Special Tests and Provisions – Return of Title IV Funds
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations 668.22 (a)(1) through (a)(5):
When a recipient of Title IV grant or loan assistance withdraws from an institution during a payment period or period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV aid earned by the student as of the student’s withdrawal date. If the total amount of Title IV assistance earned by the student is less than the amount that was disbursed to the student or on his or her behalf as of the date of the institution’s determination that the student withdrew, the difference must be returned to the Title IV programs as outlined in this section and no additional disbursements may be made to the student for the payment period or period of enrollment. If the amount the student earned is greater than the amount disbursed, the difference between the amounts must be treated as a post-withdrawal disbursement.
Per the Uniform Guidance Compliance Supplement:
Withdrawal Date:
If an institution is required to take attendance, the withdrawal date is the last date of academic attendance, as determined by the institution from its attendance records. An institution is required to take attendance if:
a. The institution is required to take attendance for some or all of its students by an entity outside of the
institution (such as the institution’s accrediting agency or state agency);
b. The institution itself has a requirement that its instructors take attendance; or
c. The institution or an outside entity has a requirement that can only be met by taking attendance or a
comparable process, including, but not limited to, requiring that students in a program demonstrate
attendance in the classes of that program or a portion of that program (34 CFR 668.22(b)(3)).
Note: As provided in the Department’s Program Integrity Q&As for Return of Title IV Funds, the monitoring
of whether online students log into classes does not by itself result in an institution being an institution that
is required to take attendance for Title IV, HEA program purposes because monitoring logins alone is not
monitoring academic engagement (as defined under 34 CFR 600.2). However, an institution that collects
and maintains information about students’ online activities for the purpose of tracking academic
engagement is considered to be an institution that is required to take attendance for programs involving
such tracking if that tracking:
1. Involves monitoring student attendance in a synchronous class, lecture, recitation, or field or laboratory
activity, physically or online via a distance education platform, where there is an opportunity for
interaction between the instructor and students; or
2. Is used to administratively withdraw students or to enforce an institutional attendance policy.
If an institution is not required to take attendance, the withdrawal date is (1) the date, as determined by the
institution, that the student began the withdrawal process prescribed by the institution; (2) the date, as
determined by the institution, that the student otherwise provided official notification to the institution, in
writing or orally, of his or her intent to withdraw; (3) if the student ceases attendance without providing
official notification to the institution of his or her withdrawal, the midpoint of the payment period or, if
applicable, the period of enrollment; (4) if the institution determines that a student did not begin the
withdrawal process or otherwise notify the institution of the intent to withdraw due to illness, accident,
grievous personal loss or other circumstances beyond the student’s control, the date the institution
determines is related to that circumstance; (5) if a student does not return from an approved leave of
absence, the date that the institution determines the student began the leave of absence; or (6) if the
student takes an unapproved leave of absence, the date that the student began the leave of absence.
Notwithstanding the above, an institution that is not required to take attendance may use as the withdrawal
date, the last date of attendance at an academically related activity as documented by the institution (34
CFR668.22(c) and (l)).
Title IV funds may be expended only towards the education of the students who can be proven to have
been in attendance at the institution. In a distance education context, documenting that a student has
logged into an online distance education platform or system is not sufficient, by itself, to demonstrate
attendance by the student. To avoid returning all funds for a student that did not begin attendance, an
institution must be able to document “attendance at any class.” To qualify as a last date of attendance for
Return of Title IV purposes, an institution must demonstrate that a student participated in class or was
otherwise engaged in an academically related activity, such as by contributing to an online discussion or
initiating contact with a faculty member to ask a course-related question.
Timing of Return of Title IV Funds
Returns of Title IV funds are required to be deposited or transferred into the SFA account or electronic fund
transfers initiated to ED as soon as possible, but no later than 45 days after the date the institution
determines that the student withdrew. Returns by check are late if the check is issued more than 45 days
after the institution determined the student withdrew or the date on the canceled check shows the check
was endorsed more than 60 days after the date the institution determined that the student withdrew (34
CFR 668.173(b)).
An institution that is not required to take attendance must determine the withdrawal date for a student who
withdraws without providing notification to the institution no later than 30 days after the end of the earlier of
the (1) payment period or period of enrollment, (2) academic year in which the student withdrew, or
(3) educational program from which the student withdrew (34 CFR 668.22(j)). The institution must also
notify the recipient of Title IV loans returned (34 CFR 685.306(a)(2)).
Identified Condition:
See schedule of findings and questioned costs
Description
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
We noted 1 of 15 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out, or never began attendance that had an incorrect calculation of
percentage of completion for Spring 2023 based on the student’s actual number of days completed
during the enrollment period. The student was enrolled in a session module course, which is a program
that does not span the entire length of the payment period or period of enrollment. For this type of
course, the student’s “actively enrolled days” should have been used in the return of Title IV funds
calculation. This error resulted in an overstatement of the institutional return by $13 and an
overstatement of the student’s return by $21. The effect of the overstatement of the student’s return did
not result in a questioned cost due to grant protection.
Los Angeles Southwest College
We noted 6 of 20 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out or never began attendance for Fall 2022 that had had an incorrect
calculation of the percentage of completion based on the student’s number of days completed during
the enrollment period.
For 3 students, these errors resulted in:
• 1 student with an understatement of institutional return of $37 and an understatement of student
return of $287.
• 1 student with an understatement of institutional return of $11 and an understatement of student
return of $197.
• 1 student with an overstatement of institutional return of $10 and overstatement of student return of
$20. The effect of the above overstatement of the student return did not result in questioned costs
due to grant protection.
For the remaining 3 students, we noted these students were enrolled in a session module course,
which is a program that does not span the entire length of the payment period or period of enrollment.
For this type of course, the student’s “actively enrolled days” should have been used in the return of
Title IV funds calculation These errors resulted in:
• 1 student with an overstatement of institutional return of $30.
• 1 student with an overstatement of institutional return of $187.
• 1 student with an overstatement of institutional return of $21 and an overstatement of student
return of $9. The effect of the overstatement of the student return did not result in questioned costs
due to grant protection.
B. Untimely Notification of Grant Overpayment to the Secretary
We noted that 1 out of 15 students selected for compliance test work at East Los Angeles College that
owed an overpayment of $187 as a result of the student’s withdrawal was referred to the Secretary of
the Department of Education beyond the 30-day timeframe from the date of the institution’s
determination that the student withdrew and owed overpayments as a result of the student’s
withdrawal. The required notification was submitted to the National Student Loan Data System
(NSLDS) 260 days late.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The District has not yet implemented a formal process in place to monitor a student’s active
participation in an online class and engagement in academic activities related to a distance education
(DE) course in order to determine the reasonableness and accuracy of the student’s withdrawal date in
the system. Currently, the withdrawal date used in the calculation of return to Title IV funds is the actual
date the student initiates the withdrawal from the course in the system.
Cause and Effect:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The Financial Aid Technician who processed the Spring 2023 return to Title IV had an oversight on that
record during his review process. He had a family emergency during that period and had to leave in the
middle of his review process. As a result, he forgot to deduct the spring break period from the total
number of days for the enrollment period. This caused the calculation to be slightly off.
Los Angeles Southwest College
The person who was assigned the role of handling the return to Title IV program received limited
training before he assumed the duties of return to Title IV calculations while also having to maintain his
full load as a Financial Aid Technician. In addition to the limited training, there were changes as to how
the program was administered and modules were calculated. This is an arduous task for a seasoned
professional and a very challenging task for a novice at best. As with all newly assigned duties, given
more time he would have become an expert in handling this program with minimal to zero errors.
B. Untimely Notification of Grant Overpayment to the Secretary
Every two weeks a new batch of return to Title IV report is released to be processed. The urgency for
each report to be completed within a certain time frame created confusion for the NSLDS reporting due
date. The same Financial Aid Technician was in charge of completing each step of the process. East
Los Angeles College has the largest return to Title IV population. The demand to meet the deadline
process caused an oversight for the NSLDS report.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The calculation of return to Title IV funds is a complex process. The District has invested significant
resources to improve the accuracy of the process. The District is centralizing and automating the return
to Title IV process to minimize potential errors. However, there are still manual aspects to the process.
In particular, distance education courses (DE) require faculty to withdraw students from Canvas, the
online content delivery application, and Peoplesoft, the District’s student information system.
Peoplesoft is used to maintain student records and for administering aid. Incorrect information entered
into either system can lead to an incorrect return to Title IV calculation, resulting in institutional liability
and/or disciplinary action taken by the U.S. Department of Education.
Questioned Costs:
A. Incorrect Calculation of Return to Title IV Funds
See schedule of findings and questioned costs
The District has a known net understatement of the amount due from the student of $434 and a known
net overstatement of the amount due from the District of $213. The Projected total net understatement
of amounts due from both the student and District is $4,006 as follows:
See schedule of findings and questioned costs.
This is computed by dividing the errors found in samples per term (Summer term – net understatement
$0 and Fall/Spring terms – net understatement $221 over the total Pell awards disbursed in the sample
size per term (Summer term – $5,000 and Fall/Spring terms – $176,293) multiplied by the total Pell
awards disbursed for the identified colleges per term (Summer term – $67,595 and Fall/Spring terms –
$3,195,662). The computation is made on a per-term basis on a campus level and not on a
district-wide level.
B. Untimely Notification of Grant Overpayment to the Secretary
None.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
None.
Recommendation:
We recommend that the District evaluate and improve its existing process and control procedures related
to the return of Title IV funds, including notification and return due date requirements. This will help ensure
1) that the returns of Title IV funds are accurately calculated and 2) compliance with the notification and
return due date requirements, in accordance with the Uniform Guidance and the Code of Federal
Regulation.
We recommend that the District implement additional controls at the course instructor level to effectively
monitor student participation and engagement in academic activities related to DE courses in order for the
instructor to determine the reasonableness and accuracy of a student’s withdrawal date listed in the
system. This will help ensure that the withdrawal date used in the calculation of the return of Title IV funds
is accurate.
Views of Responsible Officials and Planned Corrective Actions:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The corrective action plan that will be put in place is to develop a chart with a predetermined number of
days based on the enrollment period. This will avoid the manual counting of the number of days for
each student. We also trained an additional staff member to help with the workload. This will ensure
that errors will be caught before the completion of the review process. Implementation will begin in
Spring 2024. Staff is currently being trained.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Spring 2024
Los Angeles Southwest College
The corrective action that we are implementing to remediate this finding is to move the campus return
to Title IV processing to the “R2T4 Unit” at the District Office.
Personnel Responsible for Implementation: Muniece R. Bruton
Position of Responsible Personnel: Financial Aid Manager
Expected Date of Implementation: December 1, 2023
B. Untimely Notification of Grant Overpayment to Students and Secretary
East Los Angeles College
The Corrective Action plan is being implemented by providing an additional staff member to assist with
the return to Title IV process along with helping with the validation to ensure calculation, notification,
and reporting to NSLDS will be completed on a timely basis. A reminder is set in the Financial Aid
Technician Outlook calendar to help remind them to help meet the deadline of the reporting
requirement.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Fall 2023
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
In the fall 2022 term, the District implemented training for all Distance Education (DE) faculty members
to reduce the risk of data entry errors. DE faculty receive follow-up notifications at the beginning of
every term). In addition, the District attempted to conduct random sampling to ensure the accuracy of
the data entry. However, the District did not have the authorization or resources to perform sampling
during the audit period. As a result, the corrective action plan (CAP) was only partially implemented
during fiscal year 2023. In fall 2023, the District secured the human resources and required
authorizations to conduct random sampling of the faculty data entry. The District’s Internal Audit
Department (IAD) is performing random sampling of all campuses. As of fall 2023, all corrective actions
have been fully implemented.
Personnel Responsible for Implementation: Steve Giorgi, Betsy Regalado, Keyna Crenshaw
Position of Responsible Personnel: Financial Aid Manager, Associate Vice Chancellor of Educational
Programs and Institutional Effectiveness, LACCD Supervising Auditor)
Expected Date of Implementation: Fall 2023
Finding FA 2023-002: Special Tests and Provision: Return of Title IV Funds: Incorrect Calculation of Return of Title IV Funds, Untimely Notification of Grant Overpayment to Students and Secretary, Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal Date (Repeat Finding)
Federal Program Information
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster;
Federal Pell Grant Program
Federal Direct Student Loans
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P007A210456, P063P215260, P268K225260
P007A210676, P063P215262, P268K225262, 21-C01-740
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles City College (Repeat Finding)
East Los Angeles College (Repeat Finding)
Los Angeles Harbor College (Repeat Finding)
Los Angeles Mission College (Repeat Finding)
Los Angeles Pierce College (Repeat Finding)
Los Angeles Southwest College (Repeat Finding)
Los Angeles Trade Technical College (Repeat Finding)
Los Angeles Valley College (Repeat Finding)
West Los Angeles College (Repeat Finding)
Compliance Requirement: Special Tests and Provisions – Return of Title IV Funds
Criteria or Specific Requirement:
Per 34 Code of Federal Regulations 668.22 (a)(1) through (a)(5):
When a recipient of Title IV grant or loan assistance withdraws from an institution during a payment period or period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV aid earned by the student as of the student’s withdrawal date. If the total amount of Title IV assistance earned by the student is less than the amount that was disbursed to the student or on his or her behalf as of the date of the institution’s determination that the student withdrew, the difference must be returned to the Title IV programs as outlined in this section and no additional disbursements may be made to the student for the payment period or period of enrollment. If the amount the student earned is greater than the amount disbursed, the difference between the amounts must be treated as a post-withdrawal disbursement.
Per the Uniform Guidance Compliance Supplement:
Withdrawal Date:
If an institution is required to take attendance, the withdrawal date is the last date of academic attendance, as determined by the institution from its attendance records. An institution is required to take attendance if:
a. The institution is required to take attendance for some or all of its students by an entity outside of the
institution (such as the institution’s accrediting agency or state agency);
b. The institution itself has a requirement that its instructors take attendance; or
c. The institution or an outside entity has a requirement that can only be met by taking attendance or a
comparable process, including, but not limited to, requiring that students in a program demonstrate
attendance in the classes of that program or a portion of that program (34 CFR 668.22(b)(3)).
Note: As provided in the Department’s Program Integrity Q&As for Return of Title IV Funds, the monitoring
of whether online students log into classes does not by itself result in an institution being an institution that
is required to take attendance for Title IV, HEA program purposes because monitoring logins alone is not
monitoring academic engagement (as defined under 34 CFR 600.2). However, an institution that collects
and maintains information about students’ online activities for the purpose of tracking academic
engagement is considered to be an institution that is required to take attendance for programs involving
such tracking if that tracking:
1. Involves monitoring student attendance in a synchronous class, lecture, recitation, or field or laboratory
activity, physically or online via a distance education platform, where there is an opportunity for
interaction between the instructor and students; or
2. Is used to administratively withdraw students or to enforce an institutional attendance policy.
If an institution is not required to take attendance, the withdrawal date is (1) the date, as determined by the
institution, that the student began the withdrawal process prescribed by the institution; (2) the date, as
determined by the institution, that the student otherwise provided official notification to the institution, in
writing or orally, of his or her intent to withdraw; (3) if the student ceases attendance without providing
official notification to the institution of his or her withdrawal, the midpoint of the payment period or, if
applicable, the period of enrollment; (4) if the institution determines that a student did not begin the
withdrawal process or otherwise notify the institution of the intent to withdraw due to illness, accident,
grievous personal loss or other circumstances beyond the student’s control, the date the institution
determines is related to that circumstance; (5) if a student does not return from an approved leave of
absence, the date that the institution determines the student began the leave of absence; or (6) if the
student takes an unapproved leave of absence, the date that the student began the leave of absence.
Notwithstanding the above, an institution that is not required to take attendance may use as the withdrawal
date, the last date of attendance at an academically related activity as documented by the institution (34
CFR668.22(c) and (l)).
Title IV funds may be expended only towards the education of the students who can be proven to have
been in attendance at the institution. In a distance education context, documenting that a student has
logged into an online distance education platform or system is not sufficient, by itself, to demonstrate
attendance by the student. To avoid returning all funds for a student that did not begin attendance, an
institution must be able to document “attendance at any class.” To qualify as a last date of attendance for
Return of Title IV purposes, an institution must demonstrate that a student participated in class or was
otherwise engaged in an academically related activity, such as by contributing to an online discussion or
initiating contact with a faculty member to ask a course-related question.
Timing of Return of Title IV Funds
Returns of Title IV funds are required to be deposited or transferred into the SFA account or electronic fund
transfers initiated to ED as soon as possible, but no later than 45 days after the date the institution
determines that the student withdrew. Returns by check are late if the check is issued more than 45 days
after the institution determined the student withdrew or the date on the canceled check shows the check
was endorsed more than 60 days after the date the institution determined that the student withdrew (34
CFR 668.173(b)).
An institution that is not required to take attendance must determine the withdrawal date for a student who
withdraws without providing notification to the institution no later than 30 days after the end of the earlier of
the (1) payment period or period of enrollment, (2) academic year in which the student withdrew, or
(3) educational program from which the student withdrew (34 CFR 668.22(j)). The institution must also
notify the recipient of Title IV loans returned (34 CFR 685.306(a)(2)).
Identified Condition:
See schedule of findings and questioned costs
Description
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
We noted 1 of 15 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out, or never began attendance that had an incorrect calculation of
percentage of completion for Spring 2023 based on the student’s actual number of days completed
during the enrollment period. The student was enrolled in a session module course, which is a program
that does not span the entire length of the payment period or period of enrollment. For this type of
course, the student’s “actively enrolled days” should have been used in the return of Title IV funds
calculation. This error resulted in an overstatement of the institutional return by $13 and an
overstatement of the student’s return by $21. The effect of the overstatement of the student’s return did
not result in a questioned cost due to grant protection.
Los Angeles Southwest College
We noted 6 of 20 students selected for return of Title IV funds test work from the population of students
who had withdrawn, dropped out or never began attendance for Fall 2022 that had had an incorrect
calculation of the percentage of completion based on the student’s number of days completed during
the enrollment period.
For 3 students, these errors resulted in:
• 1 student with an understatement of institutional return of $37 and an understatement of student
return of $287.
• 1 student with an understatement of institutional return of $11 and an understatement of student
return of $197.
• 1 student with an overstatement of institutional return of $10 and overstatement of student return of
$20. The effect of the above overstatement of the student return did not result in questioned costs
due to grant protection.
For the remaining 3 students, we noted these students were enrolled in a session module course,
which is a program that does not span the entire length of the payment period or period of enrollment.
For this type of course, the student’s “actively enrolled days” should have been used in the return of
Title IV funds calculation These errors resulted in:
• 1 student with an overstatement of institutional return of $30.
• 1 student with an overstatement of institutional return of $187.
• 1 student with an overstatement of institutional return of $21 and an overstatement of student
return of $9. The effect of the overstatement of the student return did not result in questioned costs
due to grant protection.
B. Untimely Notification of Grant Overpayment to the Secretary
We noted that 1 out of 15 students selected for compliance test work at East Los Angeles College that
owed an overpayment of $187 as a result of the student’s withdrawal was referred to the Secretary of
the Department of Education beyond the 30-day timeframe from the date of the institution’s
determination that the student withdrew and owed overpayments as a result of the student’s
withdrawal. The required notification was submitted to the National Student Loan Data System
(NSLDS) 260 days late.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The District has not yet implemented a formal process in place to monitor a student’s active
participation in an online class and engagement in academic activities related to a distance education
(DE) course in order to determine the reasonableness and accuracy of the student’s withdrawal date in
the system. Currently, the withdrawal date used in the calculation of return to Title IV funds is the actual
date the student initiates the withdrawal from the course in the system.
Cause and Effect:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The Financial Aid Technician who processed the Spring 2023 return to Title IV had an oversight on that
record during his review process. He had a family emergency during that period and had to leave in the
middle of his review process. As a result, he forgot to deduct the spring break period from the total
number of days for the enrollment period. This caused the calculation to be slightly off.
Los Angeles Southwest College
The person who was assigned the role of handling the return to Title IV program received limited
training before he assumed the duties of return to Title IV calculations while also having to maintain his
full load as a Financial Aid Technician. In addition to the limited training, there were changes as to how
the program was administered and modules were calculated. This is an arduous task for a seasoned
professional and a very challenging task for a novice at best. As with all newly assigned duties, given
more time he would have become an expert in handling this program with minimal to zero errors.
B. Untimely Notification of Grant Overpayment to the Secretary
Every two weeks a new batch of return to Title IV report is released to be processed. The urgency for
each report to be completed within a certain time frame created confusion for the NSLDS reporting due
date. The same Financial Aid Technician was in charge of completing each step of the process. East
Los Angeles College has the largest return to Title IV population. The demand to meet the deadline
process caused an oversight for the NSLDS report.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
The calculation of return to Title IV funds is a complex process. The District has invested significant
resources to improve the accuracy of the process. The District is centralizing and automating the return
to Title IV process to minimize potential errors. However, there are still manual aspects to the process.
In particular, distance education courses (DE) require faculty to withdraw students from Canvas, the
online content delivery application, and Peoplesoft, the District’s student information system.
Peoplesoft is used to maintain student records and for administering aid. Incorrect information entered
into either system can lead to an incorrect return to Title IV calculation, resulting in institutional liability
and/or disciplinary action taken by the U.S. Department of Education.
Questioned Costs:
A. Incorrect Calculation of Return to Title IV Funds
See schedule of findings and questioned costs
The District has a known net understatement of the amount due from the student of $434 and a known
net overstatement of the amount due from the District of $213. The Projected total net understatement
of amounts due from both the student and District is $4,006 as follows:
See schedule of findings and questioned costs.
This is computed by dividing the errors found in samples per term (Summer term – net understatement
$0 and Fall/Spring terms – net understatement $221 over the total Pell awards disbursed in the sample
size per term (Summer term – $5,000 and Fall/Spring terms – $176,293) multiplied by the total Pell
awards disbursed for the identified colleges per term (Summer term – $67,595 and Fall/Spring terms –
$3,195,662). The computation is made on a per-term basis on a campus level and not on a
district-wide level.
B. Untimely Notification of Grant Overpayment to the Secretary
None.
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
None.
Recommendation:
We recommend that the District evaluate and improve its existing process and control procedures related
to the return of Title IV funds, including notification and return due date requirements. This will help ensure
1) that the returns of Title IV funds are accurately calculated and 2) compliance with the notification and
return due date requirements, in accordance with the Uniform Guidance and the Code of Federal
Regulation.
We recommend that the District implement additional controls at the course instructor level to effectively
monitor student participation and engagement in academic activities related to DE courses in order for the
instructor to determine the reasonableness and accuracy of a student’s withdrawal date listed in the
system. This will help ensure that the withdrawal date used in the calculation of the return of Title IV funds
is accurate.
Views of Responsible Officials and Planned Corrective Actions:
A. Incorrect Calculation of Return to Title IV Funds
East Los Angeles College
The corrective action plan that will be put in place is to develop a chart with a predetermined number of
days based on the enrollment period. This will avoid the manual counting of the number of days for
each student. We also trained an additional staff member to help with the workload. This will ensure
that errors will be caught before the completion of the review process. Implementation will begin in
Spring 2024. Staff is currently being trained.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Spring 2024
Los Angeles Southwest College
The corrective action that we are implementing to remediate this finding is to move the campus return
to Title IV processing to the “R2T4 Unit” at the District Office.
Personnel Responsible for Implementation: Muniece R. Bruton
Position of Responsible Personnel: Financial Aid Manager
Expected Date of Implementation: December 1, 2023
B. Untimely Notification of Grant Overpayment to Students and Secretary
East Los Angeles College
The Corrective Action plan is being implemented by providing an additional staff member to assist with
the return to Title IV process along with helping with the validation to ensure calculation, notification,
and reporting to NSLDS will be completed on a timely basis. A reminder is set in the Financial Aid
Technician Outlook calendar to help remind them to help meet the deadline of the reporting
requirement.
Personnel Responsible for Implementation: Gavino Herrera
Position of Responsible Personnel: Financial Aid Supervisor
Expected Date of Implementation: Fall 2023
C. Distance Education Courses – Lack of Formal Process to Determine Accuracy of Student Withdrawal
Date
In the fall 2022 term, the District implemented training for all Distance Education (DE) faculty members
to reduce the risk of data entry errors. DE faculty receive follow-up notifications at the beginning of
every term). In addition, the District attempted to conduct random sampling to ensure the accuracy of
the data entry. However, the District did not have the authorization or resources to perform sampling
during the audit period. As a result, the corrective action plan (CAP) was only partially implemented
during fiscal year 2023. In fall 2023, the District secured the human resources and required
authorizations to conduct random sampling of the faculty data entry. The District’s Internal Audit
Department (IAD) is performing random sampling of all campuses. As of fall 2023, all corrective actions
have been fully implemented.
Personnel Responsible for Implementation: Steve Giorgi, Betsy Regalado, Keyna Crenshaw
Position of Responsible Personnel: Financial Aid Manager, Associate Vice Chancellor of Educational
Programs and Institutional Effectiveness, LACCD Supervising Auditor)
Expected Date of Implementation: Fall 2023
Finding FA 2023‑03: Special Tests and Provision: Gramm Leach Bliley Act ‑ Student Information
Security – Formally Establish and Document Risk Acceptance Process, Perform Regular Backup
Restoration Tests, Perform Timely Access Revocation and Regular Access Reviews, Perform
Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards, Maintain and Review Logs
of Users' Activity for both SAP and PS SIS, Implement Data-at-Rest Encryption for Devices Storing
Customer Data, Enforce Strict Compliance on Controls over SAP Direct to Production Changes (Repeat
Finding)
Federal Program Information
Assistance Listing Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: Various
Federal Award Year: July 1, 2022, to June 30, 2023
Compliance Requirement: Special Tests and Provisions – Gramm Leach Bliley Act –
Student Information Security
Criteria or Specific Requirement:
The Gramm-Leach-Bliley Act (Pub. L. No. 106-102) (GLBA) requires financial institutions to explain their
information-sharing practices to their customers and to safeguard sensitive data (16 CFR 314). The Federal
Trade Commission considers Title IV-eligible institutions that participate in Title IV Educational Assistance
Programs as “financial institutions” and subject to the Gramm-Leach-Bliley Act because they appear to be
significantly engaged in wiring funds to consumers (16 CFR 313.3(k)(2)(vi)). Institutions agree to comply with
GLBA in their Program Participation Agreement with ED. Institutions must protect student financial aid
information, with particular attention to information provided to institutions by ED or otherwise obtained in
support of the administration of the Federal student financial aid programs (16 CFR 314.3; HEA 483(a)(3)(E)
and HEA 485B(d)(2)).
On December 9, 2021, the FTC issued final regulations for 16 CFR Part 314 to implement the GLBA
information safeguarding standards that institutions must implement. These regulations significantly modified
the requirements that institutions must meet under GLBA. The regulations established minimum standards that
institutions must meet. The FTC stated that it “believes many of the requirements outlined in the Final Rule are
so fundamental to any information security program that the information security programs of many financial
institutions will already include them if those programs are in compliance with the current Safeguards Rule.”
Institutions are required to be in compliance with the revised requirements no later than June 9, 2023.
Institutions are required to develop, implement, and maintain a comprehensive information security program
that is written in one or more readily accessible parts. The regulations require the written information security
program to include nine elements for institutions with 5,000 or more customers, (16 CFR 314.3(a)). The written
information security program for institutions with fewer than 5,000 customers must address seven elements
(16 CFR 314.3(a) and 16 CFR 314.6). In the preamble to the Final Rule, the FTC stated, “Proposed § 314.4
[Elements] altered the current Rule’s required elements of an information security program and added several
new elements.” The FTC also stated, “[t]he elements for the information security programs set forth in this
section [16 CFR 314.4} are high-level principles that set forth basic issues the programs must address, and do
not prescribe how they will be addressed.” The elements that an institution must address in its written
information security program are at 16 CFR 314.4. At a minimum, an institution’s written information security
program:
• Designates a qualified individual responsible for overseeing and implementing the institution’s information
security program and enforcing the information security program in compliance (16 CFR 314.4(a)).
• Provides for the information security program to be based on a risk assessment that identifies reasonably
foreseeable internal and external risks to the security, confidentiality, and integrity of customer information
(as the term customer information applies to the institution) that could result in the unauthorized disclosure,
misuse, alteration, destruction, or other compromise of such information, and assesses the sufficiency of
any safeguards in place to control these risks (16 CFR 314.4(b)).
• Provides for the design and implementation of safeguards to control the risks the institution identifies
through its risk assessment (16 CFR 314.4(c)). At a minimum, the institution’s written information security
program must address the implementation of the minimum safeguards identified in 16 CFR 314.4(c)(1)
through (8). The eight minimum safeguards that the written information security program must address are
summarized as follows:
– Implement and periodically review access controls.
– Conduct a periodic inventory of data, noting where it’s collected, stored, or transmitted.
– Encrypt customer information on the institution’s system and when it’s in transit.
– Assess apps developed by the institution.
– Implement multi-factor authentication for anyone accessing customer information on the institution’s
system.
– Dispose of customer information securely
– Anticipate and evaluate changes to the information system or network.
– Maintain a log of authorized users’ activity and keep an eye out for unauthorized access.
• Provides for the institution to regularly test or otherwise monitor the effectiveness of the safeguards it has
implemented (16 CFR 314.4(d)).
• Provides for the implementation of policies and procedures to ensure that personnel are able to enact the
information security program (16 CFR 314.4(e)(1)).
• Addresses how the institution will oversee its information system service providers (16 CFR 314.4(f)).
• Provides for the evaluation and adjustment of its information security program in light of the results of the
required testing and monitoring; any material changes to its operations or business arrangements; the
results of the required risk assessments; or any other circumstances that it knows or has reason to know
may have a material impact the institution’s information security program (16 CFR 314.4(g)).
The first element that an institution’s written information security program must address is the designation of an
individual with responsibility for implementing and enforcing an institution’s written information security
program. The regulations refer to this individual as the Qualified Individual. If an institution has not designated a
Qualified Individual, it is not in compliance with the GLBA requirements. The Qualified Individual has ultimate
responsibility and accountability for implementing and enforcing the institution’s information security program
(16 CFR 314.4(a)). The regulations do provide for an institution to use a service provider as a Qualified
Individual. In cases where an institution uses a service provider as the Qualified Individual, the institution must:
• Retain responsibility for compliance with GLBA.
• Designate a senior member of its personnel responsible for direction and oversight of the Qualified
Individual; and
• Require the service provider or affiliate to maintain an information security program that protects the
institution in accordance with the requirements of the regulations at 16 CFR Part 314(a)(1) through (3).
Because the written information security program may be in one or more readily accessible parts and the
Qualified Individual is responsible for implementing and monitoring the information security program, ED
expects that the Qualified Individual would be able to provide the written information security program that
addresses the elements required for the written information security program to the auditors.
Identified Conditions:
A. Formally Establish and Document Risk Acceptance Process (repeat finding)
The District’s Written Information Security Program does not explicitly define the criteria for accepting
potential risks. A related process document, which was committed to be completed in the prior year, is
still in development as of September 2023.
B. Perform Regular Backup Restoration Tests (repeat finding)
The District performed a comprehensive Tabletop Disaster Recovery (DR) exercise for both SAP and
SIS during the audit period. As part of the exercise, the DR Team simulated a scenario, fully supported
with recovery considerations, steps, results, recovery challenges, and key recommendations to
improve moving forward – the exercise was also reviewed and approved by the Vice Chancellor and
Chief Information Officer. However, a key activity which is the actual backup restoration testing was not
performed as part of the tabletop exercise or at any point during the audit period.
C. Perform Timely Access Revocation and Regular Access Reviews (repeat finding)
Based on a test of controls to verify that access of terminated employees is timely removed in Active
Directory (AD), SAP, and PeopleSoft Student Information System (PS SIS), we noted that out of the
terminated employees subject to testing:
1. 13 users were active in AD, three (3) of whom have logged in after their termination.
2. 76 users were still active in SAP, 19 of whom have logged in after their termination.
3. 81 users were still active in PS SIS, 42 of whom have logged in after their termination.
Moreover, while a privileged user access review is performed for AD, there is no review performed to
check the validity of regular users in AD and the validity and appropriateness of users in SAP and SIS.
Employee functions and/or responsibilities may change over time; thus, previously provisioned access
may no longer be valid. Furthermore, a new compliance requirement, which requires institutions to
perform periodic access reviews for physical access in the data centers where the critical student
information systems are hosted [16 CFR 314.4(c)(1)], was also not performed during the audit period.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
16 CFR 314.4(f), a new compliance requirement, requires institutions to periodically assess service
providers based on the risk they present and the continued adequacy of their safeguards. However, we
noted that contracts for the following service providers were renewed by the District without sufficient
information security review from 2020 to 2022 and the period thereafter.
a. XAP – used for requesting, sending, and receiving electronic transcripts.
b. Bank Mobile – used for student refund processing.
c. Campus Logic – used for student online verification processing.
These contracts were instituted before the adoption of the District’s Information Security Program and
thus, were adopted and renewed thereafter without an Information Security Review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
A new compliance requirement, which requires institutions to monitor and log the activity of authorized
users and detect unauthorized access or use of, or tampering with, customer information by such users
[16 CFR 314.4(c)(8)], is not currently implemented by the District.
F. Implement Data-at-Rest Encryption for Devices Storing Customer Data
A new compliance requirement, which requires institutions to protect by encryption all students’ data
held at rest [16 CFR 314.4(c)(3)], is not currently implemented by the District (e.g., SAP and SIS
servers).
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
SAP production client was opened on 10/03/2022 and 11/09/2022 without sufficient documentation that
it was authorized and approved. Opening the production client, if not controlled, carries a significant
risk since changes can be made directly to the production environment without transport requests,
thereby circumventing any established change management controls.
Cause and Effect:
A. Formally Establish and Document Risk Acceptance Process
The absence of a formal risk acceptance process can lead to inappropriate risk treatment and a lack of
oversight in managing risks, resulting in inconsistent approaches that may not align with the District’s
overall risk tolerance.
B. Perform Regular Backup Restoration Tests
Lack of proper restoration testing may hinder the District from recovering its data completely and
accurately.
C. Perform Timely Access Revocation and Regular Access Reviews
Failure to deactivate or remove accounts of terminated employees timely may result in unauthorized
access to the District’s resources and sensitive information. Furthermore, the absence of user access
reviews increases the risk of inappropriate users or access remaining undetected over time which may
be used to process unauthorized transactions or view confidential information.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Non-performance of review may result in the District relying on IT service providers with ineffective
information security controls making them susceptible to data breaches. A breach in a third-party
system may expose the District to financial, operational, legal, and reputational damages.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Without adequate logging and monitoring of users’ activity, security incidents, including suspicious and
unauthorized activities may not be detected and responded to in a timely manner.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
Data that is held to devices without encryption is vulnerable to unauthorized access, especially if
physical and logical controls are compromised. In the event of a breach, sensitive data, such as
students’ information may be exposed.
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
Insufficient controls over client opening may result in the implementation of unauthorized changes
directly into the production environment. This increases the risk that changes to the system may not
follow the District’s change management process (documentation, authorization, testing, and approval)
prior to the implementation of the change to the production environment.
Recommendation:
A. Formally Establish and Document Risk Acceptance Process
We recommend that the District establish and implement the District’s Risk Acceptance process that
details the criteria and conditions for accepting potential risks. We also recommend that the District
ensure this is aligned with the District’s objectives, overall risk tolerance, and current practices in
identifying, assessing, and mitigating risks.
B. Perform Regular Backup Restoration Tests
Together with the DR tabletop exercises, we recommend that backup restoration tests should be
performed at least once per year. Detailed testing schedules should be drafted based on DRP
specifications and required restoration of the critical systems. Documentation of such tests should be
maintained for full management awareness and approval.
C. Perform Timely Access Revocation and Regular Access Reviews
1. We recommend that the District revoke the access of terminated employees and review the
activities performed by those accounts after their termination date to ensure the validity and
appropriateness of activities/transactions performed by these accounts, if any.
2. Concurrently, the District should improve the account termination procedures to ensure that access
to terminated employees is timely revoked.
3. We also recommend that regular access reviews for AD, SAP, PS SIS, and the physical accesses
to data centers where these systems are hosted, are performed, and documented (for both regular
and privileged users) to ensure that only valid and appropriate users remain in the system and
have access to relevant information. The review may include, but is not limited to the following:
a. Document management control over the completeness and accuracy of the reports used in the
review.
b. Define designated functions/roles to perform the review.
c. Monitor timeliness of the performance of the review and execution of corrective actions as a
result of the review
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Revisit the District’s current practices for evaluating third-party provider’s information security to ensure
that all third-party are reviewed and evaluated regularly. At the minimum, the process should involve
continuous monitoring, contractual provisions summarizing security requirements, and a strategy for
addressing security vulnerabilities identified during reviews.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Formally establish a process for logging and monitoring users’ activity which includes collection,
retention, regular review, and documentation of user activity logs. The review should be aligned with
the District’s access management practices to ensure that only authorized users are allowed to access
information that is aligned with their functions and responsibilities.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
The District should establish and implement data-at-rest encryption for endpoint devices to ensure that
data is inaccessible to unauthorized users in cases when logical and physical measures are
compromised.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
Ensure that production client openings, particularly those related to direct production changes, strictly
adhere to the District’s Change Management Procedure. These client openings and the related
changes should be properly documented, authorized, and validated prior to implementation.
Views of Responsible Officials and Planned Corrective Actions:
A. Formally Establish and Document Risk Acceptance Process
Requirements for risk assessments and risk acceptance processes to comply with GLBA were
expanded in June of 2023. The District engaged a third-party consultant to conduct a GLBA-compliant
risk assessment and advise on recommended changes to the District’s Written Information Security
Plan (WISP) to comply with the new requirements. The findings and recommendations were presented
to the District in October of 2023 and are currently under review. The District will initiate a project to
formalize risk acceptance by December 31st, 2023, and implement the risk acceptance process by
June 30, 2024.
B. Perform Regular Backup Restoration Tests
The District has engaged with a third party to build a testing environment to physically test restoration
of the SIS environment. Initiation of the project is pending processing of the Purchase Order. The
District anticipates completion of the restoration by December 31st, 2023.
With respect to SAP, the District is currently engaged in an effort to migrate the SAP database to
HANA. When this project is complete, the same test environment will be capable of performing physical
recovery tests for SAP. The HANA migration is estimated to be completed on February 28th, 2024.
C. Perform Timely Access Revocation and Regular Access Reviews
With respect to the District’s Single Sign-On (ADFS or SSO) environments, the District engaged
professional services consultants to address this item by automating the disablement of employee
accounts based upon the termination of assignment. The work is currently underway. The target
completion of the process is December 15, 2023. With respect to the SAP environment, the District has
engaged with a vendor to implement Multifactor Authentication (MFA) in the SAP environment. Work
will begin upon processing the Purchase Order. Once both efforts are complete, disabling employee
accounts in SSO, SIS and SAP will be performed automatically based upon the termination of
assignments according to criteria established by Human Resources.
With respect to access reviews of SIS and SAP, the District is currently researching the export of user
audit logs to the District’s analysis environment to enable regular reviews. The new target to perform
regular access reviews for SAP and SIS is the end of Q1 2024.
With respect to physical access reviews, the District Information Security Team will perform an annual
review of relevant operational protocols for data center access with the appropriate internal teams and
perform an audit of data access at a minimum of once per year. The first annual protocol review will be
completed by December 1st, 2023. The first annual audit will commence no later than March 1st, 2024.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
To prevent recurrence, the LACCD Information Security Team will coordinate an annual review of
Administrative Protocol 3723A: Information Security Evaluation of Third-Party Providers with District
Financial Aid, Procurement and Educational Programming and Institutional Effectiveness (EPIE)
leadership teams to help assure future relevant contracts are provided to the Information Security
Team prior to renewal to allow for timely security review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
The District is currently researching the export of user audit logs to the District’s analysis environment
to enable regular reviews. The new target to perform regular access reviews for SAP and SIS is the
end of Q1 2024.
F. Implement data encryption for Devices Storing Customer Data
The District engaged a third-party consultant to perform a comprehensive review of PeopleSoft security
controls, including the implementation of encryption of financial aid data within PeopleSoft. The results
are pending. Based upon those recommendations, the District will work with encryption providers to
develop and implement field-level encryption of financial aid data in SIS as appropriate.
With respect to end-user devices storing sensitive data, the District recently adopted workstation
hardening requirements that include whole-disk encryption for desktop and laptop computers used by
personnel who routinely access sensitive information, including financial aid data. The District will
implement the standards on workstations used by employees in financial aid and institutional research
by June 30, 2024. Once this is complete, additional workstations will be encrypted in order of potential
risk.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
The requests for direct changes in SAP production will be tracked and included in our help desk
requests so that an auditable trail can be created leading to the purpose and completion of the
production changes. Additionally, direct production change requests will be reviewed and approved
following the LACCD Change Control process. Minor updates that do not fall within the change control
guidelines will require managerial approval within the help desk system.
Personnel Responsible for Implementation: Carmen V. Lidz
Position of Responsible Personnel: Vice Chancellor & Chief Information Officer
Finding FA 2023‑03: Special Tests and Provision: Gramm Leach Bliley Act ‑ Student Information
Security – Formally Establish and Document Risk Acceptance Process, Perform Regular Backup
Restoration Tests, Perform Timely Access Revocation and Regular Access Reviews, Perform
Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards, Maintain and Review Logs
of Users' Activity for both SAP and PS SIS, Implement Data-at-Rest Encryption for Devices Storing
Customer Data, Enforce Strict Compliance on Controls over SAP Direct to Production Changes (Repeat
Finding)
Federal Program Information
Assistance Listing Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: Various
Federal Award Year: July 1, 2022, to June 30, 2023
Compliance Requirement: Special Tests and Provisions – Gramm Leach Bliley Act –
Student Information Security
Criteria or Specific Requirement:
The Gramm-Leach-Bliley Act (Pub. L. No. 106-102) (GLBA) requires financial institutions to explain their
information-sharing practices to their customers and to safeguard sensitive data (16 CFR 314). The Federal
Trade Commission considers Title IV-eligible institutions that participate in Title IV Educational Assistance
Programs as “financial institutions” and subject to the Gramm-Leach-Bliley Act because they appear to be
significantly engaged in wiring funds to consumers (16 CFR 313.3(k)(2)(vi)). Institutions agree to comply with
GLBA in their Program Participation Agreement with ED. Institutions must protect student financial aid
information, with particular attention to information provided to institutions by ED or otherwise obtained in
support of the administration of the Federal student financial aid programs (16 CFR 314.3; HEA 483(a)(3)(E)
and HEA 485B(d)(2)).
On December 9, 2021, the FTC issued final regulations for 16 CFR Part 314 to implement the GLBA
information safeguarding standards that institutions must implement. These regulations significantly modified
the requirements that institutions must meet under GLBA. The regulations established minimum standards that
institutions must meet. The FTC stated that it “believes many of the requirements outlined in the Final Rule are
so fundamental to any information security program that the information security programs of many financial
institutions will already include them if those programs are in compliance with the current Safeguards Rule.”
Institutions are required to be in compliance with the revised requirements no later than June 9, 2023.
Institutions are required to develop, implement, and maintain a comprehensive information security program
that is written in one or more readily accessible parts. The regulations require the written information security
program to include nine elements for institutions with 5,000 or more customers, (16 CFR 314.3(a)). The written
information security program for institutions with fewer than 5,000 customers must address seven elements
(16 CFR 314.3(a) and 16 CFR 314.6). In the preamble to the Final Rule, the FTC stated, “Proposed § 314.4
[Elements] altered the current Rule’s required elements of an information security program and added several
new elements.” The FTC also stated, “[t]he elements for the information security programs set forth in this
section [16 CFR 314.4} are high-level principles that set forth basic issues the programs must address, and do
not prescribe how they will be addressed.” The elements that an institution must address in its written
information security program are at 16 CFR 314.4. At a minimum, an institution’s written information security
program:
• Designates a qualified individual responsible for overseeing and implementing the institution’s information
security program and enforcing the information security program in compliance (16 CFR 314.4(a)).
• Provides for the information security program to be based on a risk assessment that identifies reasonably
foreseeable internal and external risks to the security, confidentiality, and integrity of customer information
(as the term customer information applies to the institution) that could result in the unauthorized disclosure,
misuse, alteration, destruction, or other compromise of such information, and assesses the sufficiency of
any safeguards in place to control these risks (16 CFR 314.4(b)).
• Provides for the design and implementation of safeguards to control the risks the institution identifies
through its risk assessment (16 CFR 314.4(c)). At a minimum, the institution’s written information security
program must address the implementation of the minimum safeguards identified in 16 CFR 314.4(c)(1)
through (8). The eight minimum safeguards that the written information security program must address are
summarized as follows:
– Implement and periodically review access controls.
– Conduct a periodic inventory of data, noting where it’s collected, stored, or transmitted.
– Encrypt customer information on the institution’s system and when it’s in transit.
– Assess apps developed by the institution.
– Implement multi-factor authentication for anyone accessing customer information on the institution’s
system.
– Dispose of customer information securely
– Anticipate and evaluate changes to the information system or network.
– Maintain a log of authorized users’ activity and keep an eye out for unauthorized access.
• Provides for the institution to regularly test or otherwise monitor the effectiveness of the safeguards it has
implemented (16 CFR 314.4(d)).
• Provides for the implementation of policies and procedures to ensure that personnel are able to enact the
information security program (16 CFR 314.4(e)(1)).
• Addresses how the institution will oversee its information system service providers (16 CFR 314.4(f)).
• Provides for the evaluation and adjustment of its information security program in light of the results of the
required testing and monitoring; any material changes to its operations or business arrangements; the
results of the required risk assessments; or any other circumstances that it knows or has reason to know
may have a material impact the institution’s information security program (16 CFR 314.4(g)).
The first element that an institution’s written information security program must address is the designation of an
individual with responsibility for implementing and enforcing an institution’s written information security
program. The regulations refer to this individual as the Qualified Individual. If an institution has not designated a
Qualified Individual, it is not in compliance with the GLBA requirements. The Qualified Individual has ultimate
responsibility and accountability for implementing and enforcing the institution’s information security program
(16 CFR 314.4(a)). The regulations do provide for an institution to use a service provider as a Qualified
Individual. In cases where an institution uses a service provider as the Qualified Individual, the institution must:
• Retain responsibility for compliance with GLBA.
• Designate a senior member of its personnel responsible for direction and oversight of the Qualified
Individual; and
• Require the service provider or affiliate to maintain an information security program that protects the
institution in accordance with the requirements of the regulations at 16 CFR Part 314(a)(1) through (3).
Because the written information security program may be in one or more readily accessible parts and the
Qualified Individual is responsible for implementing and monitoring the information security program, ED
expects that the Qualified Individual would be able to provide the written information security program that
addresses the elements required for the written information security program to the auditors.
Identified Conditions:
A. Formally Establish and Document Risk Acceptance Process (repeat finding)
The District’s Written Information Security Program does not explicitly define the criteria for accepting
potential risks. A related process document, which was committed to be completed in the prior year, is
still in development as of September 2023.
B. Perform Regular Backup Restoration Tests (repeat finding)
The District performed a comprehensive Tabletop Disaster Recovery (DR) exercise for both SAP and
SIS during the audit period. As part of the exercise, the DR Team simulated a scenario, fully supported
with recovery considerations, steps, results, recovery challenges, and key recommendations to
improve moving forward – the exercise was also reviewed and approved by the Vice Chancellor and
Chief Information Officer. However, a key activity which is the actual backup restoration testing was not
performed as part of the tabletop exercise or at any point during the audit period.
C. Perform Timely Access Revocation and Regular Access Reviews (repeat finding)
Based on a test of controls to verify that access of terminated employees is timely removed in Active
Directory (AD), SAP, and PeopleSoft Student Information System (PS SIS), we noted that out of the
terminated employees subject to testing:
1. 13 users were active in AD, three (3) of whom have logged in after their termination.
2. 76 users were still active in SAP, 19 of whom have logged in after their termination.
3. 81 users were still active in PS SIS, 42 of whom have logged in after their termination.
Moreover, while a privileged user access review is performed for AD, there is no review performed to
check the validity of regular users in AD and the validity and appropriateness of users in SAP and SIS.
Employee functions and/or responsibilities may change over time; thus, previously provisioned access
may no longer be valid. Furthermore, a new compliance requirement, which requires institutions to
perform periodic access reviews for physical access in the data centers where the critical student
information systems are hosted [16 CFR 314.4(c)(1)], was also not performed during the audit period.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
16 CFR 314.4(f), a new compliance requirement, requires institutions to periodically assess service
providers based on the risk they present and the continued adequacy of their safeguards. However, we
noted that contracts for the following service providers were renewed by the District without sufficient
information security review from 2020 to 2022 and the period thereafter.
a. XAP – used for requesting, sending, and receiving electronic transcripts.
b. Bank Mobile – used for student refund processing.
c. Campus Logic – used for student online verification processing.
These contracts were instituted before the adoption of the District’s Information Security Program and
thus, were adopted and renewed thereafter without an Information Security Review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
A new compliance requirement, which requires institutions to monitor and log the activity of authorized
users and detect unauthorized access or use of, or tampering with, customer information by such users
[16 CFR 314.4(c)(8)], is not currently implemented by the District.
F. Implement Data-at-Rest Encryption for Devices Storing Customer Data
A new compliance requirement, which requires institutions to protect by encryption all students’ data
held at rest [16 CFR 314.4(c)(3)], is not currently implemented by the District (e.g., SAP and SIS
servers).
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
SAP production client was opened on 10/03/2022 and 11/09/2022 without sufficient documentation that
it was authorized and approved. Opening the production client, if not controlled, carries a significant
risk since changes can be made directly to the production environment without transport requests,
thereby circumventing any established change management controls.
Cause and Effect:
A. Formally Establish and Document Risk Acceptance Process
The absence of a formal risk acceptance process can lead to inappropriate risk treatment and a lack of
oversight in managing risks, resulting in inconsistent approaches that may not align with the District’s
overall risk tolerance.
B. Perform Regular Backup Restoration Tests
Lack of proper restoration testing may hinder the District from recovering its data completely and
accurately.
C. Perform Timely Access Revocation and Regular Access Reviews
Failure to deactivate or remove accounts of terminated employees timely may result in unauthorized
access to the District’s resources and sensitive information. Furthermore, the absence of user access
reviews increases the risk of inappropriate users or access remaining undetected over time which may
be used to process unauthorized transactions or view confidential information.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Non-performance of review may result in the District relying on IT service providers with ineffective
information security controls making them susceptible to data breaches. A breach in a third-party
system may expose the District to financial, operational, legal, and reputational damages.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Without adequate logging and monitoring of users’ activity, security incidents, including suspicious and
unauthorized activities may not be detected and responded to in a timely manner.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
Data that is held to devices without encryption is vulnerable to unauthorized access, especially if
physical and logical controls are compromised. In the event of a breach, sensitive data, such as
students’ information may be exposed.
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
Insufficient controls over client opening may result in the implementation of unauthorized changes
directly into the production environment. This increases the risk that changes to the system may not
follow the District’s change management process (documentation, authorization, testing, and approval)
prior to the implementation of the change to the production environment.
Recommendation:
A. Formally Establish and Document Risk Acceptance Process
We recommend that the District establish and implement the District’s Risk Acceptance process that
details the criteria and conditions for accepting potential risks. We also recommend that the District
ensure this is aligned with the District’s objectives, overall risk tolerance, and current practices in
identifying, assessing, and mitigating risks.
B. Perform Regular Backup Restoration Tests
Together with the DR tabletop exercises, we recommend that backup restoration tests should be
performed at least once per year. Detailed testing schedules should be drafted based on DRP
specifications and required restoration of the critical systems. Documentation of such tests should be
maintained for full management awareness and approval.
C. Perform Timely Access Revocation and Regular Access Reviews
1. We recommend that the District revoke the access of terminated employees and review the
activities performed by those accounts after their termination date to ensure the validity and
appropriateness of activities/transactions performed by these accounts, if any.
2. Concurrently, the District should improve the account termination procedures to ensure that access
to terminated employees is timely revoked.
3. We also recommend that regular access reviews for AD, SAP, PS SIS, and the physical accesses
to data centers where these systems are hosted, are performed, and documented (for both regular
and privileged users) to ensure that only valid and appropriate users remain in the system and
have access to relevant information. The review may include, but is not limited to the following:
a. Document management control over the completeness and accuracy of the reports used in the
review.
b. Define designated functions/roles to perform the review.
c. Monitor timeliness of the performance of the review and execution of corrective actions as a
result of the review
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Revisit the District’s current practices for evaluating third-party provider’s information security to ensure
that all third-party are reviewed and evaluated regularly. At the minimum, the process should involve
continuous monitoring, contractual provisions summarizing security requirements, and a strategy for
addressing security vulnerabilities identified during reviews.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Formally establish a process for logging and monitoring users’ activity which includes collection,
retention, regular review, and documentation of user activity logs. The review should be aligned with
the District’s access management practices to ensure that only authorized users are allowed to access
information that is aligned with their functions and responsibilities.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
The District should establish and implement data-at-rest encryption for endpoint devices to ensure that
data is inaccessible to unauthorized users in cases when logical and physical measures are
compromised.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
Ensure that production client openings, particularly those related to direct production changes, strictly
adhere to the District’s Change Management Procedure. These client openings and the related
changes should be properly documented, authorized, and validated prior to implementation.
Views of Responsible Officials and Planned Corrective Actions:
A. Formally Establish and Document Risk Acceptance Process
Requirements for risk assessments and risk acceptance processes to comply with GLBA were
expanded in June of 2023. The District engaged a third-party consultant to conduct a GLBA-compliant
risk assessment and advise on recommended changes to the District’s Written Information Security
Plan (WISP) to comply with the new requirements. The findings and recommendations were presented
to the District in October of 2023 and are currently under review. The District will initiate a project to
formalize risk acceptance by December 31st, 2023, and implement the risk acceptance process by
June 30, 2024.
B. Perform Regular Backup Restoration Tests
The District has engaged with a third party to build a testing environment to physically test restoration
of the SIS environment. Initiation of the project is pending processing of the Purchase Order. The
District anticipates completion of the restoration by December 31st, 2023.
With respect to SAP, the District is currently engaged in an effort to migrate the SAP database to
HANA. When this project is complete, the same test environment will be capable of performing physical
recovery tests for SAP. The HANA migration is estimated to be completed on February 28th, 2024.
C. Perform Timely Access Revocation and Regular Access Reviews
With respect to the District’s Single Sign-On (ADFS or SSO) environments, the District engaged
professional services consultants to address this item by automating the disablement of employee
accounts based upon the termination of assignment. The work is currently underway. The target
completion of the process is December 15, 2023. With respect to the SAP environment, the District has
engaged with a vendor to implement Multifactor Authentication (MFA) in the SAP environment. Work
will begin upon processing the Purchase Order. Once both efforts are complete, disabling employee
accounts in SSO, SIS and SAP will be performed automatically based upon the termination of
assignments according to criteria established by Human Resources.
With respect to access reviews of SIS and SAP, the District is currently researching the export of user
audit logs to the District’s analysis environment to enable regular reviews. The new target to perform
regular access reviews for SAP and SIS is the end of Q1 2024.
With respect to physical access reviews, the District Information Security Team will perform an annual
review of relevant operational protocols for data center access with the appropriate internal teams and
perform an audit of data access at a minimum of once per year. The first annual protocol review will be
completed by December 1st, 2023. The first annual audit will commence no later than March 1st, 2024.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
To prevent recurrence, the LACCD Information Security Team will coordinate an annual review of
Administrative Protocol 3723A: Information Security Evaluation of Third-Party Providers with District
Financial Aid, Procurement and Educational Programming and Institutional Effectiveness (EPIE)
leadership teams to help assure future relevant contracts are provided to the Information Security
Team prior to renewal to allow for timely security review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
The District is currently researching the export of user audit logs to the District’s analysis environment
to enable regular reviews. The new target to perform regular access reviews for SAP and SIS is the
end of Q1 2024.
F. Implement data encryption for Devices Storing Customer Data
The District engaged a third-party consultant to perform a comprehensive review of PeopleSoft security
controls, including the implementation of encryption of financial aid data within PeopleSoft. The results
are pending. Based upon those recommendations, the District will work with encryption providers to
develop and implement field-level encryption of financial aid data in SIS as appropriate.
With respect to end-user devices storing sensitive data, the District recently adopted workstation
hardening requirements that include whole-disk encryption for desktop and laptop computers used by
personnel who routinely access sensitive information, including financial aid data. The District will
implement the standards on workstations used by employees in financial aid and institutional research
by June 30, 2024. Once this is complete, additional workstations will be encrypted in order of potential
risk.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
The requests for direct changes in SAP production will be tracked and included in our help desk
requests so that an auditable trail can be created leading to the purpose and completion of the
production changes. Additionally, direct production change requests will be reviewed and approved
following the LACCD Change Control process. Minor updates that do not fall within the change control
guidelines will require managerial approval within the help desk system.
Personnel Responsible for Implementation: Carmen V. Lidz
Position of Responsible Personnel: Vice Chancellor & Chief Information Officer
Finding FA 2023‑03: Special Tests and Provision: Gramm Leach Bliley Act ‑ Student Information
Security – Formally Establish and Document Risk Acceptance Process, Perform Regular Backup
Restoration Tests, Perform Timely Access Revocation and Regular Access Reviews, Perform
Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards, Maintain and Review Logs
of Users' Activity for both SAP and PS SIS, Implement Data-at-Rest Encryption for Devices Storing
Customer Data, Enforce Strict Compliance on Controls over SAP Direct to Production Changes (Repeat
Finding)
Federal Program Information
Assistance Listing Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: Various
Federal Award Year: July 1, 2022, to June 30, 2023
Compliance Requirement: Special Tests and Provisions – Gramm Leach Bliley Act –
Student Information Security
Criteria or Specific Requirement:
The Gramm-Leach-Bliley Act (Pub. L. No. 106-102) (GLBA) requires financial institutions to explain their
information-sharing practices to their customers and to safeguard sensitive data (16 CFR 314). The Federal
Trade Commission considers Title IV-eligible institutions that participate in Title IV Educational Assistance
Programs as “financial institutions” and subject to the Gramm-Leach-Bliley Act because they appear to be
significantly engaged in wiring funds to consumers (16 CFR 313.3(k)(2)(vi)). Institutions agree to comply with
GLBA in their Program Participation Agreement with ED. Institutions must protect student financial aid
information, with particular attention to information provided to institutions by ED or otherwise obtained in
support of the administration of the Federal student financial aid programs (16 CFR 314.3; HEA 483(a)(3)(E)
and HEA 485B(d)(2)).
On December 9, 2021, the FTC issued final regulations for 16 CFR Part 314 to implement the GLBA
information safeguarding standards that institutions must implement. These regulations significantly modified
the requirements that institutions must meet under GLBA. The regulations established minimum standards that
institutions must meet. The FTC stated that it “believes many of the requirements outlined in the Final Rule are
so fundamental to any information security program that the information security programs of many financial
institutions will already include them if those programs are in compliance with the current Safeguards Rule.”
Institutions are required to be in compliance with the revised requirements no later than June 9, 2023.
Institutions are required to develop, implement, and maintain a comprehensive information security program
that is written in one or more readily accessible parts. The regulations require the written information security
program to include nine elements for institutions with 5,000 or more customers, (16 CFR 314.3(a)). The written
information security program for institutions with fewer than 5,000 customers must address seven elements
(16 CFR 314.3(a) and 16 CFR 314.6). In the preamble to the Final Rule, the FTC stated, “Proposed § 314.4
[Elements] altered the current Rule’s required elements of an information security program and added several
new elements.” The FTC also stated, “[t]he elements for the information security programs set forth in this
section [16 CFR 314.4} are high-level principles that set forth basic issues the programs must address, and do
not prescribe how they will be addressed.” The elements that an institution must address in its written
information security program are at 16 CFR 314.4. At a minimum, an institution’s written information security
program:
• Designates a qualified individual responsible for overseeing and implementing the institution’s information
security program and enforcing the information security program in compliance (16 CFR 314.4(a)).
• Provides for the information security program to be based on a risk assessment that identifies reasonably
foreseeable internal and external risks to the security, confidentiality, and integrity of customer information
(as the term customer information applies to the institution) that could result in the unauthorized disclosure,
misuse, alteration, destruction, or other compromise of such information, and assesses the sufficiency of
any safeguards in place to control these risks (16 CFR 314.4(b)).
• Provides for the design and implementation of safeguards to control the risks the institution identifies
through its risk assessment (16 CFR 314.4(c)). At a minimum, the institution’s written information security
program must address the implementation of the minimum safeguards identified in 16 CFR 314.4(c)(1)
through (8). The eight minimum safeguards that the written information security program must address are
summarized as follows:
– Implement and periodically review access controls.
– Conduct a periodic inventory of data, noting where it’s collected, stored, or transmitted.
– Encrypt customer information on the institution’s system and when it’s in transit.
– Assess apps developed by the institution.
– Implement multi-factor authentication for anyone accessing customer information on the institution’s
system.
– Dispose of customer information securely
– Anticipate and evaluate changes to the information system or network.
– Maintain a log of authorized users’ activity and keep an eye out for unauthorized access.
• Provides for the institution to regularly test or otherwise monitor the effectiveness of the safeguards it has
implemented (16 CFR 314.4(d)).
• Provides for the implementation of policies and procedures to ensure that personnel are able to enact the
information security program (16 CFR 314.4(e)(1)).
• Addresses how the institution will oversee its information system service providers (16 CFR 314.4(f)).
• Provides for the evaluation and adjustment of its information security program in light of the results of the
required testing and monitoring; any material changes to its operations or business arrangements; the
results of the required risk assessments; or any other circumstances that it knows or has reason to know
may have a material impact the institution’s information security program (16 CFR 314.4(g)).
The first element that an institution’s written information security program must address is the designation of an
individual with responsibility for implementing and enforcing an institution’s written information security
program. The regulations refer to this individual as the Qualified Individual. If an institution has not designated a
Qualified Individual, it is not in compliance with the GLBA requirements. The Qualified Individual has ultimate
responsibility and accountability for implementing and enforcing the institution’s information security program
(16 CFR 314.4(a)). The regulations do provide for an institution to use a service provider as a Qualified
Individual. In cases where an institution uses a service provider as the Qualified Individual, the institution must:
• Retain responsibility for compliance with GLBA.
• Designate a senior member of its personnel responsible for direction and oversight of the Qualified
Individual; and
• Require the service provider or affiliate to maintain an information security program that protects the
institution in accordance with the requirements of the regulations at 16 CFR Part 314(a)(1) through (3).
Because the written information security program may be in one or more readily accessible parts and the
Qualified Individual is responsible for implementing and monitoring the information security program, ED
expects that the Qualified Individual would be able to provide the written information security program that
addresses the elements required for the written information security program to the auditors.
Identified Conditions:
A. Formally Establish and Document Risk Acceptance Process (repeat finding)
The District’s Written Information Security Program does not explicitly define the criteria for accepting
potential risks. A related process document, which was committed to be completed in the prior year, is
still in development as of September 2023.
B. Perform Regular Backup Restoration Tests (repeat finding)
The District performed a comprehensive Tabletop Disaster Recovery (DR) exercise for both SAP and
SIS during the audit period. As part of the exercise, the DR Team simulated a scenario, fully supported
with recovery considerations, steps, results, recovery challenges, and key recommendations to
improve moving forward – the exercise was also reviewed and approved by the Vice Chancellor and
Chief Information Officer. However, a key activity which is the actual backup restoration testing was not
performed as part of the tabletop exercise or at any point during the audit period.
C. Perform Timely Access Revocation and Regular Access Reviews (repeat finding)
Based on a test of controls to verify that access of terminated employees is timely removed in Active
Directory (AD), SAP, and PeopleSoft Student Information System (PS SIS), we noted that out of the
terminated employees subject to testing:
1. 13 users were active in AD, three (3) of whom have logged in after their termination.
2. 76 users were still active in SAP, 19 of whom have logged in after their termination.
3. 81 users were still active in PS SIS, 42 of whom have logged in after their termination.
Moreover, while a privileged user access review is performed for AD, there is no review performed to
check the validity of regular users in AD and the validity and appropriateness of users in SAP and SIS.
Employee functions and/or responsibilities may change over time; thus, previously provisioned access
may no longer be valid. Furthermore, a new compliance requirement, which requires institutions to
perform periodic access reviews for physical access in the data centers where the critical student
information systems are hosted [16 CFR 314.4(c)(1)], was also not performed during the audit period.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
16 CFR 314.4(f), a new compliance requirement, requires institutions to periodically assess service
providers based on the risk they present and the continued adequacy of their safeguards. However, we
noted that contracts for the following service providers were renewed by the District without sufficient
information security review from 2020 to 2022 and the period thereafter.
a. XAP – used for requesting, sending, and receiving electronic transcripts.
b. Bank Mobile – used for student refund processing.
c. Campus Logic – used for student online verification processing.
These contracts were instituted before the adoption of the District’s Information Security Program and
thus, were adopted and renewed thereafter without an Information Security Review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
A new compliance requirement, which requires institutions to monitor and log the activity of authorized
users and detect unauthorized access or use of, or tampering with, customer information by such users
[16 CFR 314.4(c)(8)], is not currently implemented by the District.
F. Implement Data-at-Rest Encryption for Devices Storing Customer Data
A new compliance requirement, which requires institutions to protect by encryption all students’ data
held at rest [16 CFR 314.4(c)(3)], is not currently implemented by the District (e.g., SAP and SIS
servers).
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
SAP production client was opened on 10/03/2022 and 11/09/2022 without sufficient documentation that
it was authorized and approved. Opening the production client, if not controlled, carries a significant
risk since changes can be made directly to the production environment without transport requests,
thereby circumventing any established change management controls.
Cause and Effect:
A. Formally Establish and Document Risk Acceptance Process
The absence of a formal risk acceptance process can lead to inappropriate risk treatment and a lack of
oversight in managing risks, resulting in inconsistent approaches that may not align with the District’s
overall risk tolerance.
B. Perform Regular Backup Restoration Tests
Lack of proper restoration testing may hinder the District from recovering its data completely and
accurately.
C. Perform Timely Access Revocation and Regular Access Reviews
Failure to deactivate or remove accounts of terminated employees timely may result in unauthorized
access to the District’s resources and sensitive information. Furthermore, the absence of user access
reviews increases the risk of inappropriate users or access remaining undetected over time which may
be used to process unauthorized transactions or view confidential information.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Non-performance of review may result in the District relying on IT service providers with ineffective
information security controls making them susceptible to data breaches. A breach in a third-party
system may expose the District to financial, operational, legal, and reputational damages.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Without adequate logging and monitoring of users’ activity, security incidents, including suspicious and
unauthorized activities may not be detected and responded to in a timely manner.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
Data that is held to devices without encryption is vulnerable to unauthorized access, especially if
physical and logical controls are compromised. In the event of a breach, sensitive data, such as
students’ information may be exposed.
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
Insufficient controls over client opening may result in the implementation of unauthorized changes
directly into the production environment. This increases the risk that changes to the system may not
follow the District’s change management process (documentation, authorization, testing, and approval)
prior to the implementation of the change to the production environment.
Recommendation:
A. Formally Establish and Document Risk Acceptance Process
We recommend that the District establish and implement the District’s Risk Acceptance process that
details the criteria and conditions for accepting potential risks. We also recommend that the District
ensure this is aligned with the District’s objectives, overall risk tolerance, and current practices in
identifying, assessing, and mitigating risks.
B. Perform Regular Backup Restoration Tests
Together with the DR tabletop exercises, we recommend that backup restoration tests should be
performed at least once per year. Detailed testing schedules should be drafted based on DRP
specifications and required restoration of the critical systems. Documentation of such tests should be
maintained for full management awareness and approval.
C. Perform Timely Access Revocation and Regular Access Reviews
1. We recommend that the District revoke the access of terminated employees and review the
activities performed by those accounts after their termination date to ensure the validity and
appropriateness of activities/transactions performed by these accounts, if any.
2. Concurrently, the District should improve the account termination procedures to ensure that access
to terminated employees is timely revoked.
3. We also recommend that regular access reviews for AD, SAP, PS SIS, and the physical accesses
to data centers where these systems are hosted, are performed, and documented (for both regular
and privileged users) to ensure that only valid and appropriate users remain in the system and
have access to relevant information. The review may include, but is not limited to the following:
a. Document management control over the completeness and accuracy of the reports used in the
review.
b. Define designated functions/roles to perform the review.
c. Monitor timeliness of the performance of the review and execution of corrective actions as a
result of the review
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Revisit the District’s current practices for evaluating third-party provider’s information security to ensure
that all third-party are reviewed and evaluated regularly. At the minimum, the process should involve
continuous monitoring, contractual provisions summarizing security requirements, and a strategy for
addressing security vulnerabilities identified during reviews.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Formally establish a process for logging and monitoring users’ activity which includes collection,
retention, regular review, and documentation of user activity logs. The review should be aligned with
the District’s access management practices to ensure that only authorized users are allowed to access
information that is aligned with their functions and responsibilities.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
The District should establish and implement data-at-rest encryption for endpoint devices to ensure that
data is inaccessible to unauthorized users in cases when logical and physical measures are
compromised.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
Ensure that production client openings, particularly those related to direct production changes, strictly
adhere to the District’s Change Management Procedure. These client openings and the related
changes should be properly documented, authorized, and validated prior to implementation.
Views of Responsible Officials and Planned Corrective Actions:
A. Formally Establish and Document Risk Acceptance Process
Requirements for risk assessments and risk acceptance processes to comply with GLBA were
expanded in June of 2023. The District engaged a third-party consultant to conduct a GLBA-compliant
risk assessment and advise on recommended changes to the District’s Written Information Security
Plan (WISP) to comply with the new requirements. The findings and recommendations were presented
to the District in October of 2023 and are currently under review. The District will initiate a project to
formalize risk acceptance by December 31st, 2023, and implement the risk acceptance process by
June 30, 2024.
B. Perform Regular Backup Restoration Tests
The District has engaged with a third party to build a testing environment to physically test restoration
of the SIS environment. Initiation of the project is pending processing of the Purchase Order. The
District anticipates completion of the restoration by December 31st, 2023.
With respect to SAP, the District is currently engaged in an effort to migrate the SAP database to
HANA. When this project is complete, the same test environment will be capable of performing physical
recovery tests for SAP. The HANA migration is estimated to be completed on February 28th, 2024.
C. Perform Timely Access Revocation and Regular Access Reviews
With respect to the District’s Single Sign-On (ADFS or SSO) environments, the District engaged
professional services consultants to address this item by automating the disablement of employee
accounts based upon the termination of assignment. The work is currently underway. The target
completion of the process is December 15, 2023. With respect to the SAP environment, the District has
engaged with a vendor to implement Multifactor Authentication (MFA) in the SAP environment. Work
will begin upon processing the Purchase Order. Once both efforts are complete, disabling employee
accounts in SSO, SIS and SAP will be performed automatically based upon the termination of
assignments according to criteria established by Human Resources.
With respect to access reviews of SIS and SAP, the District is currently researching the export of user
audit logs to the District’s analysis environment to enable regular reviews. The new target to perform
regular access reviews for SAP and SIS is the end of Q1 2024.
With respect to physical access reviews, the District Information Security Team will perform an annual
review of relevant operational protocols for data center access with the appropriate internal teams and
perform an audit of data access at a minimum of once per year. The first annual protocol review will be
completed by December 1st, 2023. The first annual audit will commence no later than March 1st, 2024.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
To prevent recurrence, the LACCD Information Security Team will coordinate an annual review of
Administrative Protocol 3723A: Information Security Evaluation of Third-Party Providers with District
Financial Aid, Procurement and Educational Programming and Institutional Effectiveness (EPIE)
leadership teams to help assure future relevant contracts are provided to the Information Security
Team prior to renewal to allow for timely security review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
The District is currently researching the export of user audit logs to the District’s analysis environment
to enable regular reviews. The new target to perform regular access reviews for SAP and SIS is the
end of Q1 2024.
F. Implement data encryption for Devices Storing Customer Data
The District engaged a third-party consultant to perform a comprehensive review of PeopleSoft security
controls, including the implementation of encryption of financial aid data within PeopleSoft. The results
are pending. Based upon those recommendations, the District will work with encryption providers to
develop and implement field-level encryption of financial aid data in SIS as appropriate.
With respect to end-user devices storing sensitive data, the District recently adopted workstation
hardening requirements that include whole-disk encryption for desktop and laptop computers used by
personnel who routinely access sensitive information, including financial aid data. The District will
implement the standards on workstations used by employees in financial aid and institutional research
by June 30, 2024. Once this is complete, additional workstations will be encrypted in order of potential
risk.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
The requests for direct changes in SAP production will be tracked and included in our help desk
requests so that an auditable trail can be created leading to the purpose and completion of the
production changes. Additionally, direct production change requests will be reviewed and approved
following the LACCD Change Control process. Minor updates that do not fall within the change control
guidelines will require managerial approval within the help desk system.
Personnel Responsible for Implementation: Carmen V. Lidz
Position of Responsible Personnel: Vice Chancellor & Chief Information Officer
Finding FA 2023‑03: Special Tests and Provision: Gramm Leach Bliley Act ‑ Student Information
Security – Formally Establish and Document Risk Acceptance Process, Perform Regular Backup
Restoration Tests, Perform Timely Access Revocation and Regular Access Reviews, Perform
Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards, Maintain and Review Logs
of Users' Activity for both SAP and PS SIS, Implement Data-at-Rest Encryption for Devices Storing
Customer Data, Enforce Strict Compliance on Controls over SAP Direct to Production Changes (Repeat
Finding)
Federal Program Information
Assistance Listing Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: Various
Federal Award Year: July 1, 2022, to June 30, 2023
Compliance Requirement: Special Tests and Provisions – Gramm Leach Bliley Act –
Student Information Security
Criteria or Specific Requirement:
The Gramm-Leach-Bliley Act (Pub. L. No. 106-102) (GLBA) requires financial institutions to explain their
information-sharing practices to their customers and to safeguard sensitive data (16 CFR 314). The Federal
Trade Commission considers Title IV-eligible institutions that participate in Title IV Educational Assistance
Programs as “financial institutions” and subject to the Gramm-Leach-Bliley Act because they appear to be
significantly engaged in wiring funds to consumers (16 CFR 313.3(k)(2)(vi)). Institutions agree to comply with
GLBA in their Program Participation Agreement with ED. Institutions must protect student financial aid
information, with particular attention to information provided to institutions by ED or otherwise obtained in
support of the administration of the Federal student financial aid programs (16 CFR 314.3; HEA 483(a)(3)(E)
and HEA 485B(d)(2)).
On December 9, 2021, the FTC issued final regulations for 16 CFR Part 314 to implement the GLBA
information safeguarding standards that institutions must implement. These regulations significantly modified
the requirements that institutions must meet under GLBA. The regulations established minimum standards that
institutions must meet. The FTC stated that it “believes many of the requirements outlined in the Final Rule are
so fundamental to any information security program that the information security programs of many financial
institutions will already include them if those programs are in compliance with the current Safeguards Rule.”
Institutions are required to be in compliance with the revised requirements no later than June 9, 2023.
Institutions are required to develop, implement, and maintain a comprehensive information security program
that is written in one or more readily accessible parts. The regulations require the written information security
program to include nine elements for institutions with 5,000 or more customers, (16 CFR 314.3(a)). The written
information security program for institutions with fewer than 5,000 customers must address seven elements
(16 CFR 314.3(a) and 16 CFR 314.6). In the preamble to the Final Rule, the FTC stated, “Proposed § 314.4
[Elements] altered the current Rule’s required elements of an information security program and added several
new elements.” The FTC also stated, “[t]he elements for the information security programs set forth in this
section [16 CFR 314.4} are high-level principles that set forth basic issues the programs must address, and do
not prescribe how they will be addressed.” The elements that an institution must address in its written
information security program are at 16 CFR 314.4. At a minimum, an institution’s written information security
program:
• Designates a qualified individual responsible for overseeing and implementing the institution’s information
security program and enforcing the information security program in compliance (16 CFR 314.4(a)).
• Provides for the information security program to be based on a risk assessment that identifies reasonably
foreseeable internal and external risks to the security, confidentiality, and integrity of customer information
(as the term customer information applies to the institution) that could result in the unauthorized disclosure,
misuse, alteration, destruction, or other compromise of such information, and assesses the sufficiency of
any safeguards in place to control these risks (16 CFR 314.4(b)).
• Provides for the design and implementation of safeguards to control the risks the institution identifies
through its risk assessment (16 CFR 314.4(c)). At a minimum, the institution’s written information security
program must address the implementation of the minimum safeguards identified in 16 CFR 314.4(c)(1)
through (8). The eight minimum safeguards that the written information security program must address are
summarized as follows:
– Implement and periodically review access controls.
– Conduct a periodic inventory of data, noting where it’s collected, stored, or transmitted.
– Encrypt customer information on the institution’s system and when it’s in transit.
– Assess apps developed by the institution.
– Implement multi-factor authentication for anyone accessing customer information on the institution’s
system.
– Dispose of customer information securely
– Anticipate and evaluate changes to the information system or network.
– Maintain a log of authorized users’ activity and keep an eye out for unauthorized access.
• Provides for the institution to regularly test or otherwise monitor the effectiveness of the safeguards it has
implemented (16 CFR 314.4(d)).
• Provides for the implementation of policies and procedures to ensure that personnel are able to enact the
information security program (16 CFR 314.4(e)(1)).
• Addresses how the institution will oversee its information system service providers (16 CFR 314.4(f)).
• Provides for the evaluation and adjustment of its information security program in light of the results of the
required testing and monitoring; any material changes to its operations or business arrangements; the
results of the required risk assessments; or any other circumstances that it knows or has reason to know
may have a material impact the institution’s information security program (16 CFR 314.4(g)).
The first element that an institution’s written information security program must address is the designation of an
individual with responsibility for implementing and enforcing an institution’s written information security
program. The regulations refer to this individual as the Qualified Individual. If an institution has not designated a
Qualified Individual, it is not in compliance with the GLBA requirements. The Qualified Individual has ultimate
responsibility and accountability for implementing and enforcing the institution’s information security program
(16 CFR 314.4(a)). The regulations do provide for an institution to use a service provider as a Qualified
Individual. In cases where an institution uses a service provider as the Qualified Individual, the institution must:
• Retain responsibility for compliance with GLBA.
• Designate a senior member of its personnel responsible for direction and oversight of the Qualified
Individual; and
• Require the service provider or affiliate to maintain an information security program that protects the
institution in accordance with the requirements of the regulations at 16 CFR Part 314(a)(1) through (3).
Because the written information security program may be in one or more readily accessible parts and the
Qualified Individual is responsible for implementing and monitoring the information security program, ED
expects that the Qualified Individual would be able to provide the written information security program that
addresses the elements required for the written information security program to the auditors.
Identified Conditions:
A. Formally Establish and Document Risk Acceptance Process (repeat finding)
The District’s Written Information Security Program does not explicitly define the criteria for accepting
potential risks. A related process document, which was committed to be completed in the prior year, is
still in development as of September 2023.
B. Perform Regular Backup Restoration Tests (repeat finding)
The District performed a comprehensive Tabletop Disaster Recovery (DR) exercise for both SAP and
SIS during the audit period. As part of the exercise, the DR Team simulated a scenario, fully supported
with recovery considerations, steps, results, recovery challenges, and key recommendations to
improve moving forward – the exercise was also reviewed and approved by the Vice Chancellor and
Chief Information Officer. However, a key activity which is the actual backup restoration testing was not
performed as part of the tabletop exercise or at any point during the audit period.
C. Perform Timely Access Revocation and Regular Access Reviews (repeat finding)
Based on a test of controls to verify that access of terminated employees is timely removed in Active
Directory (AD), SAP, and PeopleSoft Student Information System (PS SIS), we noted that out of the
terminated employees subject to testing:
1. 13 users were active in AD, three (3) of whom have logged in after their termination.
2. 76 users were still active in SAP, 19 of whom have logged in after their termination.
3. 81 users were still active in PS SIS, 42 of whom have logged in after their termination.
Moreover, while a privileged user access review is performed for AD, there is no review performed to
check the validity of regular users in AD and the validity and appropriateness of users in SAP and SIS.
Employee functions and/or responsibilities may change over time; thus, previously provisioned access
may no longer be valid. Furthermore, a new compliance requirement, which requires institutions to
perform periodic access reviews for physical access in the data centers where the critical student
information systems are hosted [16 CFR 314.4(c)(1)], was also not performed during the audit period.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
16 CFR 314.4(f), a new compliance requirement, requires institutions to periodically assess service
providers based on the risk they present and the continued adequacy of their safeguards. However, we
noted that contracts for the following service providers were renewed by the District without sufficient
information security review from 2020 to 2022 and the period thereafter.
a. XAP – used for requesting, sending, and receiving electronic transcripts.
b. Bank Mobile – used for student refund processing.
c. Campus Logic – used for student online verification processing.
These contracts were instituted before the adoption of the District’s Information Security Program and
thus, were adopted and renewed thereafter without an Information Security Review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
A new compliance requirement, which requires institutions to monitor and log the activity of authorized
users and detect unauthorized access or use of, or tampering with, customer information by such users
[16 CFR 314.4(c)(8)], is not currently implemented by the District.
F. Implement Data-at-Rest Encryption for Devices Storing Customer Data
A new compliance requirement, which requires institutions to protect by encryption all students’ data
held at rest [16 CFR 314.4(c)(3)], is not currently implemented by the District (e.g., SAP and SIS
servers).
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
SAP production client was opened on 10/03/2022 and 11/09/2022 without sufficient documentation that
it was authorized and approved. Opening the production client, if not controlled, carries a significant
risk since changes can be made directly to the production environment without transport requests,
thereby circumventing any established change management controls.
Cause and Effect:
A. Formally Establish and Document Risk Acceptance Process
The absence of a formal risk acceptance process can lead to inappropriate risk treatment and a lack of
oversight in managing risks, resulting in inconsistent approaches that may not align with the District’s
overall risk tolerance.
B. Perform Regular Backup Restoration Tests
Lack of proper restoration testing may hinder the District from recovering its data completely and
accurately.
C. Perform Timely Access Revocation and Regular Access Reviews
Failure to deactivate or remove accounts of terminated employees timely may result in unauthorized
access to the District’s resources and sensitive information. Furthermore, the absence of user access
reviews increases the risk of inappropriate users or access remaining undetected over time which may
be used to process unauthorized transactions or view confidential information.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Non-performance of review may result in the District relying on IT service providers with ineffective
information security controls making them susceptible to data breaches. A breach in a third-party
system may expose the District to financial, operational, legal, and reputational damages.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Without adequate logging and monitoring of users’ activity, security incidents, including suspicious and
unauthorized activities may not be detected and responded to in a timely manner.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
Data that is held to devices without encryption is vulnerable to unauthorized access, especially if
physical and logical controls are compromised. In the event of a breach, sensitive data, such as
students’ information may be exposed.
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
Insufficient controls over client opening may result in the implementation of unauthorized changes
directly into the production environment. This increases the risk that changes to the system may not
follow the District’s change management process (documentation, authorization, testing, and approval)
prior to the implementation of the change to the production environment.
Recommendation:
A. Formally Establish and Document Risk Acceptance Process
We recommend that the District establish and implement the District’s Risk Acceptance process that
details the criteria and conditions for accepting potential risks. We also recommend that the District
ensure this is aligned with the District’s objectives, overall risk tolerance, and current practices in
identifying, assessing, and mitigating risks.
B. Perform Regular Backup Restoration Tests
Together with the DR tabletop exercises, we recommend that backup restoration tests should be
performed at least once per year. Detailed testing schedules should be drafted based on DRP
specifications and required restoration of the critical systems. Documentation of such tests should be
maintained for full management awareness and approval.
C. Perform Timely Access Revocation and Regular Access Reviews
1. We recommend that the District revoke the access of terminated employees and review the
activities performed by those accounts after their termination date to ensure the validity and
appropriateness of activities/transactions performed by these accounts, if any.
2. Concurrently, the District should improve the account termination procedures to ensure that access
to terminated employees is timely revoked.
3. We also recommend that regular access reviews for AD, SAP, PS SIS, and the physical accesses
to data centers where these systems are hosted, are performed, and documented (for both regular
and privileged users) to ensure that only valid and appropriate users remain in the system and
have access to relevant information. The review may include, but is not limited to the following:
a. Document management control over the completeness and accuracy of the reports used in the
review.
b. Define designated functions/roles to perform the review.
c. Monitor timeliness of the performance of the review and execution of corrective actions as a
result of the review
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Revisit the District’s current practices for evaluating third-party provider’s information security to ensure
that all third-party are reviewed and evaluated regularly. At the minimum, the process should involve
continuous monitoring, contractual provisions summarizing security requirements, and a strategy for
addressing security vulnerabilities identified during reviews.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Formally establish a process for logging and monitoring users’ activity which includes collection,
retention, regular review, and documentation of user activity logs. The review should be aligned with
the District’s access management practices to ensure that only authorized users are allowed to access
information that is aligned with their functions and responsibilities.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
The District should establish and implement data-at-rest encryption for endpoint devices to ensure that
data is inaccessible to unauthorized users in cases when logical and physical measures are
compromised.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
Ensure that production client openings, particularly those related to direct production changes, strictly
adhere to the District’s Change Management Procedure. These client openings and the related
changes should be properly documented, authorized, and validated prior to implementation.
Views of Responsible Officials and Planned Corrective Actions:
A. Formally Establish and Document Risk Acceptance Process
Requirements for risk assessments and risk acceptance processes to comply with GLBA were
expanded in June of 2023. The District engaged a third-party consultant to conduct a GLBA-compliant
risk assessment and advise on recommended changes to the District’s Written Information Security
Plan (WISP) to comply with the new requirements. The findings and recommendations were presented
to the District in October of 2023 and are currently under review. The District will initiate a project to
formalize risk acceptance by December 31st, 2023, and implement the risk acceptance process by
June 30, 2024.
B. Perform Regular Backup Restoration Tests
The District has engaged with a third party to build a testing environment to physically test restoration
of the SIS environment. Initiation of the project is pending processing of the Purchase Order. The
District anticipates completion of the restoration by December 31st, 2023.
With respect to SAP, the District is currently engaged in an effort to migrate the SAP database to
HANA. When this project is complete, the same test environment will be capable of performing physical
recovery tests for SAP. The HANA migration is estimated to be completed on February 28th, 2024.
C. Perform Timely Access Revocation and Regular Access Reviews
With respect to the District’s Single Sign-On (ADFS or SSO) environments, the District engaged
professional services consultants to address this item by automating the disablement of employee
accounts based upon the termination of assignment. The work is currently underway. The target
completion of the process is December 15, 2023. With respect to the SAP environment, the District has
engaged with a vendor to implement Multifactor Authentication (MFA) in the SAP environment. Work
will begin upon processing the Purchase Order. Once both efforts are complete, disabling employee
accounts in SSO, SIS and SAP will be performed automatically based upon the termination of
assignments according to criteria established by Human Resources.
With respect to access reviews of SIS and SAP, the District is currently researching the export of user
audit logs to the District’s analysis environment to enable regular reviews. The new target to perform
regular access reviews for SAP and SIS is the end of Q1 2024.
With respect to physical access reviews, the District Information Security Team will perform an annual
review of relevant operational protocols for data center access with the appropriate internal teams and
perform an audit of data access at a minimum of once per year. The first annual protocol review will be
completed by December 1st, 2023. The first annual audit will commence no later than March 1st, 2024.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
To prevent recurrence, the LACCD Information Security Team will coordinate an annual review of
Administrative Protocol 3723A: Information Security Evaluation of Third-Party Providers with District
Financial Aid, Procurement and Educational Programming and Institutional Effectiveness (EPIE)
leadership teams to help assure future relevant contracts are provided to the Information Security
Team prior to renewal to allow for timely security review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
The District is currently researching the export of user audit logs to the District’s analysis environment
to enable regular reviews. The new target to perform regular access reviews for SAP and SIS is the
end of Q1 2024.
F. Implement data encryption for Devices Storing Customer Data
The District engaged a third-party consultant to perform a comprehensive review of PeopleSoft security
controls, including the implementation of encryption of financial aid data within PeopleSoft. The results
are pending. Based upon those recommendations, the District will work with encryption providers to
develop and implement field-level encryption of financial aid data in SIS as appropriate.
With respect to end-user devices storing sensitive data, the District recently adopted workstation
hardening requirements that include whole-disk encryption for desktop and laptop computers used by
personnel who routinely access sensitive information, including financial aid data. The District will
implement the standards on workstations used by employees in financial aid and institutional research
by June 30, 2024. Once this is complete, additional workstations will be encrypted in order of potential
risk.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
The requests for direct changes in SAP production will be tracked and included in our help desk
requests so that an auditable trail can be created leading to the purpose and completion of the
production changes. Additionally, direct production change requests will be reviewed and approved
following the LACCD Change Control process. Minor updates that do not fall within the change control
guidelines will require managerial approval within the help desk system.
Personnel Responsible for Implementation: Carmen V. Lidz
Position of Responsible Personnel: Vice Chancellor & Chief Information Officer
Finding FA 2023‑03: Special Tests and Provision: Gramm Leach Bliley Act ‑ Student Information
Security – Formally Establish and Document Risk Acceptance Process, Perform Regular Backup
Restoration Tests, Perform Timely Access Revocation and Regular Access Reviews, Perform
Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards, Maintain and Review Logs
of Users' Activity for both SAP and PS SIS, Implement Data-at-Rest Encryption for Devices Storing
Customer Data, Enforce Strict Compliance on Controls over SAP Direct to Production Changes (Repeat
Finding)
Federal Program Information
Assistance Listing Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: Various
Federal Award Year: July 1, 2022, to June 30, 2023
Compliance Requirement: Special Tests and Provisions – Gramm Leach Bliley Act –
Student Information Security
Criteria or Specific Requirement:
The Gramm-Leach-Bliley Act (Pub. L. No. 106-102) (GLBA) requires financial institutions to explain their
information-sharing practices to their customers and to safeguard sensitive data (16 CFR 314). The Federal
Trade Commission considers Title IV-eligible institutions that participate in Title IV Educational Assistance
Programs as “financial institutions” and subject to the Gramm-Leach-Bliley Act because they appear to be
significantly engaged in wiring funds to consumers (16 CFR 313.3(k)(2)(vi)). Institutions agree to comply with
GLBA in their Program Participation Agreement with ED. Institutions must protect student financial aid
information, with particular attention to information provided to institutions by ED or otherwise obtained in
support of the administration of the Federal student financial aid programs (16 CFR 314.3; HEA 483(a)(3)(E)
and HEA 485B(d)(2)).
On December 9, 2021, the FTC issued final regulations for 16 CFR Part 314 to implement the GLBA
information safeguarding standards that institutions must implement. These regulations significantly modified
the requirements that institutions must meet under GLBA. The regulations established minimum standards that
institutions must meet. The FTC stated that it “believes many of the requirements outlined in the Final Rule are
so fundamental to any information security program that the information security programs of many financial
institutions will already include them if those programs are in compliance with the current Safeguards Rule.”
Institutions are required to be in compliance with the revised requirements no later than June 9, 2023.
Institutions are required to develop, implement, and maintain a comprehensive information security program
that is written in one or more readily accessible parts. The regulations require the written information security
program to include nine elements for institutions with 5,000 or more customers, (16 CFR 314.3(a)). The written
information security program for institutions with fewer than 5,000 customers must address seven elements
(16 CFR 314.3(a) and 16 CFR 314.6). In the preamble to the Final Rule, the FTC stated, “Proposed § 314.4
[Elements] altered the current Rule’s required elements of an information security program and added several
new elements.” The FTC also stated, “[t]he elements for the information security programs set forth in this
section [16 CFR 314.4} are high-level principles that set forth basic issues the programs must address, and do
not prescribe how they will be addressed.” The elements that an institution must address in its written
information security program are at 16 CFR 314.4. At a minimum, an institution’s written information security
program:
• Designates a qualified individual responsible for overseeing and implementing the institution’s information
security program and enforcing the information security program in compliance (16 CFR 314.4(a)).
• Provides for the information security program to be based on a risk assessment that identifies reasonably
foreseeable internal and external risks to the security, confidentiality, and integrity of customer information
(as the term customer information applies to the institution) that could result in the unauthorized disclosure,
misuse, alteration, destruction, or other compromise of such information, and assesses the sufficiency of
any safeguards in place to control these risks (16 CFR 314.4(b)).
• Provides for the design and implementation of safeguards to control the risks the institution identifies
through its risk assessment (16 CFR 314.4(c)). At a minimum, the institution’s written information security
program must address the implementation of the minimum safeguards identified in 16 CFR 314.4(c)(1)
through (8). The eight minimum safeguards that the written information security program must address are
summarized as follows:
– Implement and periodically review access controls.
– Conduct a periodic inventory of data, noting where it’s collected, stored, or transmitted.
– Encrypt customer information on the institution’s system and when it’s in transit.
– Assess apps developed by the institution.
– Implement multi-factor authentication for anyone accessing customer information on the institution’s
system.
– Dispose of customer information securely
– Anticipate and evaluate changes to the information system or network.
– Maintain a log of authorized users’ activity and keep an eye out for unauthorized access.
• Provides for the institution to regularly test or otherwise monitor the effectiveness of the safeguards it has
implemented (16 CFR 314.4(d)).
• Provides for the implementation of policies and procedures to ensure that personnel are able to enact the
information security program (16 CFR 314.4(e)(1)).
• Addresses how the institution will oversee its information system service providers (16 CFR 314.4(f)).
• Provides for the evaluation and adjustment of its information security program in light of the results of the
required testing and monitoring; any material changes to its operations or business arrangements; the
results of the required risk assessments; or any other circumstances that it knows or has reason to know
may have a material impact the institution’s information security program (16 CFR 314.4(g)).
The first element that an institution’s written information security program must address is the designation of an
individual with responsibility for implementing and enforcing an institution’s written information security
program. The regulations refer to this individual as the Qualified Individual. If an institution has not designated a
Qualified Individual, it is not in compliance with the GLBA requirements. The Qualified Individual has ultimate
responsibility and accountability for implementing and enforcing the institution’s information security program
(16 CFR 314.4(a)). The regulations do provide for an institution to use a service provider as a Qualified
Individual. In cases where an institution uses a service provider as the Qualified Individual, the institution must:
• Retain responsibility for compliance with GLBA.
• Designate a senior member of its personnel responsible for direction and oversight of the Qualified
Individual; and
• Require the service provider or affiliate to maintain an information security program that protects the
institution in accordance with the requirements of the regulations at 16 CFR Part 314(a)(1) through (3).
Because the written information security program may be in one or more readily accessible parts and the
Qualified Individual is responsible for implementing and monitoring the information security program, ED
expects that the Qualified Individual would be able to provide the written information security program that
addresses the elements required for the written information security program to the auditors.
Identified Conditions:
A. Formally Establish and Document Risk Acceptance Process (repeat finding)
The District’s Written Information Security Program does not explicitly define the criteria for accepting
potential risks. A related process document, which was committed to be completed in the prior year, is
still in development as of September 2023.
B. Perform Regular Backup Restoration Tests (repeat finding)
The District performed a comprehensive Tabletop Disaster Recovery (DR) exercise for both SAP and
SIS during the audit period. As part of the exercise, the DR Team simulated a scenario, fully supported
with recovery considerations, steps, results, recovery challenges, and key recommendations to
improve moving forward – the exercise was also reviewed and approved by the Vice Chancellor and
Chief Information Officer. However, a key activity which is the actual backup restoration testing was not
performed as part of the tabletop exercise or at any point during the audit period.
C. Perform Timely Access Revocation and Regular Access Reviews (repeat finding)
Based on a test of controls to verify that access of terminated employees is timely removed in Active
Directory (AD), SAP, and PeopleSoft Student Information System (PS SIS), we noted that out of the
terminated employees subject to testing:
1. 13 users were active in AD, three (3) of whom have logged in after their termination.
2. 76 users were still active in SAP, 19 of whom have logged in after their termination.
3. 81 users were still active in PS SIS, 42 of whom have logged in after their termination.
Moreover, while a privileged user access review is performed for AD, there is no review performed to
check the validity of regular users in AD and the validity and appropriateness of users in SAP and SIS.
Employee functions and/or responsibilities may change over time; thus, previously provisioned access
may no longer be valid. Furthermore, a new compliance requirement, which requires institutions to
perform periodic access reviews for physical access in the data centers where the critical student
information systems are hosted [16 CFR 314.4(c)(1)], was also not performed during the audit period.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
16 CFR 314.4(f), a new compliance requirement, requires institutions to periodically assess service
providers based on the risk they present and the continued adequacy of their safeguards. However, we
noted that contracts for the following service providers were renewed by the District without sufficient
information security review from 2020 to 2022 and the period thereafter.
a. XAP – used for requesting, sending, and receiving electronic transcripts.
b. Bank Mobile – used for student refund processing.
c. Campus Logic – used for student online verification processing.
These contracts were instituted before the adoption of the District’s Information Security Program and
thus, were adopted and renewed thereafter without an Information Security Review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
A new compliance requirement, which requires institutions to monitor and log the activity of authorized
users and detect unauthorized access or use of, or tampering with, customer information by such users
[16 CFR 314.4(c)(8)], is not currently implemented by the District.
F. Implement Data-at-Rest Encryption for Devices Storing Customer Data
A new compliance requirement, which requires institutions to protect by encryption all students’ data
held at rest [16 CFR 314.4(c)(3)], is not currently implemented by the District (e.g., SAP and SIS
servers).
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
SAP production client was opened on 10/03/2022 and 11/09/2022 without sufficient documentation that
it was authorized and approved. Opening the production client, if not controlled, carries a significant
risk since changes can be made directly to the production environment without transport requests,
thereby circumventing any established change management controls.
Cause and Effect:
A. Formally Establish and Document Risk Acceptance Process
The absence of a formal risk acceptance process can lead to inappropriate risk treatment and a lack of
oversight in managing risks, resulting in inconsistent approaches that may not align with the District’s
overall risk tolerance.
B. Perform Regular Backup Restoration Tests
Lack of proper restoration testing may hinder the District from recovering its data completely and
accurately.
C. Perform Timely Access Revocation and Regular Access Reviews
Failure to deactivate or remove accounts of terminated employees timely may result in unauthorized
access to the District’s resources and sensitive information. Furthermore, the absence of user access
reviews increases the risk of inappropriate users or access remaining undetected over time which may
be used to process unauthorized transactions or view confidential information.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Non-performance of review may result in the District relying on IT service providers with ineffective
information security controls making them susceptible to data breaches. A breach in a third-party
system may expose the District to financial, operational, legal, and reputational damages.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Without adequate logging and monitoring of users’ activity, security incidents, including suspicious and
unauthorized activities may not be detected and responded to in a timely manner.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
Data that is held to devices without encryption is vulnerable to unauthorized access, especially if
physical and logical controls are compromised. In the event of a breach, sensitive data, such as
students’ information may be exposed.
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
Insufficient controls over client opening may result in the implementation of unauthorized changes
directly into the production environment. This increases the risk that changes to the system may not
follow the District’s change management process (documentation, authorization, testing, and approval)
prior to the implementation of the change to the production environment.
Recommendation:
A. Formally Establish and Document Risk Acceptance Process
We recommend that the District establish and implement the District’s Risk Acceptance process that
details the criteria and conditions for accepting potential risks. We also recommend that the District
ensure this is aligned with the District’s objectives, overall risk tolerance, and current practices in
identifying, assessing, and mitigating risks.
B. Perform Regular Backup Restoration Tests
Together with the DR tabletop exercises, we recommend that backup restoration tests should be
performed at least once per year. Detailed testing schedules should be drafted based on DRP
specifications and required restoration of the critical systems. Documentation of such tests should be
maintained for full management awareness and approval.
C. Perform Timely Access Revocation and Regular Access Reviews
1. We recommend that the District revoke the access of terminated employees and review the
activities performed by those accounts after their termination date to ensure the validity and
appropriateness of activities/transactions performed by these accounts, if any.
2. Concurrently, the District should improve the account termination procedures to ensure that access
to terminated employees is timely revoked.
3. We also recommend that regular access reviews for AD, SAP, PS SIS, and the physical accesses
to data centers where these systems are hosted, are performed, and documented (for both regular
and privileged users) to ensure that only valid and appropriate users remain in the system and
have access to relevant information. The review may include, but is not limited to the following:
a. Document management control over the completeness and accuracy of the reports used in the
review.
b. Define designated functions/roles to perform the review.
c. Monitor timeliness of the performance of the review and execution of corrective actions as a
result of the review
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Revisit the District’s current practices for evaluating third-party provider’s information security to ensure
that all third-party are reviewed and evaluated regularly. At the minimum, the process should involve
continuous monitoring, contractual provisions summarizing security requirements, and a strategy for
addressing security vulnerabilities identified during reviews.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Formally establish a process for logging and monitoring users’ activity which includes collection,
retention, regular review, and documentation of user activity logs. The review should be aligned with
the District’s access management practices to ensure that only authorized users are allowed to access
information that is aligned with their functions and responsibilities.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
The District should establish and implement data-at-rest encryption for endpoint devices to ensure that
data is inaccessible to unauthorized users in cases when logical and physical measures are
compromised.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
Ensure that production client openings, particularly those related to direct production changes, strictly
adhere to the District’s Change Management Procedure. These client openings and the related
changes should be properly documented, authorized, and validated prior to implementation.
Views of Responsible Officials and Planned Corrective Actions:
A. Formally Establish and Document Risk Acceptance Process
Requirements for risk assessments and risk acceptance processes to comply with GLBA were
expanded in June of 2023. The District engaged a third-party consultant to conduct a GLBA-compliant
risk assessment and advise on recommended changes to the District’s Written Information Security
Plan (WISP) to comply with the new requirements. The findings and recommendations were presented
to the District in October of 2023 and are currently under review. The District will initiate a project to
formalize risk acceptance by December 31st, 2023, and implement the risk acceptance process by
June 30, 2024.
B. Perform Regular Backup Restoration Tests
The District has engaged with a third party to build a testing environment to physically test restoration
of the SIS environment. Initiation of the project is pending processing of the Purchase Order. The
District anticipates completion of the restoration by December 31st, 2023.
With respect to SAP, the District is currently engaged in an effort to migrate the SAP database to
HANA. When this project is complete, the same test environment will be capable of performing physical
recovery tests for SAP. The HANA migration is estimated to be completed on February 28th, 2024.
C. Perform Timely Access Revocation and Regular Access Reviews
With respect to the District’s Single Sign-On (ADFS or SSO) environments, the District engaged
professional services consultants to address this item by automating the disablement of employee
accounts based upon the termination of assignment. The work is currently underway. The target
completion of the process is December 15, 2023. With respect to the SAP environment, the District has
engaged with a vendor to implement Multifactor Authentication (MFA) in the SAP environment. Work
will begin upon processing the Purchase Order. Once both efforts are complete, disabling employee
accounts in SSO, SIS and SAP will be performed automatically based upon the termination of
assignments according to criteria established by Human Resources.
With respect to access reviews of SIS and SAP, the District is currently researching the export of user
audit logs to the District’s analysis environment to enable regular reviews. The new target to perform
regular access reviews for SAP and SIS is the end of Q1 2024.
With respect to physical access reviews, the District Information Security Team will perform an annual
review of relevant operational protocols for data center access with the appropriate internal teams and
perform an audit of data access at a minimum of once per year. The first annual protocol review will be
completed by December 1st, 2023. The first annual audit will commence no later than March 1st, 2024.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
To prevent recurrence, the LACCD Information Security Team will coordinate an annual review of
Administrative Protocol 3723A: Information Security Evaluation of Third-Party Providers with District
Financial Aid, Procurement and Educational Programming and Institutional Effectiveness (EPIE)
leadership teams to help assure future relevant contracts are provided to the Information Security
Team prior to renewal to allow for timely security review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
The District is currently researching the export of user audit logs to the District’s analysis environment
to enable regular reviews. The new target to perform regular access reviews for SAP and SIS is the
end of Q1 2024.
F. Implement data encryption for Devices Storing Customer Data
The District engaged a third-party consultant to perform a comprehensive review of PeopleSoft security
controls, including the implementation of encryption of financial aid data within PeopleSoft. The results
are pending. Based upon those recommendations, the District will work with encryption providers to
develop and implement field-level encryption of financial aid data in SIS as appropriate.
With respect to end-user devices storing sensitive data, the District recently adopted workstation
hardening requirements that include whole-disk encryption for desktop and laptop computers used by
personnel who routinely access sensitive information, including financial aid data. The District will
implement the standards on workstations used by employees in financial aid and institutional research
by June 30, 2024. Once this is complete, additional workstations will be encrypted in order of potential
risk.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
The requests for direct changes in SAP production will be tracked and included in our help desk
requests so that an auditable trail can be created leading to the purpose and completion of the
production changes. Additionally, direct production change requests will be reviewed and approved
following the LACCD Change Control process. Minor updates that do not fall within the change control
guidelines will require managerial approval within the help desk system.
Personnel Responsible for Implementation: Carmen V. Lidz
Position of Responsible Personnel: Vice Chancellor & Chief Information Officer
Finding FA 2023‑03: Special Tests and Provision: Gramm Leach Bliley Act ‑ Student Information
Security – Formally Establish and Document Risk Acceptance Process, Perform Regular Backup
Restoration Tests, Perform Timely Access Revocation and Regular Access Reviews, Perform
Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards, Maintain and Review Logs
of Users' Activity for both SAP and PS SIS, Implement Data-at-Rest Encryption for Devices Storing
Customer Data, Enforce Strict Compliance on Controls over SAP Direct to Production Changes (Repeat
Finding)
Federal Program Information
Assistance Listing Number: ALN 84.007, 84.033, 84.038, 84.048, 84.063 and 84.268
Federal Program Name: Student Financial Assistance Cluster
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: Various
Federal Award Year: July 1, 2022, to June 30, 2023
Compliance Requirement: Special Tests and Provisions – Gramm Leach Bliley Act –
Student Information Security
Criteria or Specific Requirement:
The Gramm-Leach-Bliley Act (Pub. L. No. 106-102) (GLBA) requires financial institutions to explain their
information-sharing practices to their customers and to safeguard sensitive data (16 CFR 314). The Federal
Trade Commission considers Title IV-eligible institutions that participate in Title IV Educational Assistance
Programs as “financial institutions” and subject to the Gramm-Leach-Bliley Act because they appear to be
significantly engaged in wiring funds to consumers (16 CFR 313.3(k)(2)(vi)). Institutions agree to comply with
GLBA in their Program Participation Agreement with ED. Institutions must protect student financial aid
information, with particular attention to information provided to institutions by ED or otherwise obtained in
support of the administration of the Federal student financial aid programs (16 CFR 314.3; HEA 483(a)(3)(E)
and HEA 485B(d)(2)).
On December 9, 2021, the FTC issued final regulations for 16 CFR Part 314 to implement the GLBA
information safeguarding standards that institutions must implement. These regulations significantly modified
the requirements that institutions must meet under GLBA. The regulations established minimum standards that
institutions must meet. The FTC stated that it “believes many of the requirements outlined in the Final Rule are
so fundamental to any information security program that the information security programs of many financial
institutions will already include them if those programs are in compliance with the current Safeguards Rule.”
Institutions are required to be in compliance with the revised requirements no later than June 9, 2023.
Institutions are required to develop, implement, and maintain a comprehensive information security program
that is written in one or more readily accessible parts. The regulations require the written information security
program to include nine elements for institutions with 5,000 or more customers, (16 CFR 314.3(a)). The written
information security program for institutions with fewer than 5,000 customers must address seven elements
(16 CFR 314.3(a) and 16 CFR 314.6). In the preamble to the Final Rule, the FTC stated, “Proposed § 314.4
[Elements] altered the current Rule’s required elements of an information security program and added several
new elements.” The FTC also stated, “[t]he elements for the information security programs set forth in this
section [16 CFR 314.4} are high-level principles that set forth basic issues the programs must address, and do
not prescribe how they will be addressed.” The elements that an institution must address in its written
information security program are at 16 CFR 314.4. At a minimum, an institution’s written information security
program:
• Designates a qualified individual responsible for overseeing and implementing the institution’s information
security program and enforcing the information security program in compliance (16 CFR 314.4(a)).
• Provides for the information security program to be based on a risk assessment that identifies reasonably
foreseeable internal and external risks to the security, confidentiality, and integrity of customer information
(as the term customer information applies to the institution) that could result in the unauthorized disclosure,
misuse, alteration, destruction, or other compromise of such information, and assesses the sufficiency of
any safeguards in place to control these risks (16 CFR 314.4(b)).
• Provides for the design and implementation of safeguards to control the risks the institution identifies
through its risk assessment (16 CFR 314.4(c)). At a minimum, the institution’s written information security
program must address the implementation of the minimum safeguards identified in 16 CFR 314.4(c)(1)
through (8). The eight minimum safeguards that the written information security program must address are
summarized as follows:
– Implement and periodically review access controls.
– Conduct a periodic inventory of data, noting where it’s collected, stored, or transmitted.
– Encrypt customer information on the institution’s system and when it’s in transit.
– Assess apps developed by the institution.
– Implement multi-factor authentication for anyone accessing customer information on the institution’s
system.
– Dispose of customer information securely
– Anticipate and evaluate changes to the information system or network.
– Maintain a log of authorized users’ activity and keep an eye out for unauthorized access.
• Provides for the institution to regularly test or otherwise monitor the effectiveness of the safeguards it has
implemented (16 CFR 314.4(d)).
• Provides for the implementation of policies and procedures to ensure that personnel are able to enact the
information security program (16 CFR 314.4(e)(1)).
• Addresses how the institution will oversee its information system service providers (16 CFR 314.4(f)).
• Provides for the evaluation and adjustment of its information security program in light of the results of the
required testing and monitoring; any material changes to its operations or business arrangements; the
results of the required risk assessments; or any other circumstances that it knows or has reason to know
may have a material impact the institution’s information security program (16 CFR 314.4(g)).
The first element that an institution’s written information security program must address is the designation of an
individual with responsibility for implementing and enforcing an institution’s written information security
program. The regulations refer to this individual as the Qualified Individual. If an institution has not designated a
Qualified Individual, it is not in compliance with the GLBA requirements. The Qualified Individual has ultimate
responsibility and accountability for implementing and enforcing the institution’s information security program
(16 CFR 314.4(a)). The regulations do provide for an institution to use a service provider as a Qualified
Individual. In cases where an institution uses a service provider as the Qualified Individual, the institution must:
• Retain responsibility for compliance with GLBA.
• Designate a senior member of its personnel responsible for direction and oversight of the Qualified
Individual; and
• Require the service provider or affiliate to maintain an information security program that protects the
institution in accordance with the requirements of the regulations at 16 CFR Part 314(a)(1) through (3).
Because the written information security program may be in one or more readily accessible parts and the
Qualified Individual is responsible for implementing and monitoring the information security program, ED
expects that the Qualified Individual would be able to provide the written information security program that
addresses the elements required for the written information security program to the auditors.
Identified Conditions:
A. Formally Establish and Document Risk Acceptance Process (repeat finding)
The District’s Written Information Security Program does not explicitly define the criteria for accepting
potential risks. A related process document, which was committed to be completed in the prior year, is
still in development as of September 2023.
B. Perform Regular Backup Restoration Tests (repeat finding)
The District performed a comprehensive Tabletop Disaster Recovery (DR) exercise for both SAP and
SIS during the audit period. As part of the exercise, the DR Team simulated a scenario, fully supported
with recovery considerations, steps, results, recovery challenges, and key recommendations to
improve moving forward – the exercise was also reviewed and approved by the Vice Chancellor and
Chief Information Officer. However, a key activity which is the actual backup restoration testing was not
performed as part of the tabletop exercise or at any point during the audit period.
C. Perform Timely Access Revocation and Regular Access Reviews (repeat finding)
Based on a test of controls to verify that access of terminated employees is timely removed in Active
Directory (AD), SAP, and PeopleSoft Student Information System (PS SIS), we noted that out of the
terminated employees subject to testing:
1. 13 users were active in AD, three (3) of whom have logged in after their termination.
2. 76 users were still active in SAP, 19 of whom have logged in after their termination.
3. 81 users were still active in PS SIS, 42 of whom have logged in after their termination.
Moreover, while a privileged user access review is performed for AD, there is no review performed to
check the validity of regular users in AD and the validity and appropriateness of users in SAP and SIS.
Employee functions and/or responsibilities may change over time; thus, previously provisioned access
may no longer be valid. Furthermore, a new compliance requirement, which requires institutions to
perform periodic access reviews for physical access in the data centers where the critical student
information systems are hosted [16 CFR 314.4(c)(1)], was also not performed during the audit period.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
16 CFR 314.4(f), a new compliance requirement, requires institutions to periodically assess service
providers based on the risk they present and the continued adequacy of their safeguards. However, we
noted that contracts for the following service providers were renewed by the District without sufficient
information security review from 2020 to 2022 and the period thereafter.
a. XAP – used for requesting, sending, and receiving electronic transcripts.
b. Bank Mobile – used for student refund processing.
c. Campus Logic – used for student online verification processing.
These contracts were instituted before the adoption of the District’s Information Security Program and
thus, were adopted and renewed thereafter without an Information Security Review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
A new compliance requirement, which requires institutions to monitor and log the activity of authorized
users and detect unauthorized access or use of, or tampering with, customer information by such users
[16 CFR 314.4(c)(8)], is not currently implemented by the District.
F. Implement Data-at-Rest Encryption for Devices Storing Customer Data
A new compliance requirement, which requires institutions to protect by encryption all students’ data
held at rest [16 CFR 314.4(c)(3)], is not currently implemented by the District (e.g., SAP and SIS
servers).
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
SAP production client was opened on 10/03/2022 and 11/09/2022 without sufficient documentation that
it was authorized and approved. Opening the production client, if not controlled, carries a significant
risk since changes can be made directly to the production environment without transport requests,
thereby circumventing any established change management controls.
Cause and Effect:
A. Formally Establish and Document Risk Acceptance Process
The absence of a formal risk acceptance process can lead to inappropriate risk treatment and a lack of
oversight in managing risks, resulting in inconsistent approaches that may not align with the District’s
overall risk tolerance.
B. Perform Regular Backup Restoration Tests
Lack of proper restoration testing may hinder the District from recovering its data completely and
accurately.
C. Perform Timely Access Revocation and Regular Access Reviews
Failure to deactivate or remove accounts of terminated employees timely may result in unauthorized
access to the District’s resources and sensitive information. Furthermore, the absence of user access
reviews increases the risk of inappropriate users or access remaining undetected over time which may
be used to process unauthorized transactions or view confidential information.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Non-performance of review may result in the District relying on IT service providers with ineffective
information security controls making them susceptible to data breaches. A breach in a third-party
system may expose the District to financial, operational, legal, and reputational damages.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Without adequate logging and monitoring of users’ activity, security incidents, including suspicious and
unauthorized activities may not be detected and responded to in a timely manner.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
Data that is held to devices without encryption is vulnerable to unauthorized access, especially if
physical and logical controls are compromised. In the event of a breach, sensitive data, such as
students’ information may be exposed.
G. Enforce Strict Compliance on Controls over SAP Direct to Production Changes
Insufficient controls over client opening may result in the implementation of unauthorized changes
directly into the production environment. This increases the risk that changes to the system may not
follow the District’s change management process (documentation, authorization, testing, and approval)
prior to the implementation of the change to the production environment.
Recommendation:
A. Formally Establish and Document Risk Acceptance Process
We recommend that the District establish and implement the District’s Risk Acceptance process that
details the criteria and conditions for accepting potential risks. We also recommend that the District
ensure this is aligned with the District’s objectives, overall risk tolerance, and current practices in
identifying, assessing, and mitigating risks.
B. Perform Regular Backup Restoration Tests
Together with the DR tabletop exercises, we recommend that backup restoration tests should be
performed at least once per year. Detailed testing schedules should be drafted based on DRP
specifications and required restoration of the critical systems. Documentation of such tests should be
maintained for full management awareness and approval.
C. Perform Timely Access Revocation and Regular Access Reviews
1. We recommend that the District revoke the access of terminated employees and review the
activities performed by those accounts after their termination date to ensure the validity and
appropriateness of activities/transactions performed by these accounts, if any.
2. Concurrently, the District should improve the account termination procedures to ensure that access
to terminated employees is timely revoked.
3. We also recommend that regular access reviews for AD, SAP, PS SIS, and the physical accesses
to data centers where these systems are hosted, are performed, and documented (for both regular
and privileged users) to ensure that only valid and appropriate users remain in the system and
have access to relevant information. The review may include, but is not limited to the following:
a. Document management control over the completeness and accuracy of the reports used in the
review.
b. Define designated functions/roles to perform the review.
c. Monitor timeliness of the performance of the review and execution of corrective actions as a
result of the review
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
Revisit the District’s current practices for evaluating third-party provider’s information security to ensure
that all third-party are reviewed and evaluated regularly. At the minimum, the process should involve
continuous monitoring, contractual provisions summarizing security requirements, and a strategy for
addressing security vulnerabilities identified during reviews.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
Formally establish a process for logging and monitoring users’ activity which includes collection,
retention, regular review, and documentation of user activity logs. The review should be aligned with
the District’s access management practices to ensure that only authorized users are allowed to access
information that is aligned with their functions and responsibilities.
F. Implement Data-at-Rest encryption for Devices Storing Customer Data
The District should establish and implement data-at-rest encryption for endpoint devices to ensure that
data is inaccessible to unauthorized users in cases when logical and physical measures are
compromised.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
Ensure that production client openings, particularly those related to direct production changes, strictly
adhere to the District’s Change Management Procedure. These client openings and the related
changes should be properly documented, authorized, and validated prior to implementation.
Views of Responsible Officials and Planned Corrective Actions:
A. Formally Establish and Document Risk Acceptance Process
Requirements for risk assessments and risk acceptance processes to comply with GLBA were
expanded in June of 2023. The District engaged a third-party consultant to conduct a GLBA-compliant
risk assessment and advise on recommended changes to the District’s Written Information Security
Plan (WISP) to comply with the new requirements. The findings and recommendations were presented
to the District in October of 2023 and are currently under review. The District will initiate a project to
formalize risk acceptance by December 31st, 2023, and implement the risk acceptance process by
June 30, 2024.
B. Perform Regular Backup Restoration Tests
The District has engaged with a third party to build a testing environment to physically test restoration
of the SIS environment. Initiation of the project is pending processing of the Purchase Order. The
District anticipates completion of the restoration by December 31st, 2023.
With respect to SAP, the District is currently engaged in an effort to migrate the SAP database to
HANA. When this project is complete, the same test environment will be capable of performing physical
recovery tests for SAP. The HANA migration is estimated to be completed on February 28th, 2024.
C. Perform Timely Access Revocation and Regular Access Reviews
With respect to the District’s Single Sign-On (ADFS or SSO) environments, the District engaged
professional services consultants to address this item by automating the disablement of employee
accounts based upon the termination of assignment. The work is currently underway. The target
completion of the process is December 15, 2023. With respect to the SAP environment, the District has
engaged with a vendor to implement Multifactor Authentication (MFA) in the SAP environment. Work
will begin upon processing the Purchase Order. Once both efforts are complete, disabling employee
accounts in SSO, SIS and SAP will be performed automatically based upon the termination of
assignments according to criteria established by Human Resources.
With respect to access reviews of SIS and SAP, the District is currently researching the export of user
audit logs to the District’s analysis environment to enable regular reviews. The new target to perform
regular access reviews for SAP and SIS is the end of Q1 2024.
With respect to physical access reviews, the District Information Security Team will perform an annual
review of relevant operational protocols for data center access with the appropriate internal teams and
perform an audit of data access at a minimum of once per year. The first annual protocol review will be
completed by December 1st, 2023. The first annual audit will commence no later than March 1st, 2024.
D. Perform Necessary Due Diligence to Regularly Evaluate All Third-party Safeguards
To prevent recurrence, the LACCD Information Security Team will coordinate an annual review of
Administrative Protocol 3723A: Information Security Evaluation of Third-Party Providers with District
Financial Aid, Procurement and Educational Programming and Institutional Effectiveness (EPIE)
leadership teams to help assure future relevant contracts are provided to the Information Security
Team prior to renewal to allow for timely security review.
E. Maintain and Review Logs of Users’ Activity for both SAP and PS SIS
The District is currently researching the export of user audit logs to the District’s analysis environment
to enable regular reviews. The new target to perform regular access reviews for SAP and SIS is the
end of Q1 2024.
F. Implement data encryption for Devices Storing Customer Data
The District engaged a third-party consultant to perform a comprehensive review of PeopleSoft security
controls, including the implementation of encryption of financial aid data within PeopleSoft. The results
are pending. Based upon those recommendations, the District will work with encryption providers to
develop and implement field-level encryption of financial aid data in SIS as appropriate.
With respect to end-user devices storing sensitive data, the District recently adopted workstation
hardening requirements that include whole-disk encryption for desktop and laptop computers used by
personnel who routinely access sensitive information, including financial aid data. The District will
implement the standards on workstations used by employees in financial aid and institutional research
by June 30, 2024. Once this is complete, additional workstations will be encrypted in order of potential
risk.
G. Strictly Implement Processes and Control for Direct Changes in the SAP Production
Environment
The requests for direct changes in SAP production will be tracked and included in our help desk
requests so that an auditable trail can be created leading to the purpose and completion of the
production changes. Additionally, direct production change requests will be reviewed and approved
following the LACCD Change Control process. Minor updates that do not fall within the change control
guidelines will require managerial approval within the help desk system.
Personnel Responsible for Implementation: Carmen V. Lidz
Position of Responsible Personnel: Vice Chancellor & Chief Information Officer
Finding FA 2023-004: Special Tests and Provisions – Using a Servicer or Financial Institution to Deliver
Title IV Credit Balances to a Card or Other Access Device – Failure to Submit URL to the Secretary of
Education for Publication in a Centralized Database Accessible to the Public
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.063, and 93.364
Federal Program Name: Student Financial Assistance Cluster:
Federal Supplement Educational Opportunity Grants
(FSEOG)
Federal Work-Study Program (FWS)
Federal Perkins Loan Program
Federal Pell Grant Program
Federal Direct Student Loans
Nursing Student Loans (NSL)
Federal Agency: U.S. Department of Education (ED)
Passed Through Entity: N/A
Federal Award Number: FSEOG
P007A210450, P007A210365, P007A210451,
P007A210452, P007A210453, P007A210455,
P007A210456, P007A210457, P007A210676
FWS
P033A210450, P033A210365, P033A210451,
P033A210452, P033A210453, P033A210455,
P033A210456, P033A210457, P033A210676
Pell
P063P210033, P063P215263, P063P210034,
P063P210658, P063P210035, P063P215261,
P063P215260, P063P210036, P063P215262
NSL
P268K220033, P268K225263, P268K220034,
P268K220658, P268K220035, P268K225261,
P268K225260, P268K220036, P268K225262
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Community College District
Compliance Requirement: Special Tests and Provisions: Using a Servicer or
Financial Institution to Deliver Title IV Credit Balances to
a Card or Other Access Device
Criteria or Specific Requirements:
Per 34 Code of Federal Regulations 668.164 Disbursing Funds:
In Tier One (T1) arrangement, an institution located in a State has a contract with a third-party servicer under
which the servicer performs one or more of the functions associated with processing direct payments of Title IV,
HEA program funds on behalf of the institution. The institution or third-party servicer makes payments to one or
more financial accounts that are offered to students under the contract; a financial account where information
about the account is communicated directly to students by the third-party servicer, or the institution on behalf of
or in conjunction with the third-party servicer; or a financial account where information about the account is
communicated directly to students by an entity contracting with or affiliated with the third-party servicer.
Institutions with a T1 arrangement should ensure that no later than September 1, 2017, and then no later than
60 days following the most recently completed award year thereafter, disclose conspicuously on the institution’s
Website and in a format established by the Secretary of Education the total consideration for the most recently
completed award year, monetary and non-monetary, paid or received by the parties under the terms of the
contract; and for any year in which the institution’s enrolled students open 30 or more financial accounts under
the T1 arrangement, the number of students who had financial accounts under the contract at any time during
the most recently completed award year, and the mean and median of the actual costs incurred by those
account holders.
The institution should also provide the Secretary with an up-to-date Uniform Resource Locator (URL) for the
contract and contract data as described above for publication in a centralized database accessible to the public.
Identified Condition:
We noted that the District’s URL link to the contract with BMTX, Inc. (BankMobile) and other required
information was not included in the latest Cash Management Contracts Database published by ED on
March 2022 as the District was unable to provide the URL link to ED for the award year ended June 30, 2023.
Cause and Effect:
Due to a miscommunication between the District staff and Bankmobile staff, the website link was not submitted
to the Department of Education, although the report was published and available to the public.
Questioned Costs:
None.
Recommendation:
We recommend that the District review its roles and responsibilities with Bankmobile and implement control
procedures to ensure that the District remains compliant with the requirements of Uniform Guidance and the
Code of Federal Regulation.
Views of Responsible Officials and Planned Corrective Actions:
The District has taken responsibility for providing the Department of Education with the website link and will
provide that going forward.
Personnel Responsible for Implementation: Nyame-Tease Prempeh
Position of Responsible Personnel: Assistant Director of Accounting
Expected Date of Implementation: November 1, 2023
Finding FA 2023-004: Special Tests and Provisions – Using a Servicer or Financial Institution to Deliver
Title IV Credit Balances to a Card or Other Access Device – Failure to Submit URL to the Secretary of
Education for Publication in a Centralized Database Accessible to the Public
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.063, and 93.364
Federal Program Name: Student Financial Assistance Cluster:
Federal Supplement Educational Opportunity Grants
(FSEOG)
Federal Work-Study Program (FWS)
Federal Perkins Loan Program
Federal Pell Grant Program
Federal Direct Student Loans
Nursing Student Loans (NSL)
Federal Agency: U.S. Department of Education (ED)
Passed Through Entity: N/A
Federal Award Number: FSEOG
P007A210450, P007A210365, P007A210451,
P007A210452, P007A210453, P007A210455,
P007A210456, P007A210457, P007A210676
FWS
P033A210450, P033A210365, P033A210451,
P033A210452, P033A210453, P033A210455,
P033A210456, P033A210457, P033A210676
Pell
P063P210033, P063P215263, P063P210034,
P063P210658, P063P210035, P063P215261,
P063P215260, P063P210036, P063P215262
NSL
P268K220033, P268K225263, P268K220034,
P268K220658, P268K220035, P268K225261,
P268K225260, P268K220036, P268K225262
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Community College District
Compliance Requirement: Special Tests and Provisions: Using a Servicer or
Financial Institution to Deliver Title IV Credit Balances to
a Card or Other Access Device
Criteria or Specific Requirements:
Per 34 Code of Federal Regulations 668.164 Disbursing Funds:
In Tier One (T1) arrangement, an institution located in a State has a contract with a third-party servicer under
which the servicer performs one or more of the functions associated with processing direct payments of Title IV,
HEA program funds on behalf of the institution. The institution or third-party servicer makes payments to one or
more financial accounts that are offered to students under the contract; a financial account where information
about the account is communicated directly to students by the third-party servicer, or the institution on behalf of
or in conjunction with the third-party servicer; or a financial account where information about the account is
communicated directly to students by an entity contracting with or affiliated with the third-party servicer.
Institutions with a T1 arrangement should ensure that no later than September 1, 2017, and then no later than
60 days following the most recently completed award year thereafter, disclose conspicuously on the institution’s
Website and in a format established by the Secretary of Education the total consideration for the most recently
completed award year, monetary and non-monetary, paid or received by the parties under the terms of the
contract; and for any year in which the institution’s enrolled students open 30 or more financial accounts under
the T1 arrangement, the number of students who had financial accounts under the contract at any time during
the most recently completed award year, and the mean and median of the actual costs incurred by those
account holders.
The institution should also provide the Secretary with an up-to-date Uniform Resource Locator (URL) for the
contract and contract data as described above for publication in a centralized database accessible to the public.
Identified Condition:
We noted that the District’s URL link to the contract with BMTX, Inc. (BankMobile) and other required
information was not included in the latest Cash Management Contracts Database published by ED on
March 2022 as the District was unable to provide the URL link to ED for the award year ended June 30, 2023.
Cause and Effect:
Due to a miscommunication between the District staff and Bankmobile staff, the website link was not submitted
to the Department of Education, although the report was published and available to the public.
Questioned Costs:
None.
Recommendation:
We recommend that the District review its roles and responsibilities with Bankmobile and implement control
procedures to ensure that the District remains compliant with the requirements of Uniform Guidance and the
Code of Federal Regulation.
Views of Responsible Officials and Planned Corrective Actions:
The District has taken responsibility for providing the Department of Education with the website link and will
provide that going forward.
Personnel Responsible for Implementation: Nyame-Tease Prempeh
Position of Responsible Personnel: Assistant Director of Accounting
Expected Date of Implementation: November 1, 2023
Finding FA 2023-004: Special Tests and Provisions – Using a Servicer or Financial Institution to Deliver
Title IV Credit Balances to a Card or Other Access Device – Failure to Submit URL to the Secretary of
Education for Publication in a Centralized Database Accessible to the Public
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.063, and 93.364
Federal Program Name: Student Financial Assistance Cluster:
Federal Supplement Educational Opportunity Grants
(FSEOG)
Federal Work-Study Program (FWS)
Federal Perkins Loan Program
Federal Pell Grant Program
Federal Direct Student Loans
Nursing Student Loans (NSL)
Federal Agency: U.S. Department of Education (ED)
Passed Through Entity: N/A
Federal Award Number: FSEOG
P007A210450, P007A210365, P007A210451,
P007A210452, P007A210453, P007A210455,
P007A210456, P007A210457, P007A210676
FWS
P033A210450, P033A210365, P033A210451,
P033A210452, P033A210453, P033A210455,
P033A210456, P033A210457, P033A210676
Pell
P063P210033, P063P215263, P063P210034,
P063P210658, P063P210035, P063P215261,
P063P215260, P063P210036, P063P215262
NSL
P268K220033, P268K225263, P268K220034,
P268K220658, P268K220035, P268K225261,
P268K225260, P268K220036, P268K225262
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Community College District
Compliance Requirement: Special Tests and Provisions: Using a Servicer or
Financial Institution to Deliver Title IV Credit Balances to
a Card or Other Access Device
Criteria or Specific Requirements:
Per 34 Code of Federal Regulations 668.164 Disbursing Funds:
In Tier One (T1) arrangement, an institution located in a State has a contract with a third-party servicer under
which the servicer performs one or more of the functions associated with processing direct payments of Title IV,
HEA program funds on behalf of the institution. The institution or third-party servicer makes payments to one or
more financial accounts that are offered to students under the contract; a financial account where information
about the account is communicated directly to students by the third-party servicer, or the institution on behalf of
or in conjunction with the third-party servicer; or a financial account where information about the account is
communicated directly to students by an entity contracting with or affiliated with the third-party servicer.
Institutions with a T1 arrangement should ensure that no later than September 1, 2017, and then no later than
60 days following the most recently completed award year thereafter, disclose conspicuously on the institution’s
Website and in a format established by the Secretary of Education the total consideration for the most recently
completed award year, monetary and non-monetary, paid or received by the parties under the terms of the
contract; and for any year in which the institution’s enrolled students open 30 or more financial accounts under
the T1 arrangement, the number of students who had financial accounts under the contract at any time during
the most recently completed award year, and the mean and median of the actual costs incurred by those
account holders.
The institution should also provide the Secretary with an up-to-date Uniform Resource Locator (URL) for the
contract and contract data as described above for publication in a centralized database accessible to the public.
Identified Condition:
We noted that the District’s URL link to the contract with BMTX, Inc. (BankMobile) and other required
information was not included in the latest Cash Management Contracts Database published by ED on
March 2022 as the District was unable to provide the URL link to ED for the award year ended June 30, 2023.
Cause and Effect:
Due to a miscommunication between the District staff and Bankmobile staff, the website link was not submitted
to the Department of Education, although the report was published and available to the public.
Questioned Costs:
None.
Recommendation:
We recommend that the District review its roles and responsibilities with Bankmobile and implement control
procedures to ensure that the District remains compliant with the requirements of Uniform Guidance and the
Code of Federal Regulation.
Views of Responsible Officials and Planned Corrective Actions:
The District has taken responsibility for providing the Department of Education with the website link and will
provide that going forward.
Personnel Responsible for Implementation: Nyame-Tease Prempeh
Position of Responsible Personnel: Assistant Director of Accounting
Expected Date of Implementation: November 1, 2023
Finding FA 2023-004: Special Tests and Provisions – Using a Servicer or Financial Institution to Deliver
Title IV Credit Balances to a Card or Other Access Device – Failure to Submit URL to the Secretary of
Education for Publication in a Centralized Database Accessible to the Public
Federal Catalog Number: ALN 84.007, 84.033, 84.038, 84.063, and 93.364
Federal Program Name: Student Financial Assistance Cluster:
Federal Supplement Educational Opportunity Grants
(FSEOG)
Federal Work-Study Program (FWS)
Federal Perkins Loan Program
Federal Pell Grant Program
Federal Direct Student Loans
Nursing Student Loans (NSL)
Federal Agency: U.S. Department of Education (ED)
Passed Through Entity: N/A
Federal Award Number: FSEOG
P007A210450, P007A210365, P007A210451,
P007A210452, P007A210453, P007A210455,
P007A210456, P007A210457, P007A210676
FWS
P033A210450, P033A210365, P033A210451,
P033A210452, P033A210453, P033A210455,
P033A210456, P033A210457, P033A210676
Pell
P063P210033, P063P215263, P063P210034,
P063P210658, P063P210035, P063P215261,
P063P215260, P063P210036, P063P215262
NSL
P268K220033, P268K225263, P268K220034,
P268K220658, P268K220035, P268K225261,
P268K225260, P268K220036, P268K225262
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Community College District
Compliance Requirement: Special Tests and Provisions: Using a Servicer or
Financial Institution to Deliver Title IV Credit Balances to
a Card or Other Access Device
Criteria or Specific Requirements:
Per 34 Code of Federal Regulations 668.164 Disbursing Funds:
In Tier One (T1) arrangement, an institution located in a State has a contract with a third-party servicer under
which the servicer performs one or more of the functions associated with processing direct payments of Title IV,
HEA program funds on behalf of the institution. The institution or third-party servicer makes payments to one or
more financial accounts that are offered to students under the contract; a financial account where information
about the account is communicated directly to students by the third-party servicer, or the institution on behalf of
or in conjunction with the third-party servicer; or a financial account where information about the account is
communicated directly to students by an entity contracting with or affiliated with the third-party servicer.
Institutions with a T1 arrangement should ensure that no later than September 1, 2017, and then no later than
60 days following the most recently completed award year thereafter, disclose conspicuously on the institution’s
Website and in a format established by the Secretary of Education the total consideration for the most recently
completed award year, monetary and non-monetary, paid or received by the parties under the terms of the
contract; and for any year in which the institution’s enrolled students open 30 or more financial accounts under
the T1 arrangement, the number of students who had financial accounts under the contract at any time during
the most recently completed award year, and the mean and median of the actual costs incurred by those
account holders.
The institution should also provide the Secretary with an up-to-date Uniform Resource Locator (URL) for the
contract and contract data as described above for publication in a centralized database accessible to the public.
Identified Condition:
We noted that the District’s URL link to the contract with BMTX, Inc. (BankMobile) and other required
information was not included in the latest Cash Management Contracts Database published by ED on
March 2022 as the District was unable to provide the URL link to ED for the award year ended June 30, 2023.
Cause and Effect:
Due to a miscommunication between the District staff and Bankmobile staff, the website link was not submitted
to the Department of Education, although the report was published and available to the public.
Questioned Costs:
None.
Recommendation:
We recommend that the District review its roles and responsibilities with Bankmobile and implement control
procedures to ensure that the District remains compliant with the requirements of Uniform Guidance and the
Code of Federal Regulation.
Views of Responsible Officials and Planned Corrective Actions:
The District has taken responsibility for providing the Department of Education with the website link and will
provide that going forward.
Personnel Responsible for Implementation: Nyame-Tease Prempeh
Position of Responsible Personnel: Assistant Director of Accounting
Expected Date of Implementation: November 1, 2023
Finding FA 2023-005: Reporting – Untimely and Incomplete Posting of Quarterly Reports to the
College’s Website and Inaccurate Reported Expenditures Captured in the Published Website’s
Quarterly Reports.
Federal Catalog Number: ALN 84.425E, 84.425F, and 84.425L
Federal Program Name: Higher Education Emergency Relief Fund
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P425E200844, P425F202148, P425L200439,
P425E204139, P425F203076, P425L200440
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Pierce College
Los Angeles Trade Technical College
Compliance Requirement: Reporting
Criteria or Specific Requirements:
Per U.S. Department of Education Notice of Public Posting Requirement of Grant Information for Higher
Education Emergency Relief Fund (HEERF) Grantees:
The Certification and Agreements for the Coronavirus Response and Relief Supplemental Appropriations Act of
2021 (CRRSAA) and American Rescue Plan (ARP) (a)(1) and (a)(4) funds provide that each institution applying
for HEERF funds must promptly and timely provide a detailed accounting of the use and expenditure of the
funds in such manner and with such frequency as the Secretary may require. Each HEERF participating
institution must post the information listed below on the institution’s primary website, as an initial report under
the CRRSAA and ARP (a)(1) and (a)(4) programs. This report is associated with the approved information
collection under OMB control number 1801–0005.
This information must appear in a format and location that is easily accessible to the public. This information
must also be updated no later than 10 days after the end of each calendar quarter
(September 30, December 31, March 31, and June 30) thereafter, unless the Secretary specifies an alternative
method of reporting.
Identified Condition:
A. Untimely Posting of Quarterly Reports on the College’s Website
We noted that Los Angeles Pierce College’s Quarterly Budget and Expenditure Report for all HEERF I,
II, and III grant funds covering the quarter ending December 31, 2022, and March 31, 2023, were not
publicly posted on the college’s primary website.
B. Incomplete Posting of Published Links Related to the Quarterly Report on the College’s Website
We noted that Los Angeles Trade Technical College’s Quarterly Budget and Expenditure Report for all
HEERF I, II, and III grant funds covering the quarter ending June 30, 2023, was not completely posted
on the college’s primary website. The link to the quarterly report ending June 30, 2023, was published
on time, but the link incorrectly redirects to the March 31, 2023, quarterly report.
C. Inaccuracy of Quarterly Expenditures Reported on the College’s Website
We noted that the expenditures reported in Los Angeles Pierce College’s Quarterly Budget and
Expenditure Report for all HEERF I, II, and III grant funds covering the quarter ending
December 31, 2022, and June 30, 2023, were inaccurate.
• For the quarter ending December 31, 2022, the expenditures were overstated by $284,593 due to
the inclusion of the expenditures already reported from the previous quarter ending
September 30, 2022. Per inquiry, the preparer inadvertently reported the expenditures on a
cumulative basis.
• For the quarter ending June 30, 2023, the expenditures were erroneously reported at zero amounts
which resulted in an understatement by the actual expenditures incurred amounting to $2,007,950.
Cause and Effect:
Los Angeles Trade Technical College
The reports were posted to the website on time. However, due to a clerical error, the link for the June 30, 2023,
report directed users to the March 31, 2023, report. The effect was that, although the correct file existed on the
server, there was no link for users to access it. This has been corrected.
Los Angeles Pierce College
The college experienced a break in the coordination of the report review which resulted in an error on the
published report. There was also a misunderstanding about accumulating data from prior reported periods.
Questioned Costs:
None.
Recommendation:
We recommend that the campuses review their approval process prior to posting the reports online by having
formal preparer and approver signoffs to ensure that the supporting documents correctly match the reports
posted online. Additionally, we recommend the campuses enhance coordination between the report approver and the website manager to ensure that the reports are properly linked in the backend of the website and are
timely posted if already prepared.
Views of Responsible Officials and Planned Corrective Actions:
Los Angeles Trade Technical College
The cause of the incorrect link was a clerical error, and the error has since been corrected, the condition no
longer exists and is resolved.
Personnel Responsible for Implementation: LATTC – Charalambos Ziogas/Daniel Friedman
Position of Responsible Personnel: VPAS/CFA
Expected Date of Implementation: October 16, 2023
Los Angeles Pierce College
The college will work with District staff to update the process of reviewing, approving, and publishing or
providing the reports to appropriate websites and agencies.
Personnel Responsible for Implementation: Ron Paquette
Position of Responsible Personnel: Associate Vice President, Admin Services
Expected Date of Implementation: November 1, 2023
Finding FA 2023-005: Reporting – Untimely and Incomplete Posting of Quarterly Reports to the
College’s Website and Inaccurate Reported Expenditures Captured in the Published Website’s
Quarterly Reports.
Federal Catalog Number: ALN 84.425E, 84.425F, and 84.425L
Federal Program Name: Higher Education Emergency Relief Fund
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P425E200844, P425F202148, P425L200439,
P425E204139, P425F203076, P425L200440
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Pierce College
Los Angeles Trade Technical College
Compliance Requirement: Reporting
Criteria or Specific Requirements:
Per U.S. Department of Education Notice of Public Posting Requirement of Grant Information for Higher
Education Emergency Relief Fund (HEERF) Grantees:
The Certification and Agreements for the Coronavirus Response and Relief Supplemental Appropriations Act of
2021 (CRRSAA) and American Rescue Plan (ARP) (a)(1) and (a)(4) funds provide that each institution applying
for HEERF funds must promptly and timely provide a detailed accounting of the use and expenditure of the
funds in such manner and with such frequency as the Secretary may require. Each HEERF participating
institution must post the information listed below on the institution’s primary website, as an initial report under
the CRRSAA and ARP (a)(1) and (a)(4) programs. This report is associated with the approved information
collection under OMB control number 1801–0005.
This information must appear in a format and location that is easily accessible to the public. This information
must also be updated no later than 10 days after the end of each calendar quarter
(September 30, December 31, March 31, and June 30) thereafter, unless the Secretary specifies an alternative
method of reporting.
Identified Condition:
A. Untimely Posting of Quarterly Reports on the College’s Website
We noted that Los Angeles Pierce College’s Quarterly Budget and Expenditure Report for all HEERF I,
II, and III grant funds covering the quarter ending December 31, 2022, and March 31, 2023, were not
publicly posted on the college’s primary website.
B. Incomplete Posting of Published Links Related to the Quarterly Report on the College’s Website
We noted that Los Angeles Trade Technical College’s Quarterly Budget and Expenditure Report for all
HEERF I, II, and III grant funds covering the quarter ending June 30, 2023, was not completely posted
on the college’s primary website. The link to the quarterly report ending June 30, 2023, was published
on time, but the link incorrectly redirects to the March 31, 2023, quarterly report.
C. Inaccuracy of Quarterly Expenditures Reported on the College’s Website
We noted that the expenditures reported in Los Angeles Pierce College’s Quarterly Budget and
Expenditure Report for all HEERF I, II, and III grant funds covering the quarter ending
December 31, 2022, and June 30, 2023, were inaccurate.
• For the quarter ending December 31, 2022, the expenditures were overstated by $284,593 due to
the inclusion of the expenditures already reported from the previous quarter ending
September 30, 2022. Per inquiry, the preparer inadvertently reported the expenditures on a
cumulative basis.
• For the quarter ending June 30, 2023, the expenditures were erroneously reported at zero amounts
which resulted in an understatement by the actual expenditures incurred amounting to $2,007,950.
Cause and Effect:
Los Angeles Trade Technical College
The reports were posted to the website on time. However, due to a clerical error, the link for the June 30, 2023,
report directed users to the March 31, 2023, report. The effect was that, although the correct file existed on the
server, there was no link for users to access it. This has been corrected.
Los Angeles Pierce College
The college experienced a break in the coordination of the report review which resulted in an error on the
published report. There was also a misunderstanding about accumulating data from prior reported periods.
Questioned Costs:
None.
Recommendation:
We recommend that the campuses review their approval process prior to posting the reports online by having
formal preparer and approver signoffs to ensure that the supporting documents correctly match the reports
posted online. Additionally, we recommend the campuses enhance coordination between the report approver and the website manager to ensure that the reports are properly linked in the backend of the website and are
timely posted if already prepared.
Views of Responsible Officials and Planned Corrective Actions:
Los Angeles Trade Technical College
The cause of the incorrect link was a clerical error, and the error has since been corrected, the condition no
longer exists and is resolved.
Personnel Responsible for Implementation: LATTC – Charalambos Ziogas/Daniel Friedman
Position of Responsible Personnel: VPAS/CFA
Expected Date of Implementation: October 16, 2023
Los Angeles Pierce College
The college will work with District staff to update the process of reviewing, approving, and publishing or
providing the reports to appropriate websites and agencies.
Personnel Responsible for Implementation: Ron Paquette
Position of Responsible Personnel: Associate Vice President, Admin Services
Expected Date of Implementation: November 1, 2023
Finding FA 2023-005: Reporting – Untimely and Incomplete Posting of Quarterly Reports to the
College’s Website and Inaccurate Reported Expenditures Captured in the Published Website’s
Quarterly Reports.
Federal Catalog Number: ALN 84.425E, 84.425F, and 84.425L
Federal Program Name: Higher Education Emergency Relief Fund
Federal Agency: U.S. Department of Education
Passed Through Entity: N/A
Federal Award Number: P425E200844, P425F202148, P425L200439,
P425E204139, P425F203076, P425L200440
Federal Award Year: July 1, 2022, to June 30, 2023
Campuses: Los Angeles Pierce College
Los Angeles Trade Technical College
Compliance Requirement: Reporting
Criteria or Specific Requirements:
Per U.S. Department of Education Notice of Public Posting Requirement of Grant Information for Higher
Education Emergency Relief Fund (HEERF) Grantees:
The Certification and Agreements for the Coronavirus Response and Relief Supplemental Appropriations Act of
2021 (CRRSAA) and American Rescue Plan (ARP) (a)(1) and (a)(4) funds provide that each institution applying
for HEERF funds must promptly and timely provide a detailed accounting of the use and expenditure of the
funds in such manner and with such frequency as the Secretary may require. Each HEERF participating
institution must post the information listed below on the institution’s primary website, as an initial report under
the CRRSAA and ARP (a)(1) and (a)(4) programs. This report is associated with the approved information
collection under OMB control number 1801–0005.
This information must appear in a format and location that is easily accessible to the public. This information
must also be updated no later than 10 days after the end of each calendar quarter
(September 30, December 31, March 31, and June 30) thereafter, unless the Secretary specifies an alternative
method of reporting.
Identified Condition:
A. Untimely Posting of Quarterly Reports on the College’s Website
We noted that Los Angeles Pierce College’s Quarterly Budget and Expenditure Report for all HEERF I,
II, and III grant funds covering the quarter ending December 31, 2022, and March 31, 2023, were not
publicly posted on the college’s primary website.
B. Incomplete Posting of Published Links Related to the Quarterly Report on the College’s Website
We noted that Los Angeles Trade Technical College’s Quarterly Budget and Expenditure Report for all
HEERF I, II, and III grant funds covering the quarter ending June 30, 2023, was not completely posted
on the college’s primary website. The link to the quarterly report ending June 30, 2023, was published
on time, but the link incorrectly redirects to the March 31, 2023, quarterly report.
C. Inaccuracy of Quarterly Expenditures Reported on the College’s Website
We noted that the expenditures reported in Los Angeles Pierce College’s Quarterly Budget and
Expenditure Report for all HEERF I, II, and III grant funds covering the quarter ending
December 31, 2022, and June 30, 2023, were inaccurate.
• For the quarter ending December 31, 2022, the expenditures were overstated by $284,593 due to
the inclusion of the expenditures already reported from the previous quarter ending
September 30, 2022. Per inquiry, the preparer inadvertently reported the expenditures on a
cumulative basis.
• For the quarter ending June 30, 2023, the expenditures were erroneously reported at zero amounts
which resulted in an understatement by the actual expenditures incurred amounting to $2,007,950.
Cause and Effect:
Los Angeles Trade Technical College
The reports were posted to the website on time. However, due to a clerical error, the link for the June 30, 2023,
report directed users to the March 31, 2023, report. The effect was that, although the correct file existed on the
server, there was no link for users to access it. This has been corrected.
Los Angeles Pierce College
The college experienced a break in the coordination of the report review which resulted in an error on the
published report. There was also a misunderstanding about accumulating data from prior reported periods.
Questioned Costs:
None.
Recommendation:
We recommend that the campuses review their approval process prior to posting the reports online by having
formal preparer and approver signoffs to ensure that the supporting documents correctly match the reports
posted online. Additionally, we recommend the campuses enhance coordination between the report approver and the website manager to ensure that the reports are properly linked in the backend of the website and are
timely posted if already prepared.
Views of Responsible Officials and Planned Corrective Actions:
Los Angeles Trade Technical College
The cause of the incorrect link was a clerical error, and the error has since been corrected, the condition no
longer exists and is resolved.
Personnel Responsible for Implementation: LATTC – Charalambos Ziogas/Daniel Friedman
Position of Responsible Personnel: VPAS/CFA
Expected Date of Implementation: October 16, 2023
Los Angeles Pierce College
The college will work with District staff to update the process of reviewing, approving, and publishing or
providing the reports to appropriate websites and agencies.
Personnel Responsible for Implementation: Ron Paquette
Position of Responsible Personnel: Associate Vice President, Admin Services
Expected Date of Implementation: November 1, 2023
Finding FA 2023-006 Reporting: Untimely Submission of Quarterly Financial Reports
Federal Program Information
Federal Catalog Number: ALN 17.268
Federal Program Name: H-1B Job Training Grant
Federal Agency: U.S. Department of Labor
Passed Through Entity: N/A
Federal Award Number: HG-33046-19-60-A-6
Federal Award Year: July 1, 2022 to June 30, 2023
Campus: West Los Angeles College
Compliance Requirement: Reporting
Criteria or Specific Requirement:
Per the terms and conditions of the grant agreement, with the U.S. Department of Labor (DOL) – Employment
and Training Administration (ETA), all ETA recipients are required to report quarterly financial data on the
ETA-9130 Form. ETA-9130 reports are due no later than 45 calendar days after the end of each specified
reporting quarter.
Identified Condition:
We noted that 2 out of 4 quarterly financial reports ETA-9130 were certified late on the U.S. Department of
Labor website as follows:
See schedule of findings and questioned costs.
Per inquiry with the District, the Accounting Department attempted to certify the quarterly reports before the due
date but encountered log-in issues on the U.S. DOL website which prevented certifying timely. The District
requested a reporting extension from Joshua Hodges, Federal Project Officer for the Office of Special Initiatives
and Demonstrations, U.S. DOL-ETA. Mr. Hodges did not authorize the extension and suggested submitting the
quarterly reports via the Payment Management System (PMS) and coordinating with the agency’s technical
team to resolve issues.
Cause and Effect:
The District’s approval officers were available to certify the reports, however, due to technical issues with the
PMS system, certification could not be completed within the allotted time.
Questioned Costs:
None.
Recommendation:
We recommend the district schedule and finalize its quarterly reports submission a week or two before the due
date to ensure that sufficient time is available to resolve unforeseen issues, such as the technical problems with
the U.S DOL website. Otherwise, an authorized waiver from the agency must be secured for late reporting.
Views of Responsible Officials and Planned Corrective Actions:
The District will review reporting timelines and reschedule to allow additional time for unforeseen issues.
Personnel Responsible for Implementation: Nyame-Tease Prempeh
Position of Responsible Personnel: Assistant Director of Accounting
Expected Date of Implementation: November 1, 2023