Audit 345214

FY End
2024-06-30
Total Expended
$27.53B
Findings
360
Programs
848
Organization: Commonwealth of Virginia (VA)
Year: 2024 Accepted: 2025-03-07

Organization Exclusion Status:

Checking exclusion status...

Findings

ID Ref Severity Repeat Requirement
526123 2024-010 Significant Deficiency Yes P
526124 2024-032 Significant Deficiency - P
526125 2024-032 Significant Deficiency - P
526126 2024-032 Significant Deficiency - P
526127 2024-032 Significant Deficiency - P
526128 2024-032 Significant Deficiency - P
526129 2024-088 Significant Deficiency - N
526130 2024-089 Significant Deficiency - P
526131 2024-091 Significant Deficiency - N
526132 2024-092 Significant Deficiency - N
526133 2024-093 Significant Deficiency Yes N
526134 2024-094 Significant Deficiency - N
526135 2024-095 Significant Deficiency Yes N
526136 2024-096 Significant Deficiency - L
526137 2024-098 Significant Deficiency - N
526138 2024-100 Significant Deficiency - L
526139 2024-088 Significant Deficiency - N
526140 2024-089 Significant Deficiency - P
526141 2024-091 Significant Deficiency - N
526142 2024-092 Significant Deficiency - N
526143 2024-093 Significant Deficiency Yes N
526144 2024-094 Significant Deficiency - N
526145 2024-095 Significant Deficiency Yes N
526146 2024-096 Significant Deficiency - L
526147 2024-098 Significant Deficiency - N
526148 2024-100 Significant Deficiency - L
526149 2024-088 Significant Deficiency - N
526150 2024-089 Significant Deficiency - P
526151 2024-091 Significant Deficiency - N
526152 2024-092 Significant Deficiency - N
526153 2024-093 Significant Deficiency Yes N
526154 2024-094 Significant Deficiency - N
526155 2024-095 Significant Deficiency Yes N
526156 2024-096 Significant Deficiency - L
526157 2024-098 Significant Deficiency - N
526158 2024-100 Significant Deficiency - L
526159 2024-088 Significant Deficiency - N
526160 2024-089 Significant Deficiency - P
526161 2024-090 Significant Deficiency Yes N
526162 2024-091 Significant Deficiency - N
526163 2024-092 Significant Deficiency - N
526164 2024-093 Significant Deficiency Yes N
526165 2024-094 Significant Deficiency - N
526166 2024-095 Significant Deficiency Yes N
526167 2024-096 Significant Deficiency - L
526168 2024-098 Significant Deficiency - N
526169 2024-100 Significant Deficiency - L
526170 2024-088 Significant Deficiency - N
526171 2024-089 Significant Deficiency - P
526172 2024-090 Significant Deficiency Yes N
526173 2024-091 Significant Deficiency - N
526174 2024-092 Significant Deficiency - N
526175 2024-093 Significant Deficiency Yes N
526176 2024-094 Significant Deficiency - N
526177 2024-095 Significant Deficiency Yes N
526178 2024-096 Significant Deficiency - L
526179 2024-097 Significant Deficiency - N
526180 2024-098 Significant Deficiency - N
526181 2024-099 Significant Deficiency Yes C
526182 2024-100 Significant Deficiency - L
526183 2024-032 Significant Deficiency - P
526184 2024-088 Significant Deficiency - N
526185 2024-089 Significant Deficiency - P
526186 2024-091 Significant Deficiency - N
526187 2024-092 Significant Deficiency - N
526188 2024-093 Significant Deficiency Yes N
526189 2024-094 Significant Deficiency - N
526190 2024-095 Significant Deficiency Yes N
526191 2024-096 Significant Deficiency - L
526192 2024-098 Significant Deficiency - N
526193 2024-100 Significant Deficiency - L
526194 2024-088 Significant Deficiency - N
526195 2024-089 Significant Deficiency - P
526196 2024-091 Significant Deficiency - N
526197 2024-092 Significant Deficiency - N
526198 2024-093 Significant Deficiency Yes N
526199 2024-094 Significant Deficiency - N
526200 2024-095 Significant Deficiency Yes N
526201 2024-096 Significant Deficiency - L
526202 2024-098 Significant Deficiency - N
526203 2024-100 Significant Deficiency - L
526204 2024-072 Significant Deficiency - I
526205 2024-087 Significant Deficiency - M
526206 2024-107 Significant Deficiency - L
526207 2024-072 Significant Deficiency - I
526208 2024-087 Significant Deficiency - M
526209 2024-107 Significant Deficiency - L
526210 2024-072 Significant Deficiency - I
526211 2024-087 Significant Deficiency - M
526212 2024-107 Significant Deficiency - L
526213 2024-087 Significant Deficiency - M
526214 2024-107 Significant Deficiency - L
526215 2024-087 Significant Deficiency - M
526216 2024-107 Significant Deficiency - L
526217 2024-087 Significant Deficiency - M
526218 2024-107 Significant Deficiency - L
526219 2024-083 Significant Deficiency - M
526220 2024-084 Significant Deficiency Yes M
526221 2024-085 Significant Deficiency Yes M
526222 2024-086 Significant Deficiency Yes M
526223 2024-101 Material Weakness Yes L
526224 2024-102 Significant Deficiency Yes L
526225 2024-103 - Yes E
526226 2024-106 Significant Deficiency Yes L
526227 2024-083 Significant Deficiency - M
526228 2024-084 Significant Deficiency Yes M
526229 2024-085 Significant Deficiency Yes M
526230 2024-086 Significant Deficiency Yes M
526231 2024-101 Material Weakness Yes L
526232 2024-102 Significant Deficiency Yes L
526233 2024-103 - Yes E
526234 2024-106 Significant Deficiency Yes L
526235 2024-085 Significant Deficiency Yes M
526236 2024-086 Significant Deficiency Yes M
526237 2024-104 Significant Deficiency - L
526238 2024-105 - - E
526239 2024-085 Significant Deficiency Yes M
526240 2024-086 Significant Deficiency Yes M
526241 2024-104 Significant Deficiency - L
526242 2024-105 - - E
526243 2024-011 Significant Deficiency - P
526244 2024-017 Significant Deficiency Yes P
526245 2024-022 Material Weakness Yes P
526246 2024-023 Significant Deficiency - P
526247 2024-024 Significant Deficiency Yes P
526248 2024-025 Significant Deficiency Yes P
526249 2024-035 Material Weakness Yes P
526250 2024-041 Significant Deficiency Yes P
526251 2024-042 Significant Deficiency Yes P
526252 2024-047 Significant Deficiency Yes P
526253 2024-053 Significant Deficiency - P
526254 2024-058 Significant Deficiency Yes P
526255 2024-061 Significant Deficiency - P
526256 2024-064 Significant Deficiency Yes P
526257 2024-067 Significant Deficiency Yes P
526258 2024-068 Significant Deficiency Yes P
526259 2024-071 Significant Deficiency Yes P
526260 2024-082 Material Weakness Yes M
526261 2024-085 Significant Deficiency Yes M
526262 2024-086 Significant Deficiency Yes M
526263 2024-011 Significant Deficiency - P
526264 2024-017 Significant Deficiency Yes P
526265 2024-022 Material Weakness Yes P
526266 2024-023 Significant Deficiency - P
526267 2024-024 Significant Deficiency Yes P
526268 2024-025 Significant Deficiency Yes P
526269 2024-035 Material Weakness Yes P
526270 2024-041 Significant Deficiency Yes P
526271 2024-042 Significant Deficiency Yes P
526272 2024-047 Significant Deficiency Yes P
526273 2024-053 Significant Deficiency - P
526274 2024-058 Significant Deficiency Yes P
526275 2024-061 Significant Deficiency - P
526276 2024-064 Significant Deficiency Yes P
526277 2024-067 Significant Deficiency Yes P
526278 2024-068 Significant Deficiency Yes P
526279 2024-071 Significant Deficiency Yes P
526280 2024-082 Material Weakness Yes M
526281 2024-085 Significant Deficiency Yes M
526282 2024-086 Significant Deficiency Yes M
526283 2024-011 Significant Deficiency - P
526284 2024-017 Significant Deficiency Yes P
526285 2024-022 Material Weakness Yes P
526286 2024-023 Significant Deficiency - P
526287 2024-024 Significant Deficiency Yes P
526288 2024-025 Significant Deficiency Yes P
526289 2024-035 Material Weakness Yes P
526290 2024-041 Significant Deficiency Yes P
526291 2024-042 Significant Deficiency Yes P
526292 2024-047 Significant Deficiency Yes P
526293 2024-053 Significant Deficiency - P
526294 2024-058 Significant Deficiency Yes P
526295 2024-061 Significant Deficiency - P
526296 2024-064 Significant Deficiency Yes P
526297 2024-067 Significant Deficiency Yes P
526298 2024-068 Significant Deficiency Yes P
526299 2024-071 Significant Deficiency Yes P
526300 2024-082 Material Weakness Yes M
526301 2024-085 Significant Deficiency Yes M
526302 2024-086 Significant Deficiency Yes M
1102565 2024-010 Significant Deficiency Yes P
1102566 2024-032 Significant Deficiency - P
1102567 2024-032 Significant Deficiency - P
1102568 2024-032 Significant Deficiency - P
1102569 2024-032 Significant Deficiency - P
1102570 2024-032 Significant Deficiency - P
1102571 2024-088 Significant Deficiency - N
1102572 2024-089 Significant Deficiency - P
1102573 2024-091 Significant Deficiency - N
1102574 2024-092 Significant Deficiency - N
1102575 2024-093 Significant Deficiency Yes N
1102576 2024-094 Significant Deficiency - N
1102577 2024-095 Significant Deficiency Yes N
1102578 2024-096 Significant Deficiency - L
1102579 2024-098 Significant Deficiency - N
1102580 2024-100 Significant Deficiency - L
1102581 2024-088 Significant Deficiency - N
1102582 2024-089 Significant Deficiency - P
1102583 2024-091 Significant Deficiency - N
1102584 2024-092 Significant Deficiency - N
1102585 2024-093 Significant Deficiency Yes N
1102586 2024-094 Significant Deficiency - N
1102587 2024-095 Significant Deficiency Yes N
1102588 2024-096 Significant Deficiency - L
1102589 2024-098 Significant Deficiency - N
1102590 2024-100 Significant Deficiency - L
1102591 2024-088 Significant Deficiency - N
1102592 2024-089 Significant Deficiency - P
1102593 2024-091 Significant Deficiency - N
1102594 2024-092 Significant Deficiency - N
1102595 2024-093 Significant Deficiency Yes N
1102596 2024-094 Significant Deficiency - N
1102597 2024-095 Significant Deficiency Yes N
1102598 2024-096 Significant Deficiency - L
1102599 2024-098 Significant Deficiency - N
1102600 2024-100 Significant Deficiency - L
1102601 2024-088 Significant Deficiency - N
1102602 2024-089 Significant Deficiency - P
1102603 2024-090 Significant Deficiency Yes N
1102604 2024-091 Significant Deficiency - N
1102605 2024-092 Significant Deficiency - N
1102606 2024-093 Significant Deficiency Yes N
1102607 2024-094 Significant Deficiency - N
1102608 2024-095 Significant Deficiency Yes N
1102609 2024-096 Significant Deficiency - L
1102610 2024-098 Significant Deficiency - N
1102611 2024-100 Significant Deficiency - L
1102612 2024-088 Significant Deficiency - N
1102613 2024-089 Significant Deficiency - P
1102614 2024-090 Significant Deficiency Yes N
1102615 2024-091 Significant Deficiency - N
1102616 2024-092 Significant Deficiency - N
1102617 2024-093 Significant Deficiency Yes N
1102618 2024-094 Significant Deficiency - N
1102619 2024-095 Significant Deficiency Yes N
1102620 2024-096 Significant Deficiency - L
1102621 2024-097 Significant Deficiency - N
1102622 2024-098 Significant Deficiency - N
1102623 2024-099 Significant Deficiency Yes C
1102624 2024-100 Significant Deficiency - L
1102625 2024-032 Significant Deficiency - P
1102626 2024-088 Significant Deficiency - N
1102627 2024-089 Significant Deficiency - P
1102628 2024-091 Significant Deficiency - N
1102629 2024-092 Significant Deficiency - N
1102630 2024-093 Significant Deficiency Yes N
1102631 2024-094 Significant Deficiency - N
1102632 2024-095 Significant Deficiency Yes N
1102633 2024-096 Significant Deficiency - L
1102634 2024-098 Significant Deficiency - N
1102635 2024-100 Significant Deficiency - L
1102636 2024-088 Significant Deficiency - N
1102637 2024-089 Significant Deficiency - P
1102638 2024-091 Significant Deficiency - N
1102639 2024-092 Significant Deficiency - N
1102640 2024-093 Significant Deficiency Yes N
1102641 2024-094 Significant Deficiency - N
1102642 2024-095 Significant Deficiency Yes N
1102643 2024-096 Significant Deficiency - L
1102644 2024-098 Significant Deficiency - N
1102645 2024-100 Significant Deficiency - L
1102646 2024-072 Significant Deficiency - I
1102647 2024-087 Significant Deficiency - M
1102648 2024-107 Significant Deficiency - L
1102649 2024-072 Significant Deficiency - I
1102650 2024-087 Significant Deficiency - M
1102651 2024-107 Significant Deficiency - L
1102652 2024-072 Significant Deficiency - I
1102653 2024-087 Significant Deficiency - M
1102654 2024-107 Significant Deficiency - L
1102655 2024-087 Significant Deficiency - M
1102656 2024-107 Significant Deficiency - L
1102657 2024-087 Significant Deficiency - M
1102658 2024-107 Significant Deficiency - L
1102659 2024-087 Significant Deficiency - M
1102660 2024-107 Significant Deficiency - L
1102661 2024-083 Significant Deficiency - M
1102662 2024-084 Significant Deficiency Yes M
1102663 2024-085 Significant Deficiency Yes M
1102664 2024-086 Significant Deficiency Yes M
1102665 2024-101 Material Weakness Yes L
1102666 2024-102 Significant Deficiency Yes L
1102667 2024-103 - Yes E
1102668 2024-106 Significant Deficiency Yes L
1102669 2024-083 Significant Deficiency - M
1102670 2024-084 Significant Deficiency Yes M
1102671 2024-085 Significant Deficiency Yes M
1102672 2024-086 Significant Deficiency Yes M
1102673 2024-101 Material Weakness Yes L
1102674 2024-102 Significant Deficiency Yes L
1102675 2024-103 - Yes E
1102676 2024-106 Significant Deficiency Yes L
1102677 2024-085 Significant Deficiency Yes M
1102678 2024-086 Significant Deficiency Yes M
1102679 2024-104 Significant Deficiency - L
1102680 2024-105 - - E
1102681 2024-085 Significant Deficiency Yes M
1102682 2024-086 Significant Deficiency Yes M
1102683 2024-104 Significant Deficiency - L
1102684 2024-105 - - E
1102685 2024-011 Significant Deficiency - P
1102686 2024-017 Significant Deficiency Yes P
1102687 2024-022 Material Weakness Yes P
1102688 2024-023 Significant Deficiency - P
1102689 2024-024 Significant Deficiency Yes P
1102690 2024-025 Significant Deficiency Yes P
1102691 2024-035 Material Weakness Yes P
1102692 2024-041 Significant Deficiency Yes P
1102693 2024-042 Significant Deficiency Yes P
1102694 2024-047 Significant Deficiency Yes P
1102695 2024-053 Significant Deficiency - P
1102696 2024-058 Significant Deficiency Yes P
1102697 2024-061 Significant Deficiency - P
1102698 2024-064 Significant Deficiency Yes P
1102699 2024-067 Significant Deficiency Yes P
1102700 2024-068 Significant Deficiency Yes P
1102701 2024-071 Significant Deficiency Yes P
1102702 2024-082 Material Weakness Yes M
1102703 2024-085 Significant Deficiency Yes M
1102704 2024-086 Significant Deficiency Yes M
1102705 2024-011 Significant Deficiency - P
1102706 2024-017 Significant Deficiency Yes P
1102707 2024-022 Material Weakness Yes P
1102708 2024-023 Significant Deficiency - P
1102709 2024-024 Significant Deficiency Yes P
1102710 2024-025 Significant Deficiency Yes P
1102711 2024-035 Material Weakness Yes P
1102712 2024-041 Significant Deficiency Yes P
1102713 2024-042 Significant Deficiency Yes P
1102714 2024-047 Significant Deficiency Yes P
1102715 2024-053 Significant Deficiency - P
1102716 2024-058 Significant Deficiency Yes P
1102717 2024-061 Significant Deficiency - P
1102718 2024-064 Significant Deficiency Yes P
1102719 2024-067 Significant Deficiency Yes P
1102720 2024-068 Significant Deficiency Yes P
1102721 2024-071 Significant Deficiency Yes P
1102722 2024-082 Material Weakness Yes M
1102723 2024-085 Significant Deficiency Yes M
1102724 2024-086 Significant Deficiency Yes M
1102725 2024-011 Significant Deficiency - P
1102726 2024-017 Significant Deficiency Yes P
1102727 2024-022 Material Weakness Yes P
1102728 2024-023 Significant Deficiency - P
1102729 2024-024 Significant Deficiency Yes P
1102730 2024-025 Significant Deficiency Yes P
1102731 2024-035 Material Weakness Yes P
1102732 2024-041 Significant Deficiency Yes P
1102733 2024-042 Significant Deficiency Yes P
1102734 2024-047 Significant Deficiency Yes P
1102735 2024-053 Significant Deficiency - P
1102736 2024-058 Significant Deficiency Yes P
1102737 2024-061 Significant Deficiency - P
1102738 2024-064 Significant Deficiency Yes P
1102739 2024-067 Significant Deficiency Yes P
1102740 2024-068 Significant Deficiency Yes P
1102741 2024-071 Significant Deficiency Yes P
1102742 2024-082 Material Weakness Yes M
1102743 2024-085 Significant Deficiency Yes M
1102744 2024-086 Significant Deficiency Yes M

Programs

ALN Program Spent Major Findings
93.778 Medical Assistance Program $14.31B Yes 20
10.551 Supplemental Nutrition Assistance Program $1.75B - 0
84.268 Federal Direct Student Loans $1.10B Yes 13
84.063 Federal Pell Grant Program $458.60M Yes 11
10.555 National School Lunch Program $441.69M - 0
93.767 Children's Health Insurance Program $431.79M - 0
84.027 Special Education Grants to States $407.46M - 0
93.575 Child Care and Development Block Grant $382.46M - 0
84.010 Title I Grants to Local Educational Agencies $359.60M - 0
20.205 Highway Planning and Construction $339.23M - 0
17.225 Unemployment Insurance $306.60M - 0
84.425D Elementary and Secondary School Emergency Relief Fund $212.45M - 0
10.561 State Administrative Matching Grants for the Supplemental Nutrition Assistance Program $191.95M - 0
93.596 Child Care Mandatory and Matching Funds of the Child Care and Development Fund $160.66M - 0
93.558 Temporary Assistance for Needy Families $154.49M Yes 8
10.553 School Breakfast Program $149.53M - 0
93.568 Low-Income Home Energy Assistance $140.14M Yes 4
93.268 Immunization Cooperative Agreements $128.60M - 0
10.557 Wic Special Supplemental Nutrition Program for Women, Infants, and Children $103.67M - 0
84.126 Rehabilitation Services Vocational Rehabilitation Grants to States $98.85M - 0
10.542 Pandemic Ebt Food Benefits $89.99M Yes 1
93.659 Adoption Assistance $85.11M - 0
93.563 Child Support Services $69.43M - 0
96.001 Social Security Disability Insurance $68.11M - 0
93.667 Social Services Block Grant $61.91M - 0
93.658 Foster Care Title IV-E $59.92M - 0
10.558 Child and Adult Care Food Program $59.14M - 0
12.401 National Guard Military Operations and Maintenance (o&m) Projects $53.01M - 0
84.367 Supporting Effective Instruction State Grants (formerly Improving Teacher Quality State Grants) $46.79M Yes 1
84.425V American Rescue Plan – Emergency Assistance for Non-Public Schools (arp Eans) $42.08M - 0
93.959 Block Grants for Prevention and Treatment of Substance Abuse $37.00M - 0
16.575 Crime Victim Assistance $35.78M - 0
64.015 Veterans State Nursing Home Care $35.54M - 0
93.566 Refugee and Entrant Assistance State/replacement Designee Administered Programs $34.89M - 0
84.048 Career and Technical Education -- Basic Grants to States $31.62M - 0
84.425R Coronavirus Response and Relief Supplemental Appropriations Act, 2021– Emergency Assistance for Non-Public Schools (crrsa Eans) $27.56M - 0
84.424 Student Support and Academic Enrichment Program $27.41M - 0
20.509 Formula Grants for Rural Areas and Tribal Transit Program $27.33M - 0
93.045 Special Programs for the Aging, Title Iii, Part C, Nutrition Services $25.29M - 0
21.029 Coronavirus Capital Projects Fund $24.96M - 0
84.287 Twenty-First Century Community Learning Centers $23.46M - 0
10.569 Emergency Food Assistance Program (food Commodities) $23.23M - 0
10.568 Emergency Food Assistance Program (administrative Costs) $21.98M - 0
84.425S Heerf Supplemental Assistance to Institutions of Higher Education (saihe) Program $21.96M - 0
84.031 Higher Education Institutional Aid $21.40M - 0
93.044 Special Programs for the Aging, Title Iii, Part B, Grants for Supportive Services and Senior Centers $19.91M - 0
93.917 Hiv Care Formula Grants $19.87M - 0
84.365 English Language Acquisition State Grants $19.77M - 0
84.425F Heerf Institutional Portion $19.59M - 0
17.207 Employment Service/wagner-Peyser Funded Activities $18.97M - 0
12.400 Military Construction, National Guard $18.52M - 0
84.425C Governor’s Emergency Education Relief Fund $18.39M - 0
14.228 Community Development Block Grants/state's Program and Non-Entitlement Grants in Hawaii $17.48M - 0
17.259 Wioa Youth Activities $16.89M - 0
93.958 Block Grants for Community Mental Health Services $15.70M - 0
84.007 Federal Supplemental Educational Opportunity Grants $15.41M Yes 10
84.002 Adult Education - Basic Grants to States $15.36M - 0
66.458 Clean Water State Revolving Fund $15.17M - 0
20.223 Transportation Infrastructure Finance and Innovation Act (tifia) Program $14.96M - 0
84.369 Grants for State Assessments and Related Activities $14.93M - 0
93.069 Public Health Emergency Preparedness $14.89M - 0
66.468 Drinking Water State Revolving Fund $14.83M Yes 0
17.258 Wioa Adult Program $13.82M - 0
93.569 Community Services Block Grant $13.03M - 0
84.173 Special Education Preschool Grants $12.84M - 0
93.994 Maternal and Child Health Services Block Grant to the States $12.78M - 0
84.181 Special Education-Grants for Infants and Families $12.66M - 0
81.042 Weatherization Assistance for Low-Income Persons $12.18M - 0
93.110 Maternal and Child Health Federal Consolidated Programs $12.09M - 0
10.559 Summer Food Service Program for Children $12.00M - 0
93.354 Public Health Emergency Response: Cooperative Agreement for Emergency Response: Public Health Crisis Response $11.78M - 0
15.252 Abandoned Mine Land Reclamation (amlr) $11.41M - 0
93.775 State Medicaid Fraud Control Units $11.13M Yes 20
84.033 Federal Work-Study Program $10.54M Yes 10
20.218 Motor Carrier Safety Assistance $9.90M - 0
14.239 Home Investment Partnerships Program $9.43M - 0
15.611 Wildlife Restoration and Basic Hunter Education and Safety $9.33M - 0
93.434 Every Student Succeeds Act/preschool Development Grants $9.24M - 0
17.278 Wioa Dislocated Worker Formula Grants $9.19M - 0
93.556 Marylee Allen Promoting Safe and Stable Families Program $8.23M - 0
20.513 Enhanced Mobility of Seniors and Individuals with Disabilities $7.99M - 0
93.889 National Bioterrorism Hospital Preparedness Program $7.95M - 0
93.940 Hiv Prevention Activities Health Department Based $7.91M - 0
93.498 Provider Relief Fund and American Rescue Plan (arp) Rural Distribution $7.56M - 0
90.404 Hava Election Security Grants $7.55M - 0
66.605 Performance Partnership Grants $7.54M - 0
84.042 Trio Student Support Services $7.41M - 0
93.870 Maternal, Infant and Early Childhood Homevisiting Grant Program $7.31M - 0
10.560 State Administrative Expenses for Child Nutrition $7.17M - 0
14.231 Emergency Solutions Grant Program $6.89M - 0
14.275 Housing Trust Fund $6.85M - 0
20.616 National Priority Safety Programs $6.72M - 0
17.804 Local Veterans' Employment Representative Program $6.52M - 0
20.607 Alcohol Open Container Requirements $6.00M - 0
84.047 Trio Upward Bound $6.00M - 0
93.777 State Survey and Certification of Health Care Providers and Suppliers (title Xviii) Medicare $5.87M Yes 20
93.977 Sexually Transmitted Diseases (std) Prevention and Control Grants $5.87M - 0
19.009 Academic Exchange Programs - Undergraduate Programs $5.43M - 0
93.499 Low Income Household Water Assistance Program $5.35M - 0
64.203 Veterans Cemetery Grants Program $5.33M - 0
66.964 Geographic Programs - Chesapeake Bay Program Implementation, Regulatory/accountability and Monitoring Grants $5.27M - 0
10.565 Commodity Supplemental Food Program $5.12M - 0
15.928 Battlefield Land Acquisition Grants $5.04M - 0
84.116 Fund for the Improvement of Postsecondary Education $4.99M - 0
93.645 Stephanie Tubbs Jones Child Welfare Services Program $4.98M - 0
10.582 Fresh Fruit and Vegetable Program $4.93M - 0
84.184 School Safely National Activities $4.86M - 0
17.503 Occupational Safety and Health State Program $4.86M - 0
93.967 Centers for Disease Control and Prevention Collaboration with Academia to Strengthen Public Health $4.83M - 0
93.323 Epidemiology and Laboratory Capacity for Infectious Diseases (elc) $4.76M Yes 3
10.182 Pandemic Relief Activities: Local Food Purchase Agreements with States, Tribes, and Local Governments $4.76M - 0
15.605 Sport Fish Restoration $4.69M - 0
10.203 Payments to Agricultural Experiment Stations Under the Hatch Act $4.52M - 0
20.505 Metropolitan Transportation Planning and State and Non-Metropolitan Planning and Research $4.45M - 0
14.272 National Disaster Resilience Competition $4.41M - 0
93.052 National Family Caregiver Support, Title Iii, Part E $4.38M - 0
45.310 Grants to States $4.38M - 0
47.075 Social, Behavioral, and Economic Sciences $4.35M - 0
12.404 National Guard Challenge Program $4.28M - 0
12.910 Research and Technology Development $4.25M - 0
84.425W American Rescue Plan – Elementary and Secondary School Emergency Relief – Homeless Children and Youth $4.24M - 0
84.421 Disability Innovation Fund (dif) $4.06M - 0
81.135 Advanced Research Projects Agency - Energy $3.92M - 0
59.037 Small Business Development Centers $3.91M - 0
10.664 Cooperative Forestry Assistance $3.91M - 0
84.334 Gaining Early Awareness and Readiness for Undergraduate Programs $3.88M - 0
95.001 High Intensity Drug Trafficking Areas Program $3.88M - 0
93.898 Cancer Prevention and Control Programs for State, Territorial and Tribal Organizations $3.80M - 0
84.038 Federal Perkins Loan - Federal Capital Contributions $3.79M Yes 10
23.002 Appalachian Area Development $3.79M - 0
16.606 State Criminal Alien Assistance Program $3.74M - 0
93.217 Family Planning Services $3.72M - 0
93.243 Substance Abuse and Mental Health Services Projects of Regional and National Significance $3.66M - 0
10.205 Payments to 1890 Land-Grant Colleges and Tuskegee University $3.54M - 0
97.061 Centers for Homeland Security $3.45M - 0
15.250 Regulation of Surface Coal Mining and Surface Effects of Underground Coal Mining $3.44M - 0
94.006 Americorps State and National 94.006 $3.34M - 0
19.705 Trans-National Crime $3.30M - 0
93.671 Family Violence Prevention and Services/domestic Violence Shelter and Supportive Services $3.19M - 0
93.077 Family Smoking Prevention and Tobacco Control Act Regulatory Research $3.08M - 0
93.632 University Centers for Excellence in Developmental Disabilities Education, Research, and Service $3.07M - 0
84.425E Heerf Student Aid Portion $3.02M - 0
84.425J Heerf Historically Black Colleges and Universities (hbcus) $3.00M - 0
84.358 Rural Education $2.98M - 0
16.576 Crime Victim Compensation $2.91M - 0
12.420 Military Medical Research and Development $2.81M - 0
93.991 Preventive Health and Health Services Block Grant $2.74M - 0
16.588 Violence Against Women Formula Grants $2.72M - 0
93.398 Cancer Research Manpower $2.68M - 0
10.475 Cooperative Agreements with States for Intrastate Meat and Poultry Inspection $2.67M - 0
84.044 Trio Talent Search $2.63M - 0
47.084 Nsf Technology, Innovation, and Partnerships $2.55M - 0
66.466 Geographic Programs - Chesapeake Bay Program $2.53M - 0
81.041 State Energy Program $2.53M - 0
93.472 Title IV-E Prevention Program $2.52M - 0
97.012 Boating Safety Financial Assistance $2.50M - 0
17.245 Trade Adjustment Assistance $2.46M - 0
16.710 Public Safety Partnership and Community Policing Grants $2.44M - 0
84.325 Special Education - Personnel Development to Improve Services and Results for Children with Disabilities $2.31M - 0
20.219 Recreational Trails Program $2.31M - 0
93.732 Mental and Behavioral Health Education and Training Grants $2.25M - 0
93.669 Child Abuse and Neglect State Grants $2.21M - 0
93.103 Food and Drug Administration Research $2.17M - 0
93.235 Title V State Sexual Risk Avoidance Education (title V State Srae) Program $2.14M - 0
84.327 Special Education Educational Technology Media, and Materials for Individuals with Disabilities $2.14M - 0
10.025 Plant and Animal Disease, Pest Control, and Animal Care $2.12M - 0
93.674 John H. Chafee Foster Care Program for Successful Transition to Adulthood $2.12M - 0
66.460 Nonpoint Source Implementation Grants $2.11M - 0
10.093 Voluntary Public Access and Habitat Incentive Program $2.10M - 0
10.512 Extension Services at 1890 Colleges and Tuskegee University, West Virginia State College, and Central State University $2.08M - 0
93.116 Project Grants and Cooperative Agreements for Tuberculosis Control Programs $2.07M - 0
15.945 Cooperative Research and Training Programs – Resources of the National Park System $2.03M - 0
93.053 Nutrition Services Incentive Program $2.02M - 0
93.630 Developmental Disabilities Basic Support and Advocacy Grants $1.99M - 0
45.129 Promotion of the Humanities Federal/state Partnership $1.97M - 0
93.279 Drug Abuse and Addiction Research Programs $1.94M - 0
93.387 National and State Tobacco Control Program $1.87M - 0
66.805 Leaking Underground Storage Tank Trust Fund Corrective Action Program $1.86M - 0
16.741 Dna Backlog Reduction Program $1.83M - 0
17.235 Senior Community Service Employment Program $1.82M - 0
66.432 State Public Water System Supervision $1.82M - 0
84.335 Child Care Access Means Parents in School $1.79M - 0
81.089 Fossil Energy Research and Development $1.75M - 0
93.364 Nursing Student Loans $1.73M Yes 0
14.900 Lead Hazard Reduction Grant Program $1.73M - 0
20.700 Pipeline Safety Program State Base Grant $1.72M - 0
10.578 Wic Grants to States (wgs) $1.62M - 0
93.516 Public Health Training Centers Program $1.61M - 0
93.107 Area Health Education Centers $1.59M - 0
93.469 Assistive Technology Alternative Financing Program $1.56M - 0
93.426 The National Cardiovascular Health Program $1.53M - 0
11.459 Weather and Air Quality Research $1.52M - 0
15.678 Cooperative Ecosystem Studies Units $1.49M - 0
17.002 Labor Force Statistics $1.47M - 0
16.833 National Sexual Assault Kit Initiative $1.47M - 0
14.241 Housing Opportunities for Persons with Aids $1.45M - 0
93.262 Occupational Safety and Health Program $1.42M - 0
84.423 Supporting Effective Educator Development Program $1.41M - 0
10.665 Schools and Roads - Grants to States $1.39M - 0
93.213 Research and Training in Complementary and Integrative Health $1.38M - 0
15.904 Historic Preservation Fund Grants-in-Aid $1.37M - 0
12.002 Procurement Technical Assistance for Business Firms $1.35M - 0
11.609 Measurement and Engineering Research and Standards $1.33M - 0
10.937 Partnerships for Climate-Smart Commodities $1.31M - 0
93.351 Research Infrastructure Programs $1.30M - 0
93.150 Projects for Assistance in Transition From Homelessness (path) $1.30M - 0
84.382 Strengthening Minority-Serving Institutions $1.28M - 0
97.029 Flood Mitigation Assistance $1.27M - 0
16.554 National Criminal History Improvement Program (nchip) $1.25M - 0
15.916 Outdoor Recreation Acquisition, Development and Planning $1.25M - 0
93.393 Cancer Cause and Prevention Research $1.25M - 0
10.766 Community Facilities Loans and Grants $1.25M - 0
84.013 Title I State Agency Program for Neglected and Delinquent Children and Youth $1.22M - 0
12.U11 Other Assistance $1.18M - 0
11.028 Connecting Minority Communities Pilot Program $1.16M - 0
84.196 Education for Homeless Children and Youth $1.16M - 0
64.101 Burial Expenses Allowance for Veterans $1.13M - 0
20.526 Buses and Bus Facilities Formula, Competitive, and Low Or No Emissions Programs $1.12M - 0
93.088 Advancing System Improvements for Key Issues in Women's Health $1.11M - 0
84.177 Rehabilitation Services Independent Living Services for Older Individuals Who Are Blind $1.11M - 0
15.957 Emergency Supplemental Historic Preservation Fund $1.10M - 0
93.946 Cooperative Agreements to Support State-Based Safe Motherhood and Infant Health Initiative Programs $1.09M - 0
93.324 State Health Insurance Assistance Program $1.07M - 0
17.504 Consultation Agreements $1.05M - 0
93.355 Public Health Informatics & Technology Workforce Development Program (the Phit Workforce Development Program) $1.04M - 0
84.187 Supported Employment Services for Individuals with the Most Significant Disabilities $1.04M - 0
84.372 Statewide Longitudinal Data Systems $1.04M - 0
17.280 Wioa Dislocated Worker National Reserve Demonstration Grants $1.00M - 0
93.747 Elder Abuse Prevention Interventions Program $992,814 - 0
93.590 Community-Based Child Abuse Prevention Grants $988,553 - 0
10.202 Cooperative Forestry Research $982,517 - 0
93.944 Human Immunodeficiency Virus (hiv)/acquired Immunodeficiency Virus Syndrome (aids) Surveillance $980,405 - 0
93.435 The Innovative Cardiovascular Health Program $977,332 - 0
93.918 Grants to Provide Outpatient Early Intervention Services with Respect to Hiv Disease $957,635 - 0
99.U01 Other Assistance $952,686 - 0
45.025 Promotion of the Arts Partnership Agreements $935,541 - 0
93.493 Congressional Directives $929,493 - 0
16.540 Juvenile Justice and Delinquency Prevention $927,996 - 0
93.866 Aging Research $919,878 - 0
66.818 Brownfields Multipurpose, Assessment, Revolving Loan Fund, and Cleanup Cooperative Agreements $904,117 - 0
16.034 Coronavirus Emergency Supplemental Funding Program $903,044 - 0
16.738 Edward Byrne Memorial Justice Assistance Grant Program $899,919 - 0
64.124 All-Volunteer Force Educational Assistance $895,937 - 0
93.779 Centers for Medicare and Medicaid Services (cms) Research, Demonstrations and Evaluations $894,095 - 0
47.078 Polar Programs $886,144 - 0
93.071 Medicare Enrollment Assistance Program $881,630 - 0
10.680 Forest Health Protection $879,077 - 0
84.323 Special Education - State Personnel Development $856,824 - 0
93.273 Alcohol Research Programs $855,431 - 0
84.215 Innovative Approaches to Literacy; Promise Neighborhoods; Full-Service Community Schools; and Congressionally Directed Spending for Elementary and Secondary Education Community Projects $855,399 - 0
11.032 State Digital Equity Planning and Capacity Grant $851,562 - 0
99.U02 Other Assistance $849,902 - 0
97.036 Disaster Grants - Public Assistance (presidentially Declared Disasters) $848,147 - 0
93.810 Paul Coverdell National Acute Stroke Program National Center for Chronic Disease Prevention and Health Promotion $839,013 - 0
93.926 Healthy Start Initiative $837,016 - 0
16.017 Sexual Assault Services Formula Program $828,378 - 0
84.011 Migrant Education State Grant Program $826,653 - 0
21.023 Emergency Rental Assistance Program $798,680 - 0
47.079 Office of International Science and Engineering $796,412 - 0
93.113 Environmental Health $786,616 - 0
99.U04 Other Assistance $780,837 - 0
93.242 Mental Health Research Grants $774,928 - 0
93.600 Head Start $757,705 - 0
10.971 Urban Agriculture and Urban County Committee Outreach, Technical Assistance, and Education $755,075 - 0
97.042 Emergency Management Performance Grants $754,248 - 0
93.165 Grants to States for Loan Repayment $749,425 - 0
66.039 Diesel Emission Reduction Act (dera) National Grants $747,543 - 0
10.579 Child Nutrition Discretionary Grants Limited Availability $745,535 - 0
93.865 Child Health and Human Development Extramural Research $744,821 - 0
12.RD Other Assistance $744,721 - 0
10.524 Scholarships for Students at 1890 Institutions $744,450 - 0
12.020 Starbase Program $736,061 - 0
15.634 State Wildlife Grants $734,385 - 0
93.395 Cancer Treatment Research $731,857 - 0
17.273 Temporary Labor Certification for Foreign Workers $711,912 - 0
11.469 Congressionally Identified Awards and Projects $707,025 - 0
98.011 Global Development Alliance $697,973 - 0
93.172 Human Genome Research $681,576 - 0
93.342 Health Professions Student Loans, Including Primary Care Loans/loans for Disadvantaged Students $674,290 Yes 0
93.464 Acl Assistive Technology $666,889 - 0
84.066 Trio Educational Opportunity Centers $663,187 - 0
16.813 Nics Act Record Improvement Program $660,686 - 0
16.817 Byrne Criminal Justice Innovation Program $660,002 - 0
93.838 Lung Diseases Research $659,744 - 0
93.092 Affordable Care Act (aca) Personal Responsibility Education Program $658,570 - 0
17.261 Workforce Data Quality Initiative (wdqi) $656,256 - 0
93.121 Oral Diseases and Disorders Research $650,893 - 0
64.005 Grants to States for Construction of State Home Facilities $650,601 - 0
10.699 Partnership Agreements $648,366 - 0
12.U10 Other Assistance $643,733 - 0
39.003 Donation of Federal Surplus Personal Property $640,772 - 0
66.454 Water Quality Management Planning $633,210 - 0
97.U04 Other Assistance $632,725 - 0
93.853 Extramural Research Programs in the Neurosciences and Neurological Disorders $630,831 - 0
93.043 Special Programs for the Aging, Title Iii, Part D, Disease Prevention and Health Promotion Services $630,434 - 0
11.478 Center for Sponsored Coastal Ocean Research Coastal Ocean Program $626,093 - 0
84.U02 Other Assistance $611,474 - 0
84.425M Heerf Strengthening Institutions Program (sip) $599,760 - 0
16.543 Missing Children's Assistance $593,155 - 0
84.206 Javits Gifted and Talented Students Education $589,943 - 0
93.847 Diabetes, Digestive, and Kidney Diseases Extramural Research $585,011 - 0
12.630 Basic, Applied, and Advanced Research in Science and Engineering $582,290 - 0
15.808 U.s. Geological Survey Research and Data Collection $581,051 - 0
81.008 Cybersecurity, Energy Security & Emergency Response (ceser) $579,269 - 0
93.366 State Actions to Improve Oral Health Outcomes and Partner Actions to Improve Oral Health Outcomes $570,857 - 0
16.321 Antiterrorism Emergency Reserve $567,841 - 0
12.750 Uniformed Services University Medical Research Projects $561,906 - 0
93.090 Guardianship Assistance $560,653 - 0
11.454 Unallied Management Projects $559,584 - 0
12.113 State Memorandum of Agreement Program for the Reimbursement of Technical Services $555,862 - 0
93.070 Environmental Public Health and Emergency Response $547,305 - 0
93.421 Strengthening Public Health Systems and Services Through National Partnerships to Improve and Protect the Nation’s Health $544,262 - 0
93.603 Adoption and Legal Guardianship Incentive Payments Program $542,196 - 0
10.311 Beginning Farmer and Rancher Development Program $539,751 - 0
93.042 Special Programs for the Aging, Title Vii, Chapter 2, Long Term Care Ombudsman Services for Older Individuals $532,747 - 0
19.501 Public Diplomacy Programs for Afghanistan and Pakistan $530,858 - 0
93.497 Family Violence Prevention and Services/ Sexual Assault/rape Crisis Services and Supports $528,484 - 0
20.701 University Transportation Centers Program $528,233 - 0
17.271 Work Opportunity Tax Credit Program (wotc) $518,589 - 0
93.941 Hiv Demonstration, Research, Public and Professional Education Projects $518,188 - 0
93.336 Behavioral Risk Factor Surveillance System $510,008 - 0
10.676 Forest Legacy Program $502,413 - 0
99.U03 Other Assistance $499,759 - 0
10.574 Team Nutrition Grants $497,438 - 0
59.061 State Trade Expansion $497,375 - 0
84.217 Trio McNair Post-Baccalaureate Achievement $495,707 - 0
97.045 Cooperating Technical Partners $490,580 - 0
15.810 National Cooperative Geologic Mapping $489,773 - 0
97.067 Homeland Security Grant Program $484,688 - 0
10.576 Senior Farmers Market Nutrition Program $479,795 - 0
93.369 Acl Independent Living State Grants $472,000 - 0
20.200 Highway Research and Development Program $469,287 - 0
11.012 Integrated Ocean Observing System (ioos) $466,834 - 0
93.233 National Center on Sleep Disorders Research $464,686 - 0
93.334 The Healthy Brain Initiative: Technical Assistance to Implement Public Health Actions Related to Cognitive Health, Cognitive Impairment, and Caregiving at the State and Local Levels $461,182 - 0
14.401 Fair Housing Assistance Program $459,781 - 0
97.132 Financial Assistance for Targeted Violence and Terrorism Prevention $458,869 - 0
93.191 Graduate Psychology Education $452,423 - 0
10.310 Agriculture and Food Research Initiative (afri) $450,749 - 0
16.593 Residential Substance Abuse Treatment for State Prisoners $448,911 - 0
47.041 Engineering $447,500 - 0
66.509 Science to Achieve Results (star) Research Program $446,504 - 0
10.649 Pandemic Ebt Administrative Costs $445,573 - 0
43.003 Exploration $444,560 - 0
84.264 Rehabilitation Training Technical Assistance Centers $440,765 - 0
93.153 Coordinated Services and Access to Research for Women, Infants, Children, and Youth $436,521 - 0
93.912 Rural Health Care Services Outreach, Rural Health Network Development and Small Health Care Provider Quality Improvement $434,125 - 0
97.047 Bric: Building Resilient Infrastructure and Communities $433,963 - 0
16.839 Stop School Violence $433,160 - 0
93.945 Assistance Programs for Chronic Disease Prevention and Control $426,992 - 0
10.912 Environmental Quality Incentives Program $426,147 - 0
66.034 Surveys, Studies, Research, Investigations, Demonstrations, and Special Purpose Activities Relating to the Clean Air Act $420,151 - 0
94.003 Americorps State Commissions Support Grant $419,342 - 0
84.129 Rehabilitation Long-Term Training $417,099 - 0
93.326 Strengthening Public Health Through Surveillance, Epidemiologic Research, Disease Detection and Prevention $411,445 - 0
93.211 Rural Telemedicine Grants $404,280 - 0
11.035 Broadband Equity, Access, and Deployment Program $401,838 - 0
93.879 Medical Library Assistance $400,824 - 0
16.753 Congressionally Recommended Awards $399,880 - 0
97.041 National Dam Safety Program $394,895 - 0
16.742 Paul Coverdell Forensic Sciences Improvement Grant Program $394,870 - 0
11.420 Coastal Zone Management Estuarine Research Reserves $388,291 - 0
94.026 Americorps National Service and Civic Engagement Research Competition 94.026 $386,136 - 0
10.234 American Rescue Plan Technical Assistance Investment Program $380,733 - 0
15.805 Assistance to State Water Resources Research Institutes $378,627 - 0
93.310 Trans-Nih Research Support $374,970 - 0
43.012 Space Technology $374,545 - 0
93.241 State Rural Health Flexibility Program $374,187 - 0
93.253 Poison Control Stabilization and Enhancement Grants $373,270 - 0
15.RD Other Assistance $367,654 - 0
12.550 The Language Flagship Grants to Institutions of Higher Education $366,947 - 0
10.290 Agricultural Market and Economic Research $365,813 - 0
84.305 Education Research, Development and Dissemination $364,218 - 0
45.164 Promotion of the Humanities Public Programs $364,028 - 0
84.379 Teacher Education Assistance for College and Higher Education Grants (teach Grants) $360,577 Yes 10
97.077 Homeland Security Research, Development, Testing, Evaluation and Demonstration of Technologies Related to Countering Weapons of Mass Destruction $355,284 - 0
11.017 Ocean Acidification Program (oap) $355,238 - 0
93.197 Childhood Lead Poisoning Prevention Projects, State and Local Childhood Lead Poisoning Prevention and Surveillance of Blood Lead Levels in Children $353,685 - 0
93.599 Chafee Education and Training Vouchers Program (etv) $349,918 - 0
11.474 Atlantic Coastal Fisheries Cooperative Management Act $349,732 - 0
93.988 Cooperative Agreements for Diabetes Control Programs $346,990 - 0
93.586 State Court Improvement Program $346,047 - 0
10.902 Soil and Water Conservation $345,630 - 0
93.270 Viral Hepatitis Prevention and Control $344,317 - 0
15.608 Fish and Wildlife Management Assistance $344,226 - 0
12.U07 Other Assistance $342,603 - 0
97.056 Port Security Grant Program $340,750 - 0
93.008 Medical Reserve Corps Small Grant Program $337,447 - 0
93.855 Allergy and Infectious Diseases Research $331,960 - 0
93.236 Grants to States to Support Oral Health Workforce Activities $328,698 - 0
66.419 Water Pollution Control State, Interstate, and Tribal Program Support $328,584 - 0
93.264 Nurse Faculty Loan Program (nflp) $327,853 Yes 0
93.399 Cancer Control $323,672 - 0
84.425P Institutional Resilience and Expanded Postsecondary Opportunity $320,157 - 0
10.250 Agricultural and Rural Economic Research, Cooperative Agreements and Collaborations $319,802 - 0
93.839 Blood Diseases and Resources Research $319,181 - 0
93.072 Lifespan Respite Care Program $318,585 - 0
11.434 Cooperative Fishery Statistics $315,135 - 0
16.525 Grants to Reduce Domestic Violence, Dating Violence, Sexual Assault, and Stalking on Campus $315,010 - 0
10.675 Urban and Community Forestry Program $307,600 - 0
93.495 Community Health Workers for Public Health Response and Resilient $302,264 - 0
10.219 Biotechnology Risk Assessment Research $295,892 - 0
97.044 Assistance to Firefighters Grant $295,750 - 0
12.431 Basic Scientific Research $294,761 - 0
10.727 Inflation Reduction Act Urban & Community Forestry Program $290,350 - 0
11.312 Research and Evaluation Program $288,232 - 0
93.840 Translation and Implementation Science Research for Heart, Lung, Blood Diseases, and Sleep Disorders $287,298 - 0
20.703 Interagency Hazardous Materials Public Sector Training and Planning Grants $282,252 - 0
97.023 Community Assistance Program State Support Services Element (cap-Ssse) $281,007 - 0
12.U01 Other Assistance $278,976 - 0
19.012 Professional and Cultural Exchange Programs - Special Professional and Cultural Programs $275,441 - 0
27.011 Intergovernmental Personnel Act (ipa) Mobility Program $274,048 - 0
15.506 Water Desalination Research and Development $273,441 - 0
20.U01 Other Assistance $273,096 - 0
10.541 Child Nutrition-Technology Innovation Grant $273,039 - 0
12.006 National Defense Education Program $272,346 - 0
66.809 Superfund State and Indian Tribe Core Program Cooperative Agreements $269,770 - 0
10.855 Distance Learning and Telemedicine Loans and Grants $268,011 - 0
20.528 Rail Fixed Guideway Public Transportation System State Safety Oversight Formula Grant Program $265,657 - 0
19.345 International Programs to Support Democracy, Human Rights and Labor $260,847 - 0
45.301 Museums for America $258,591 - 0
20.319 High-Speed Rail Corridors and Intercity Passenger Rail Service – Capital Assistance Grants $255,765 - 0
93.301 Small Rural Hospital Improvement Grant Program $254,127 - 0
32.RD Other Assistance $252,856 - 0
66.804 Underground Storage Tank (ust) Prevention, Detection, and Compliance Program $251,994 - 0
16.609 Project Safe Neighborhoods $251,234 - 0
97.RD Other Assistance $250,995 - 0
10.707 Research Joint Venture and Cost Reimbursable Agreements $250,579 - 0
14.906 Healthy Homes Technical Studies Grants $243,444 - 0
10.550 Food Donation $242,291 - 0
66.RD Other Assistance $240,422 - 0
20.108 Aviation Research Grants $236,192 - 0
84.326 Special Education Technical Assistance and Dissemination to Improve Services and Results for Children with Disabilities $235,781 - 0
12.903 Gencyber Grants Program $234,939 - 0
10.678 Forest Stewardship Program $233,973 - 0
14.267 Continuum of Care Program $231,934 - 0
12.800 Air Force Defense Research Sciences Program $231,722 - 0
66.802 Superfund State, Political Subdivision, and Indian Tribe Site-Specific Cooperative Agreements $231,336 - 0
94.008 Americorps Commission Investment Fund 94.008 $230,115 - 0
12.801 Air Force Academy Athletic Programs $229,017 - 0
16.812 Second Chance Act Reentry Initiative $227,404 - 0
93.137 Community Programs to Improve Minority Health Grant Program $226,754 - 0
45.163 Promotion of the Humanities Professional Development $220,007 - 0
10.720 Infrastructure Investment and Jobs Act Community Wildfire Defense Grants $219,289 - 0
10.697 State & Private Forestry Hazardous Fuel Reduction Program $219,089 - 0
45.149 Promotion of the Humanities Division of Preservation and Access $217,744 - 0
10.600 Foreign Market Development Cooperator Program $217,510 - 0
64.014 Veterans State Domiciliary Care $210,258 - 0
84.200 Graduate Assistance in Areas of National Need $206,958 - 0
11.407 Interjurisdictional Fisheries Act of 1986 $202,411 - 0
16.550 State Justice Statistics Program for Statistical Analysis Centers $199,771 - 0
16.582 Crime Victim Assistance/discretionary Grants $199,157 - 0
93.130 Cooperative Agreements to States/territories for the Coordination and Development of Primary Care Offices $198,510 - 0
66.472 Beach Monitoring and Notification Program Implementation Grants $197,676 - 0
16.590 Grants to Encourage Arrest Policies and Enforcement of Protection Orders Program $197,554 - 0
85.U02 Other Assistance $197,069 - 0
23.001 Appalachian Regional Development (see Individual Appalachian Programs) $196,376 - 0
19.025 U.s. Ambassadors Fund for Cultural Preservation $196,315 - 0
12.617 Economic Adjustment Assistance for State Governments $194,511 - 0
47.074 Biological Sciences $194,211 - 0
10.329 Crop Protection and Pest Management Competitive Grants Program $193,882 - 0
12.330 Science, Technology, Engineering & Mathematics (stem) Education, Outreach and Workforce Program $193,800 - 0
93.251 Universal Newborn Hearing and Screening $190,441 - 0
66.817 State and Tribal Response Program Grants $190,432 - 0
11.432 National Oceanic and Atmospheric Administration (noaa) Cooperative Institutes $189,519 - 0
93.234 Traumatic Brain Injury State Demonstration Grant Program $184,935 - 0
21.RD Other Assistance $183,664 - 0
93.969 Pphf Geriatric Education Centers $182,065 - 0
93.240 State Capacity Building $178,856 - 0
15.944 Natural Resource Stewardship $177,590 - 0
81.113 Defense Nuclear Nonproliferation Research $175,505 - 0
81.123 National Nuclear Security Administration (nnsa) Minority Serving Institutions (msi) Program $174,029 - 0
17.285 Registered Apprenticeship $173,492 - 0
10.674 Wood Utilization Assistance $173,346 - 0
15.255 Science and Technology Projects Related to Coal Mining and Reclamation $172,496 - 0
93.319 Outreach Programs to Reduce the Prevalence of Obesity in High Risk Rural Areas $168,629 - 0
77.008 U.s. Nuclear Regulatory Commission Scholarship and Fellowship Program $167,567 - 0
89.003 National Historical Publications and Records Grants $166,650 - 0
20.RD Other Assistance $166,435 - 0
10.646 Summer Electronic Benefit Transfer Program for Children $166,406 - 0
45.309 Museum Grants for African American History and Culture $165,968 - 0
20.106 Airport Improvement Program, Covid-19 Airports Programs, and Infrastructure Investment and Jobs Act Programs $165,279 - 0
15.616 Clean Vessel Act $165,139 - 0
15.622 Sportfishing and Boating Safety Act $164,757 - 0
45.024 Promotion of the Arts Grants to Organizations and Individuals $164,540 - 0
12.902 Information Security Grants $163,411 - 0
93.846 Arthritis, Musculoskeletal and Skin Diseases Research $162,179 - 0
20.939 Safe Streets and Roads for All $160,616 - 0
10.684 International Forestry Programs $160,174 - 0
93.078 Strengthening Emergency Care Delivery in the United States Healthcare System Through Health Information and Promotion $159,728 - 0
17.005 Compensation and Working Conditions $159,257 - 0
11.457 Chesapeake Bay Studies $159,110 - 0
10.698 State & Private Forestry Cooperative Fire Assistance $157,564 - 0
10.170 Specialty Crop Block Grant Program - Farm Bill $157,290 - 0
19.RD Other Assistance $155,172 - 0
12.351 Scientific Research - Combating Weapons of Mass Destruction $154,731 - 0
10.525 Farm and Ranch Stress Assistance Network Competitive Grants Program $149,850 - 0
10.479 Food Safety Cooperative Agreements $148,114 - 0
14.235 Supportive Housing Program $148,081 - 0
20.232 Commercial Driver's License Program Implementation Grant $147,935 - 0
10.721 Infrastructure Investment and Jobs Act Temporary Bridge Program $146,837 - 0
93.U01 Other Assistance $145,367 - 0
12.900 Language Grant Program $145,163 - 0
93.913 Grants to States for Operation of Offices of Rural Health $145,067 - 0
93.564 Child Support Services Research $145,059 - 0
84.324 Research in Special Education $144,363 - 0
93.124 Nurse Anesthetist Traineeship $144,312 - 0
66.444 Voluntary School and Child Care Lead Testing and Reduction Grant Program (sdwa 1464(d)) $144,199 - 0
66.032 State Indoor Radon Grants $142,935 - 0
66.608 Environmental Information Exchange Network Grant Program and Related Assistance $140,175 - 0
84.263 Innovative Rehabilitation Training $139,038 - 0
84.428 Augustus F. Hawkins Centers of Excellence—teacher Preparation and Development $138,699 - 0
15.628 Multistate Conservation Grant $137,764 - 0
10.215 Sustainable Agriculture Research and Education $137,511 - 0
11.011 Ocean Exploration $137,053 - 0
12.021 Army National Guard Army Compatible Use Buffer Program $135,854 - 0
45.160 Promotion of the Humanities Fellowships and Stipends $134,135 - 0
93.353 21st Century Cures Act - Beau Biden Cancer Moonshot $132,068 - 0
15.032 Indian Economic Development $130,402 - 0
16.U02 Other Assistance $130,122 - 0
11.303 Economic Development Technical Assistance $127,747 - 0
10.516 Rural Health and Safety Education Competitive Grants Program $126,870 - 0
47.049 Mathematical and Physical Sciences $125,332 - 0
59.059 Congressional Grants $123,217 - 0
93.314 Early Hearing Detection and Intervention Information System (ehdi-Is) Surveillance Program $122,637 - 0
11.417 Sea Grant Support $122,145 - 0
19.415 Professional and Cultural Exchange Programs - Citizen Exchanges $119,695 - 0
17.502 Occupational Safety and Health Susan Harwood Training Grants $118,612 - 0
17.600 Mine Health and Safety Grants $118,221 - 0
93.597 Grants to States for Access and Visitation Programs $118,171 - 0
59.058 Federal and State Technology Partnership Program $115,982 - 0
93.396 Cancer Biology Research $115,240 - 0
12.U15 Other Assistance $114,854 - 0
93.283 Centers for Disease Control and Prevention Investigations and Technical Assistance $114,340 - 0
84.144 Migrant Education Coordination Program $114,125 - 0
21.027 Coronavirus State and Local Fiscal Recovery Funds $108,914 Yes 1
10.156 Federal-State Marketing Improvement Program $108,822 - 0
81.049 Office of Science Financial Assistance Program $103,961 - 0
45.312 National Leadership Grants $103,080 - 0
15.664 Fish and Wildlife Coordination and Assistance $102,529 - 0
21.016 Equitable Sharing $100,465 - 0
66.442 Water Infrastructure Improvements for the Nation Small and Underserved Communities Emerging Contaminants Grant Program $99,169 - 0
84.407 Transition Programs for Students with Intellectual Disabilities Into Higher Education $99,023 - 0
20.614 National Highway Traffic Safety Administration (nhtsa) Discretionary Safety Grants and Cooperative Agreements $98,703 - 0
93.073 Birth Defects and Developmental Disabilities - Prevention and Surveillance $98,608 - 0
84.RD Other Assistance $98,043 - 0
17.270 Reentry Employment Opportunities $97,782 - 0
12.905 Cybersecurity Core Curriculum $95,318 - 0
93.RD Other Assistance $94,733 - 0
93.433 Acl National Institute on Disability, Independent Living, and Rehabilitation Research $94,712 - 0
81.RD Other Assistance $93,793 - 0
93.041 Special Programs for the Aging, Title Vii, Chapter 3, Programs for Prevention of Elder Abuse, Neglect, and Exploitation $93,462 - 0
93.266 Hiv Demonstration, Research, Public and Professional Education Projects $90,082 - 0
16.838 Comprehensive Opioid, Stimulant, and Other Substances Use Program $89,974 - 0
43.008 Office of Stem Engagement (ostem) $89,582 - 0
93.696 Certified Community Behavioral Health Clinic Expansion Grants $89,381 - 0
47.076 Stem Education (formerly Education and Human Resources) $89,110 - 0
15.626 Enhanced Hunter Education and Safety $88,709 - 0
93.631 Developmental Disabilities Projects of National Significance $88,650 - 0
85.U01 Other Assistance $88,173 - 0
12.901 Mathematical Sciences Grants $88,169 - 0
10.537 Supplemental Nutrition Assistance Program (snap) Employment and Training (e&t) Data and Technical Assistance Grants $87,633 - 0
19.121 Conflict and Stabilization Operations $87,630 - 0
11.619 Arrangements for Interdisciplinary Research Infrastructure $87,270 - 0
16.RD Other Assistance $87,021 - 0
66.511 Office of Research and Development Consolidated Research/training/fellowships $85,558 - 0
10.572 Wic Farmers' Market Nutrition Program (fmnp) $85,339 - 0
93.761 Evidence-Based Falls Prevention Programs Financed Solely by Prevention and Public Health Funds (pphf) $85,272 - 0
10.028 Wildlife Services $83,682 - 0
10.691 Good Neighbor Authority $83,654 - 0
10.320 Sun Grant Program $83,408 - 0
16.320 Services for Trafficking Victims $82,310 - 0
10.608 Food for Education $82,281 - 0
16.004 Law Enforcement Assistance Narcotics and Dangerous Drugs Training $81,292 - 0
12.005 Conservation and Rehabilitation of Natural Resources on Military Installations $81,060 - 0
12.U06 Other Assistance $80,304 - 0
10.207 Animal Health and Disease Research $79,687 - 0
15.954 National Park Service Conservation, Protection, Outreach, and Education $79,640 - 0
17.289 Community Project Funding/congressionally Directed Spending $79,382 - 0
47.083 Integrative Activities $78,666 - 0
12.740 Past Conflict Accounting $77,186 - 0
12.100 Aquatic Plant Control $75,761 - 0
81.086 Conservation Research and Development $75,363 - 0
97.137 State and Local Cybersecurity Grant Program Tribal Cybersecurity Grant Program $74,146 - 0
12.U05 Other Assistance $72,487 - 0
93.307 Minority Health and Health Disparities Research $72,434 - 0
93.079 Cooperative Agreements to Promote Adolescent Health Through School-Based Hiv/std Prevention and School-Based Surveillance $71,066 - 0
15.657 Endangered Species Recovery Implementation $70,877 - 0
12.357 Rotc Language and Culture Training Grants $70,650 - 0
10.U02 Other Assistance $68,827 - 0
96.007 Social Security Research and Demonstration $67,454 - 0
66.461 Regional Wetland Program Development Grants $66,508 - 0
93.127 Emergency Medical Services for Children $66,201 - 0
93.837 Cardiovascular Diseases Research $65,251 - 0
20.U05 Other Assistance $63,534 - 0
93.U03 Other Assistance $63,290 - 0
10.307 Organic Agriculture Research and Extension Initiative $62,682 - 0
12.632 Legacy Resource Management Program $61,618 - 0
15.658 Natural Resource Damage Assessment and Restoration $61,250 - 0
11.431 Climate and Atmospheric Research $59,182 - 0
12.U03 Other Assistance $58,567 - 0
43.U01 Other Assistance $56,585 - 0
43.002 Aeronautics $56,205 - 0
10.514 Expanded Food and Nutrition Education Program $55,887 - 0
10.210 Higher Education National Needs Graduate Fellowship Grants $55,605 - 0
16.585 Treatment Court Discretionary Grant Program $55,357 - 0
97.U02 Other Assistance $54,933 - 0
10.523 Centers of Excellence at 1890 Institutions $54,896 - 0
97.U03 Other Assistance $54,542 - 0
93.080 Blood Disorder Program: Prevention, Surveillance, and Research $54,479 - 0
15.812 Cooperative Research Units $54,414 - 0
84.336 Teacher Quality Partnership Grants $53,940 - 0
10.950 Agricultural Statistics Reports $52,906 - 0
15.073 Earth Mapping Resources Initiative $52,236 - 0
93.470 Alzheimer’s Disease Program Initiative (adpi) $52,162 - 0
20.U03 Other Assistance $52,122 - 0
93.989 International Research and Research Training $51,529 - 0
20.U04 Other Assistance $51,312 - 0
12.300 Basic and Applied Scientific Research $51,027 - 0
10.069 Conservation Reserve Program $50,600 - 0
10.303 Integrated Programs $50,581 - 0
77.007 U.s. Nuclear Regulatory Commission Minority Serving Institutions Program (msip) $50,000 - 0
10.163 Market Protection and Promotion $49,804 - 0
10.734 Inflation Reduction Act - Forest Legacy Program $49,729 - 0
15.424 Marine Minerals Activities $49,663 - 0
93.391 Activities to Support State, Tribal, Local and Territorial (stlt) Health Department Response to Public Health Or Healthcare Crises $49,605 Yes 2
93.286 Discovery and Applied Research for Technological Innovations to Improve Human Health $49,401 - 0
64.RD Other Assistance $49,214 - 0
59.U01 Other Assistance $49,045 - 0
10.233 Open Data Standards $48,256 - 0
45.169 Promotion of the Humanities Office of Digital Humanities $47,756 - 0
81.121 Nuclear Energy Research, Development and Demonstration $47,653 - 0
16.560 National Institute of Justice Research, Evaluation, and Development Project Grants $47,495 - 0
10.645 Farm to School State Formula Grant $45,833 - 0
93.788 Opioid Str $45,507 - 0
20.724 Pipeline Safety Research Competitive Academic Agreement Program (caap) $45,097 - 0
10.229 Extension Collaborative on Immunization Teaching & Engagement $44,764 - 0
10.237 From Learning to Leading: Cultivating the Next Generation of Diverse Food and Agriculture Professionals $44,755 - 0
10.072 Wetlands Reserve Program $44,597 - 0
10.575 Farm to School Grant Program $43,792 - 0
93.504 Family-To-Family Health Information Centers $42,418 - 0
11.473 Office for Coastal Management $42,264 - 0
15.654 National Wildlife Refuge System Enhancements $41,790 - 0
17.603 Brookwood-Sago Grant $41,347 - 0
10.220 Higher Education - Multicultural Scholars Grant Program $41,111 - 0
15.670 Adaptive Science $40,412 - 0
14.218 Community Development Block Grants/entitlement Grants $40,379 - 0
20.235 Commercial Motor Vehicle Operator Safety Training Grants $39,883 - 0
93.397 Cancer Centers Support Grants $39,392 - 0
10.174 Acer Access Development Program $39,302 - 0
93.350 National Center for Advancing Translational Sciences $39,070 - 0
47.070 Computer and Information Science and Engineering $38,916 - 0
93.276 Drug-Free Communities Support Program Grants $38,906 - 0
10.652 Forestry Research $38,761 - 0
10.216 1890 Institution Capacity Building Grants $38,071 - 0
10.331 Gus Schumacher Nutrition Incentive Program $38,001 - 0
10.903 Soil Survey $37,067 - 0
14.506 General Research and Technology Activity $36,479 - 0
12.112 Payments to States in Lieu of Real Estate Taxes $36,036 - 0
20.215 Highway Training and Education $35,946 - 0
14.921 Older Adults Home Modification Grant Program $35,709 - 0
11.U01 Other Assistance $35,592 - 0
84.022 Overseas Programs - Doctoral Dissertation Research Abroad $35,568 - 0
10.RD Other Assistance $35,175 - 0
84.408 Postsecondary Education Scholarships for Veteran's Dependents $34,786 Yes 10
16.044 Forensics Training and Technical Assistance Program $34,505 - 0
93.297 Teenage Pregnancy Prevention Program $34,503 - 0
20.240 Fuel Tax Evasion-Intergovernmental Enforcement Effort $34,384 - 0
11.008 Noaa Mission-Related Education Awards $34,016 - 0
10.001 Agricultural Research Basic and Applied Research $33,767 - 0
84.425U American Rescue Plan – Elementary and Secondary School Emergency Relief (arp Esser) $33,384 - 0
11.RD Other Assistance $33,289 - 0
17.U01 Other Assistance $32,871 - 0
10.164 Wholesale Farmers and Alternative Market Development $32,758 - 0
93.224 Community Health Centers $32,730 - 0
98.001 Usaid Foreign Assistance for Programs Overseas $32,450 - 0
93.051 Alzheimer's Disease Demonstration Grants to States $32,306 - 0
10.500 Cooperative Extension Service $31,890 - 0
19.040 Public Diplomacy Programs $31,695 - 0
15.814 National Geological and Geophysical Data Preservation $31,108 - 0
19.600 Bureau of Near Eastern Affairs $31,006 - 0
12.U08 Other Assistance $30,618 - 0
10.U01 Other Assistance $29,743 - 0
10.960 Technical Agricultural Assistance $29,694 - 0
17.268 H-1b Job Training Grants $29,499 - 0
10.556 Special Milk Program for Children $29,059 - 0
19.021 Investing in People in the Middle East and North Africa $28,591 - 0
93.059 Training in General, Pediatric, and Public Health Dentistry $28,223 - 0
42.001 Books for the Blind and Physically Handicapped $28,104 - 0
93.135 Centers for Research and Demonstration for Health Promotion and Disease Prevention $26,923 - 0
10.672 Rural Development, Forestry, and Communities $26,500 - 0
85.U03 Other Assistance $26,410 - 0
11.472 Unallied Science Program $25,863 - 0
12.U12 Other Assistance $25,535 - 0
10.147 Outreach Education and Technical Assistance $25,428 - 0
10.226 Secondary Education, Two-Year Postsecondary Education, and Agriculture in the K-12 Classroom $25,190 - 0
12.U09 Other Assistance $25,026 - 0
84.051 Career and Technical Education -- National Programs $24,842 - 0
81.087 Renewable Energy Research and Development $24,779 - 0
10.973 Emergency Grain Storage Facility Assistance Program $24,752 - 0
16.922 Equitable Sharing Program $24,620 - 0
11.038 Public Wireless Supply Chain Innovation Fund Grant Program $23,877 - 0
11.620 Science, Technology, Business And/or Education Outreach $23,638 - 0
16.123 Community-Based Violence Prevention Program $23,420 - 0
93.367 Flexible Funding Model - Infrastructure Development and Maintenance for State Manufactured Food Regulatory Programs $22,981 - 0
11.021 Noaa Small Business Innovation Research (sbir) Program $22,957 - 0
93.359 Nurse Education, Practice, Quality and Retention Grants $22,886 - 0
10.924 Conservation Stewardship Program $22,779 - 0
93.413 The State Flexibility to Stabilize the Market Grant Program $22,751 - 0
93.048 Special Programs for the Aging, Title Iv, and Title Ii, Discretionary Projects $21,872 - 0
10.527 New Beginning for Tribal Students $21,707 - 0
10.U06 Other Assistance $21,641 - 0
90.705 Southeast Crescent Regional Commission - Economic and Infrastructure Development Grants $21,218 - 0
93.143 Niehs Superfund Hazardous Substances_basic Research and Education $20,836 - 0
15.815 National Land Remote Sensing Education Outreach and Research $20,828 - 0
12.620 Troops to Teachers Grant Program $20,814 - 0
93.604 Assistance for Torture Victims $20,761 - 0
19.800 Weapons Removal and Abatement $20,694 - 0
93.394 Cancer Detection and Diagnosis Research $20,548 - 0
93.136 Injury Prevention and Control Research and State and Community Based Programs $20,514 - 0
94.013 Americorps Volunteers in Service to America 94.013 $20,171 - 0
11.U02 Other Assistance $19,651 - 0
15.232 Joint Fire Science Program $19,386 - 0
93.226 Research on Healthcare Costs, Quality and Outcomes $19,062 - 0
15.663 Nfwf-Usfws Conservation Partnership $18,819 - 0
93.867 Vision Research $18,496 - 0
12.U04 Other Assistance $18,486 - 0
85.RD Other Assistance $18,401 - 0
10.217 Higher Education - Institution Challenge Grants Program $18,269 - 0
15.929 Save America's Treasures $18,129 - 0
66.046 Climate Pollution Reduction Grants $18,055 - 0
93.665 Emergency Grants to Address Mental and Substance Use Disorders During Covid-19 $17,825 - 0
97.076 Cybertipline $17,692 - 0
43.001 Science $17,487 - 0
93.315 Rare Disorders: Research, Surveillance, Health Promotion, and Education $17,442 - 0
84.283 Comprehensive Centers $16,990 - 0
10.336 Veterinary Services Grant Program $16,502 - 0
10.520 Agriculture Risk Management Education Partnerships Competitive Grants Program $16,364 - 0
11.463 Habitat Conservation $16,340 - 0
98.U01 Other Assistance $15,819 - 0
11.039 Regional Technology and Innovation Hubs $15,052 - 0
11.020 Cluster Grants $14,859 - 0
10.U07 Other Assistance $14,676 - 0
16.029 Office on Violence Against Women Special Projects $14,472 - 0
10.332 Agricultural Genome to Phenome Initiative $14,054 - 0
66.708 Pollution Prevention Grants Program $13,925 - 0
19.U02 Other Assistance $13,824 - 0
20.237 Motor Carrier Safety Assistance High Priority Activities Grants and Cooperative Agreements $13,793 - 0
45.161 Promotion of the Humanities Research $13,685 - 0
84.U03 Other Assistance $13,392 - 0
10.961 Scientific Cooperation and Research $12,940 - 0
97.U01 Other Assistance $12,570 - 0
10.326 Capacity Building for Non-Land Grant Colleges of Agriculture (nlgca) $12,296 - 0
93.361 Nursing Research $12,288 - 0
66.475 Geographic Programs – Gulf of Mexico Program $12,270 - 0
11.999 Marine Debris Program $12,015 - 0
11.460 Special Oceanic and Atmospheric Projects $11,713 - 0
19.U01 Other Assistance $11,700 - 0
97.008 Non-Profit Security Program $11,100 - 0
15.U01 Other Assistance $11,015 - 0
19.900 Aeeca/esf Pd Programs $10,830 - 0
45.313 Laura Bush 21st Century Librarian Program $10,548 - 0
93.173 Research Related to Deafness and Communication Disorders $10,541 - 0
15.946 Cultural Resources Management $10,479 - 0
97.111 Regional Catastrophic Preparedness Grant Program (rcpgp) $10,296 - 0
21.U01 Other Assistance $10,000 - 0
93.145 Aids Education and Training Centers $9,918 - 0
85.002 McC Foreign Assistance for Overseas Programs $9,699 - 0
66.920 Solid Waste Infrastructure for Recycling Infrastructure Grants $9,577 - 0
15.615 Cooperative Endangered Species Conservation Fund $9,500 - 0
64.U01 Other Assistance $9,349 - 0
19.010 Academic Exchange Programs - Hubert H. Humphrey Fellowship Program $9,277 - 0
32.011 Affordable Connectivity Outreach Grant Program $9,150 - 0
93.155 Rural Health Research Centers $8,880 - 0
11.307 Economic Adjustment Assistance $8,840 - 0
10.515 Renewable Resources Extension Act $8,819 - 0
12.598 Centers for Academic Excellence $8,750 - 0
10.177 Regional Food System Partnerships $8,695 - 0
10.171 Organic Certification Cost Share Programs $8,666 - 0
93.250 Geriatric Academic Career Awards Programs $8,626 - 0
10.318 Women and Minorities in Science, Technology, Engineering, and Mathematics Fields $8,591 - 0
23.011 Appalachian Research, Technical Assistance, and Demonstration Projects $8,569 - 0
84.411 Education Innovation and Research (formerly Investing in Innovation (i3) Fund) $8,398 - 0
66.508 Senior Environmental Employment Program $8,325 - 0
93.643 Children's Justice Grants to States $8,227 - 0
43.RD Other Assistance $7,981 - 0
47.050 Geosciences $7,539 - 0
93.U02 Other Assistance $7,062 - 0
84.021 Overseas Programs - Group Projects Abroad $6,784 - 0
93.084 Prevention of Disease, Disability, and Death by Infectious Diseases $6,527 - 0
11.419 Coastal Zone Management Administration Awards $6,507 - 0
66.716 Research, Development, Monitoring, Public Education, Outreach, Training, Demonstrations, and Studies $6,064 - 0
17.250 Job Training Partnership Act $6,021 - 0
20.600 State and Community Highway Safety $5,694 - 0
17.277 Wioa National Dislocated Worker Grants / Wia National Emergency Grants $5,445 - 0
45.162 Promotion of the Humanities Teaching and Learning Resources and Curriculum Development $5,304 - 0
39.U01 Other Assistance $5,177 - 0
39.U02 Other Assistance $5,177 - 0
39.U03 Other Assistance $5,177 - 0
39.U04 Other Assistance $5,177 - 0
11.467 Meteorologic and Hydrologic Modernization Development $5,141 - 0
10.U04 Other Assistance $5,123 - 0
84.U01 Other Assistance $4,965 - 0
12.U14 Other Assistance $4,857 - 0
10.519 Equipment Grants Program (egp) $4,739 - 0
14.536 Research, Evaluation, and Demonstrations $4,663 - 0
66.820 State Programs for Control of Coal Combustion Residuals $4,411 - 0
64.115 Veterans Information and Assistance $4,336 - 0
11.400 Geodetic Surveys and Services (geodesy and Applications of the National Geodetic Reference System) $4,034 - 0
10.U03 Other Assistance $3,311 - 0
10.334 Enhancing Agricultural Opportunities for Military Veterans Competitive Grants Program $2,940 - 0
10.309 Specialty Crop Research Initiative $2,717 - 0
84.160 Training Interpreters for Individuals Who Are Deaf and Individuals Who Are Deaf-Blind $2,700 - 0
12.U13 Other Assistance $2,570 - 0
15.423 Bureau of Ocean Energy Management (boem) Environmental Studies (es) $2,497 - 0
16.U01 Other Assistance $2,442 - 0
95.007 Research and Data Analysis $2,421 - 0
15.932 Preservation of Historic Structures on the Campuses of Historically Black Colleges and Universities (hbcus). $2,347 - 0
42.U01 Other Assistance $2,146 - 0
42.U02 Other Assistance $2,146 - 0
15.660 Candidate Species Conservation $2,107 - 0
64.U02 Other Assistance $1,990 - 0
11.405 Cooperative Institute (inter-Agency Funded Activities) $1,755 - 0
20.611 Incentive Grant Program to Prohibit Racial Profiling $1,702 - 0
10.200 Grants for Agricultural Research, Special Research Grants $1,612 - 0
17.282 Trade Adjustment Assistance Community College and Career Training (taaccct) Grants $1,557 - 0
87.002 Virginia Graeme Baker Pool and Spa Safety $1,488 - 0
10.304 Food and Agriculture Defense Initiative (fadi) $1,375 - 0
17.260 Wia Dislocated Workers $1,241 - 0
97.039 Hazard Mitigation Grant $1,093 - 0
10.328 Food Safety Outreach Program $962 - 0
42.RD Other Assistance $958 - 0
93.859 Biomedical Research and Research Training $917 - 0
10.U05 Other Assistance $854 - 0
12.U02 Other Assistance $690 - 0
20.U02 Other Assistance $612 - 0
99.RD Other Assistance $564 - 0
11.427 Fisheries Development and Utilization Research and Development Grants and Cooperative Agreements Program $385 - 0
20.507 Federal Transit Formula Grants $304 - 0
93.809 National Organizations for Chronic Disease Prevention and Health Promotion $257 - 0
20.301 Railroad Safety $226 - 0
66.040 Diesel Emissions Reduction Act (dera) State Grants $101 - 0
47.RD Other Assistance $86 - 0
10.212 Small Business Innovation Research (sbir) Program / Small Business Technology Transfer (sttr) Program $69 - 0
16.050 Missing and Unidentified Human Remains (muhr) Program $64 - 0
12.369 Marine Corps Systems Command Federal Assistance Program $50 - 0
93.664 Substance Use-Disorder Prevention That Promotes Opioid Recovery and Treatment (support) for Patients and Communities Act $44 - 0
15.684 White-Nose Syndrome National Response Implementation $27 - 0

Contacts

Name Title Type
SN41W3MGWGV3 Amanda Simpson Auditee
8043718912 George Strudgeon Auditor
No contacts on file

Notes to SEFA

Title: PURPOSE OF THE SCHEDULE OF EXPENDITURES OF FEDERAL AWARDS (SEFA) Accounting Policies: A. Basis of Presentation The information in the accompanying “Schedule of Expenditures of Federal Awards” is presented in accordance with the Uniform Guidance. The schedule presents a summary of direct award expenditures, pass-through entity award expenditures, and amounts provided to subrecipients by federal department and ALN. For purposes of uploading to the Federal Audit Clearinghouse (FAC), stimulus Funds for COVID-19 related expenditures are designated as “COVID-19” in the column labeled Additional_Award_Identification. Federal Financial Assistance – The Single Audit Act Amendments of 1996 (Public Law 104-156) and the Uniform Guidance define federal financial assistance as grants, loans, loan guarantees, property (including donated surplus property), cooperative agreements, interest subsidies, insurance, food commodities, direct appropriations, or other assistance. Nonmonetary federal assistance, including food stamps, food commodities, and surplus property, is considered federal assistance and, therefore, is reported on the “Schedule of Expenditures of Federal Awards”. Federal financial assistance does not include direct federal cash assistance to individuals. Solicited contracts in a contractor relationship between the Commonwealth of Virginia and the federal government for which the federal government procures tangible goods or services are not considered to be federal financial assistance. Direct Award Assistance – Assistance received directly from the Federal government or received as a disbursement from other State entities is classified as direct award expenditures on the “Schedule of Expenditures of Federal Awards”. Pass-Through Entity Federal Assistance – Assistance received in a pass-through relationship from another non-federal entity is classified as pass-through entity award expenditures on the “Schedule of Expenditures of Federal Awards”. Amounts Provided to Subrecipients Assistance – Assistance disbursed by the Commonwealth of Virginia to non-state subrecipients is classified as amount provided to subrecipients on the “Schedule of Expenditures of Federal Awards”. Major Programs – The Single Audit Act Amendments of 1996 and the Uniform Guidance establish the criteria to be used in defining major programs. Major programs for the Commonwealth of Virginia were determined using a risk-based approach in accordance with the Uniform Guidance. Assistance Listing Number – The Assistance Listing Number (ALN) is a government-wide compendium of individual federal programs. Each program included in the compendium is assigned a five-digit program identification number (ALN) and program name. The accompanying schedule and footnotes reflect the program names and ALN assigned by the https://sam.gov website. Programs without an ALN are labeled as Other Assistance and presented using the federal agency’s two-digit prefix followed by U and a two-digit number. If the federal program is part of the Research and Development Cluster (R&D) and the specific program is not known, the federal agency’s two-digit prefix followed by RD is presented. The ALNs used in this audit period were retrieved on July 8, 2024. Cluster of Programs – Closely related programs that share common compliance requirements are grouped into clusters of programs. A cluster of programs is considered as one federal program for determining major programs. The following are the clusters administered by the Commonwealth, as required in the 2024 Compliance Supplement: Aging Cluster, CCDF Cluster, CDBG - Disaster Recovery Grants Cluster, CDBG - Entitlement/Special Purpose Grants Cluster, Child Nutrition Cluster, Disability Insurance/SSI Cluster, Economic Development Cluster, Employment Service Cluster, Federal Transit Cluster, Fish and Wildlife Cluster, FMCSA Cluster, Food Distribution Cluster, Forest Service Schools and Roads Cluster, Head Start Cluster, Health Center Program Cluster, Highway Safety Cluster, Medicaid Cluster, Research and Development, SNAP Cluster, Special Education Cluster (IDEA), Student Financial Assistance Cluster, Transit Services Programs Cluster, TRIO Cluster, and WIOA Cluster. The total amount expended, distributed from U.S. Department of Health and Human Services, for the CCDF Cluster are presented as follows: CCDBG (Child Care Development Block Grant), $245,295,921, CCDF ARP Supplemental, $119,232,794, CCDF ARP Child Care Stabilization Fund, $18,018,556, CCDF Coronavirus Response and Relief Supplemental Appropriations (CRRSA) Act, $(85,868), CCDF Mandatory and Matching, $160,661,894; CCDF Cluster total of $ 543,123,297. Student Financial Assistance and Research and Development clusters expend funds from several Federal departments. The amounts expended for these clusters are reported under the appropriate federal department in the accompanying schedule and are also summarized as follows. The total amount expended for Student Financial Assistance was $1,590,450,126 consisting of the following federal departments: U.S. Department of Education, $1,587,714,101, and U.S. Department of Health and Human Services, $2,736,025.  The total direct award expenditures for Research and Development were $846,805,022 consisting of the following federal departments: U.S. Department of Health and Human Services, $416,413,428, National Science Foundation, $150,917,210, U.S. Department of Defense, $126,978,482, U.S. Department of Energy, $33,491,513, U.S. Department of Agriculture, $27,496,198, U.S. Department of Transportation, $22,156,914, National Aeronautics and Space Administration, $14,654,747, U.S. Department of Commerce, $14,137,375, U.S. Department of Education, $13,492,724, U.S. Department of the Interior, $7,922,561, Department of Homeland Security, $4,406,547, U.S. Department of Justice, $3,518,527, U.S. Department of State, $3,079,814, Environmental Protection Agency, $2,285,991, National Endowment for the Humanities, $1,495,005, National Archives and Records Administration, $1,046,133, U.S. Department of Veteran's Affairs, $1,039,572, Nuclear Regulatory Commission, $1,000,775, Corporation for National and Community Service, $386,136, Federal Communications Commission, $252,856, U.S. Department of Housing and Urban Development, $243,444, Small Business Administration, $126,419, Other Federal Assistance, $92,297, Appalachian Regional Commission, $83,232, Barry Goldwater Scholarship and Excellence in Education Fund, $70,316, U.S Agency for International Development, $16,806. (Continue on to see Note B) De Minimis Rate Used: Both Rate Explanation: For the year ended June 30, 2024, only the Virginia Museum of Fine Arts, Department of Forensic Science, Department of Historic Resources, Department of Wildlife Resources, Richard Bland College, Southern Virginia Higher Education Center, Virginia Biotechnology Research Partnership Authority, Virginia Economic Development Partnership, and Virginia Museum of Natural History have elected to use the de minimis indirect cost rate per Section 200.414 of the Uniform Guidance. The Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (Uniform Guidance) issued by the Office of Management and Budget (OMB) requires a schedule of expenditures of federal awards showing total federal expenditures for each federal financial assistance program as identified by the Assistance Listing Number (ALN). As instructed by the 2024 Compliance Supplement, issued by the U.S. Office of Management and Budget, the fiscal year 2024 SEFA reports expenditures and lost revenues for ALN 93.498 - Provider Relief Fund and American Rescue Plan (ARP) Rural Distribution for fiscal year 2023; there were no PRF expenditures and lost revenues for fiscal year 2024 to be reported in the subsequent year, and the PRF expenditure for fiscal year 2023 have been included and reported in 2024 SEFA. The amounts distributed to Non-Entitlement Units of Local Government (NEUs), ALN 21.027, Coronavirus State and Local Fiscal Recovery Funds, have been excluded. The accompanying schedule includes all expenditures of federal awards of the Commonwealth of Virginia’s departments, institutions, authorities, and component units except for the entities that were not audited by the Auditor of Public Accounts. Other auditors issued reports for the following organizations within the Commonwealth: A.L. Philpott Manufacturing Extension Partnership, Commission on the Virginia Alcohol Safety Action Program, Division of Capitol Police, Fort Monroe Authority, Hampton Roads Sanitation District Commission, Hampton Roads Transportation Accountability Commission, Institute for Advanced Learning and Research, Library of Virginia Foundation, Science Museum of Virginia Foundation, Virginia Commonwealth University Health System Authority, Virginia Housing Development Authority, Virginia Outdoors Foundation, Virginia Port Authority Including Virginia International Terminals, and Virginia Resources Authority. (Contiunue on to see Note A)
Title: B. Basis of Accounting Accounting Policies: A. Basis of Presentation The information in the accompanying “Schedule of Expenditures of Federal Awards” is presented in accordance with the Uniform Guidance. The schedule presents a summary of direct award expenditures, pass-through entity award expenditures, and amounts provided to subrecipients by federal department and ALN. For purposes of uploading to the Federal Audit Clearinghouse (FAC), stimulus Funds for COVID-19 related expenditures are designated as “COVID-19” in the column labeled Additional_Award_Identification. Federal Financial Assistance – The Single Audit Act Amendments of 1996 (Public Law 104-156) and the Uniform Guidance define federal financial assistance as grants, loans, loan guarantees, property (including donated surplus property), cooperative agreements, interest subsidies, insurance, food commodities, direct appropriations, or other assistance. Nonmonetary federal assistance, including food stamps, food commodities, and surplus property, is considered federal assistance and, therefore, is reported on the “Schedule of Expenditures of Federal Awards”. Federal financial assistance does not include direct federal cash assistance to individuals. Solicited contracts in a contractor relationship between the Commonwealth of Virginia and the federal government for which the federal government procures tangible goods or services are not considered to be federal financial assistance. Direct Award Assistance – Assistance received directly from the Federal government or received as a disbursement from other State entities is classified as direct award expenditures on the “Schedule of Expenditures of Federal Awards”. Pass-Through Entity Federal Assistance – Assistance received in a pass-through relationship from another non-federal entity is classified as pass-through entity award expenditures on the “Schedule of Expenditures of Federal Awards”. Amounts Provided to Subrecipients Assistance – Assistance disbursed by the Commonwealth of Virginia to non-state subrecipients is classified as amount provided to subrecipients on the “Schedule of Expenditures of Federal Awards”. Major Programs – The Single Audit Act Amendments of 1996 and the Uniform Guidance establish the criteria to be used in defining major programs. Major programs for the Commonwealth of Virginia were determined using a risk-based approach in accordance with the Uniform Guidance. Assistance Listing Number – The Assistance Listing Number (ALN) is a government-wide compendium of individual federal programs. Each program included in the compendium is assigned a five-digit program identification number (ALN) and program name. The accompanying schedule and footnotes reflect the program names and ALN assigned by the https://sam.gov website. Programs without an ALN are labeled as Other Assistance and presented using the federal agency’s two-digit prefix followed by U and a two-digit number. If the federal program is part of the Research and Development Cluster (R&D) and the specific program is not known, the federal agency’s two-digit prefix followed by RD is presented. The ALNs used in this audit period were retrieved on July 8, 2024. Cluster of Programs – Closely related programs that share common compliance requirements are grouped into clusters of programs. A cluster of programs is considered as one federal program for determining major programs. The following are the clusters administered by the Commonwealth, as required in the 2024 Compliance Supplement: Aging Cluster, CCDF Cluster, CDBG - Disaster Recovery Grants Cluster, CDBG - Entitlement/Special Purpose Grants Cluster, Child Nutrition Cluster, Disability Insurance/SSI Cluster, Economic Development Cluster, Employment Service Cluster, Federal Transit Cluster, Fish and Wildlife Cluster, FMCSA Cluster, Food Distribution Cluster, Forest Service Schools and Roads Cluster, Head Start Cluster, Health Center Program Cluster, Highway Safety Cluster, Medicaid Cluster, Research and Development, SNAP Cluster, Special Education Cluster (IDEA), Student Financial Assistance Cluster, Transit Services Programs Cluster, TRIO Cluster, and WIOA Cluster. The total amount expended, distributed from U.S. Department of Health and Human Services, for the CCDF Cluster are presented as follows: CCDBG (Child Care Development Block Grant), $245,295,921, CCDF ARP Supplemental, $119,232,794, CCDF ARP Child Care Stabilization Fund, $18,018,556, CCDF Coronavirus Response and Relief Supplemental Appropriations (CRRSA) Act, $(85,868), CCDF Mandatory and Matching, $160,661,894; CCDF Cluster total of $ 543,123,297. Student Financial Assistance and Research and Development clusters expend funds from several Federal departments. The amounts expended for these clusters are reported under the appropriate federal department in the accompanying schedule and are also summarized as follows. The total amount expended for Student Financial Assistance was $1,590,450,126 consisting of the following federal departments: U.S. Department of Education, $1,587,714,101, and U.S. Department of Health and Human Services, $2,736,025.  The total direct award expenditures for Research and Development were $846,805,022 consisting of the following federal departments: U.S. Department of Health and Human Services, $416,413,428, National Science Foundation, $150,917,210, U.S. Department of Defense, $126,978,482, U.S. Department of Energy, $33,491,513, U.S. Department of Agriculture, $27,496,198, U.S. Department of Transportation, $22,156,914, National Aeronautics and Space Administration, $14,654,747, U.S. Department of Commerce, $14,137,375, U.S. Department of Education, $13,492,724, U.S. Department of the Interior, $7,922,561, Department of Homeland Security, $4,406,547, U.S. Department of Justice, $3,518,527, U.S. Department of State, $3,079,814, Environmental Protection Agency, $2,285,991, National Endowment for the Humanities, $1,495,005, National Archives and Records Administration, $1,046,133, U.S. Department of Veteran's Affairs, $1,039,572, Nuclear Regulatory Commission, $1,000,775, Corporation for National and Community Service, $386,136, Federal Communications Commission, $252,856, U.S. Department of Housing and Urban Development, $243,444, Small Business Administration, $126,419, Other Federal Assistance, $92,297, Appalachian Regional Commission, $83,232, Barry Goldwater Scholarship and Excellence in Education Fund, $70,316, U.S Agency for International Development, $16,806. (Continue on to see Note B) De Minimis Rate Used: Both Rate Explanation: For the year ended June 30, 2024, only the Virginia Museum of Fine Arts, Department of Forensic Science, Department of Historic Resources, Department of Wildlife Resources, Richard Bland College, Southern Virginia Higher Education Center, Virginia Biotechnology Research Partnership Authority, Virginia Economic Development Partnership, and Virginia Museum of Natural History have elected to use the de minimis indirect cost rate per Section 200.414 of the Uniform Guidance. Federal program expenditures included in the accompanying schedule are presented using the cash basis of accounting. Under the cash basis of accounting, expenditures are recognized when cash is disbursed rather than when the obligation is incurred. Federal non-cash assistance and loan/loan guarantee program activities are presented as described in Notes 1C and 1D. When a federal program is not part of a cluster, the Commonwealth has separated COVID-19 from Non-COVID-19 expenditures on the SEFA using “Stimulus” and added “COVID-19” within the Additional Award Identification column. However, if the COVID-19 expenditures are part of a cluster, the related expenditures are not separately identified but are included within the cluster’s expenditures on the SEFA, with the exception of the Research and Development Cluster. In accordance with the 2024 Compliance Supplement, the Commonwealth has determined that all federal programs have been established and funding has been added to existing federal programs from the following Acts, and are considered COVID-19 funding: Coronavirus Preparedness and Response Supplemental Appropriations Act, Families First Coronavirus Response Act, Coronavirus Aid, Relief, and Economic Security Act (CARES Act), Coronavirus Response and Relief Supplemental Appropriations Act (CRRSAA), American Rescue Plan Act (ARP).
Title: C. Non-Cash Assistance Accounting Policies: A. Basis of Presentation The information in the accompanying “Schedule of Expenditures of Federal Awards” is presented in accordance with the Uniform Guidance. The schedule presents a summary of direct award expenditures, pass-through entity award expenditures, and amounts provided to subrecipients by federal department and ALN. For purposes of uploading to the Federal Audit Clearinghouse (FAC), stimulus Funds for COVID-19 related expenditures are designated as “COVID-19” in the column labeled Additional_Award_Identification. Federal Financial Assistance – The Single Audit Act Amendments of 1996 (Public Law 104-156) and the Uniform Guidance define federal financial assistance as grants, loans, loan guarantees, property (including donated surplus property), cooperative agreements, interest subsidies, insurance, food commodities, direct appropriations, or other assistance. Nonmonetary federal assistance, including food stamps, food commodities, and surplus property, is considered federal assistance and, therefore, is reported on the “Schedule of Expenditures of Federal Awards”. Federal financial assistance does not include direct federal cash assistance to individuals. Solicited contracts in a contractor relationship between the Commonwealth of Virginia and the federal government for which the federal government procures tangible goods or services are not considered to be federal financial assistance. Direct Award Assistance – Assistance received directly from the Federal government or received as a disbursement from other State entities is classified as direct award expenditures on the “Schedule of Expenditures of Federal Awards”. Pass-Through Entity Federal Assistance – Assistance received in a pass-through relationship from another non-federal entity is classified as pass-through entity award expenditures on the “Schedule of Expenditures of Federal Awards”. Amounts Provided to Subrecipients Assistance – Assistance disbursed by the Commonwealth of Virginia to non-state subrecipients is classified as amount provided to subrecipients on the “Schedule of Expenditures of Federal Awards”. Major Programs – The Single Audit Act Amendments of 1996 and the Uniform Guidance establish the criteria to be used in defining major programs. Major programs for the Commonwealth of Virginia were determined using a risk-based approach in accordance with the Uniform Guidance. Assistance Listing Number – The Assistance Listing Number (ALN) is a government-wide compendium of individual federal programs. Each program included in the compendium is assigned a five-digit program identification number (ALN) and program name. The accompanying schedule and footnotes reflect the program names and ALN assigned by the https://sam.gov website. Programs without an ALN are labeled as Other Assistance and presented using the federal agency’s two-digit prefix followed by U and a two-digit number. If the federal program is part of the Research and Development Cluster (R&D) and the specific program is not known, the federal agency’s two-digit prefix followed by RD is presented. The ALNs used in this audit period were retrieved on July 8, 2024. Cluster of Programs – Closely related programs that share common compliance requirements are grouped into clusters of programs. A cluster of programs is considered as one federal program for determining major programs. The following are the clusters administered by the Commonwealth, as required in the 2024 Compliance Supplement: Aging Cluster, CCDF Cluster, CDBG - Disaster Recovery Grants Cluster, CDBG - Entitlement/Special Purpose Grants Cluster, Child Nutrition Cluster, Disability Insurance/SSI Cluster, Economic Development Cluster, Employment Service Cluster, Federal Transit Cluster, Fish and Wildlife Cluster, FMCSA Cluster, Food Distribution Cluster, Forest Service Schools and Roads Cluster, Head Start Cluster, Health Center Program Cluster, Highway Safety Cluster, Medicaid Cluster, Research and Development, SNAP Cluster, Special Education Cluster (IDEA), Student Financial Assistance Cluster, Transit Services Programs Cluster, TRIO Cluster, and WIOA Cluster. The total amount expended, distributed from U.S. Department of Health and Human Services, for the CCDF Cluster are presented as follows: CCDBG (Child Care Development Block Grant), $245,295,921, CCDF ARP Supplemental, $119,232,794, CCDF ARP Child Care Stabilization Fund, $18,018,556, CCDF Coronavirus Response and Relief Supplemental Appropriations (CRRSA) Act, $(85,868), CCDF Mandatory and Matching, $160,661,894; CCDF Cluster total of $ 543,123,297. Student Financial Assistance and Research and Development clusters expend funds from several Federal departments. The amounts expended for these clusters are reported under the appropriate federal department in the accompanying schedule and are also summarized as follows. The total amount expended for Student Financial Assistance was $1,590,450,126 consisting of the following federal departments: U.S. Department of Education, $1,587,714,101, and U.S. Department of Health and Human Services, $2,736,025.  The total direct award expenditures for Research and Development were $846,805,022 consisting of the following federal departments: U.S. Department of Health and Human Services, $416,413,428, National Science Foundation, $150,917,210, U.S. Department of Defense, $126,978,482, U.S. Department of Energy, $33,491,513, U.S. Department of Agriculture, $27,496,198, U.S. Department of Transportation, $22,156,914, National Aeronautics and Space Administration, $14,654,747, U.S. Department of Commerce, $14,137,375, U.S. Department of Education, $13,492,724, U.S. Department of the Interior, $7,922,561, Department of Homeland Security, $4,406,547, U.S. Department of Justice, $3,518,527, U.S. Department of State, $3,079,814, Environmental Protection Agency, $2,285,991, National Endowment for the Humanities, $1,495,005, National Archives and Records Administration, $1,046,133, U.S. Department of Veteran's Affairs, $1,039,572, Nuclear Regulatory Commission, $1,000,775, Corporation for National and Community Service, $386,136, Federal Communications Commission, $252,856, U.S. Department of Housing and Urban Development, $243,444, Small Business Administration, $126,419, Other Federal Assistance, $92,297, Appalachian Regional Commission, $83,232, Barry Goldwater Scholarship and Excellence in Education Fund, $70,316, U.S Agency for International Development, $16,806. (Continue on to see Note B) De Minimis Rate Used: Both Rate Explanation: For the year ended June 30, 2024, only the Virginia Museum of Fine Arts, Department of Forensic Science, Department of Historic Resources, Department of Wildlife Resources, Richard Bland College, Southern Virginia Higher Education Center, Virginia Biotechnology Research Partnership Authority, Virginia Economic Development Partnership, and Virginia Museum of Natural History have elected to use the de minimis indirect cost rate per Section 200.414 of the Uniform Guidance. The Commonwealth of Virginia participated in several federal programs in which non-cash benefits are provided through the state to eligible program participants. These include: Food Distribution Programs (ALNs 10.555, 10.558, 10.559, 10.565, 10.568, 10.569) The value of food commodities was calculated using the U.S. Department of Agriculture’s Food and Nutrition Service commodity price lists. The accompanying schedule includes non-COVID-19 Related commodity distributions of: ALN 10.555, $40,305,039, ALN 10.558, $1,458, ALN 10.559, $106,666, ALN 10.565, $4,414,521, ALN 10.568, $16,633,337, and ALN 10.569, $23,242,496. The accompanying schedule does not include Commonwealth-stored undistributed food commodities of: ALN 10.555, $21,475, and ALN 10.569, $8,550. Donation of Federal Surplus Personal Property (ALN 39.003) – Donated federal surplus property is valued at 23.3 percent of the original acquisition cost as assigned by the federal government. The amount included in the accompanying schedule reflects distributions to other governmental entities during the year ended June 30, 2024. Administrative expenditures of $130,995 are not included in the accompanying schedule. The value of surplus property on hand at June 30, 2024, totaled $166,035. Childhood Immunization Grants (ALN 93.268) – The U.S. Department of Health and Human Services purchases and distributes immunizations through McKesson, the federal national distribution vendor, directly to our local health departments, private physicians, and other providers. The amount presented in the accompanying schedule reflects the non-COVID-19 cost of immunizations to the federal government of $111,010,513. The remaining amount of $38,583,343 consists of $$17,562,493 non-COVID-19 and $21,020,850 COVID-19 related expenditures, and are the administrative costs incurred by the Department of Health. The value of inventory on hand at June 30, 2024, was $4,317,397 held by local health departments and $25,688,043 held by other providers.
Title: D. Loan/Loan Guarantee Programs Accounting Policies: A. Basis of Presentation The information in the accompanying “Schedule of Expenditures of Federal Awards” is presented in accordance with the Uniform Guidance. The schedule presents a summary of direct award expenditures, pass-through entity award expenditures, and amounts provided to subrecipients by federal department and ALN. For purposes of uploading to the Federal Audit Clearinghouse (FAC), stimulus Funds for COVID-19 related expenditures are designated as “COVID-19” in the column labeled Additional_Award_Identification. Federal Financial Assistance – The Single Audit Act Amendments of 1996 (Public Law 104-156) and the Uniform Guidance define federal financial assistance as grants, loans, loan guarantees, property (including donated surplus property), cooperative agreements, interest subsidies, insurance, food commodities, direct appropriations, or other assistance. Nonmonetary federal assistance, including food stamps, food commodities, and surplus property, is considered federal assistance and, therefore, is reported on the “Schedule of Expenditures of Federal Awards”. Federal financial assistance does not include direct federal cash assistance to individuals. Solicited contracts in a contractor relationship between the Commonwealth of Virginia and the federal government for which the federal government procures tangible goods or services are not considered to be federal financial assistance. Direct Award Assistance – Assistance received directly from the Federal government or received as a disbursement from other State entities is classified as direct award expenditures on the “Schedule of Expenditures of Federal Awards”. Pass-Through Entity Federal Assistance – Assistance received in a pass-through relationship from another non-federal entity is classified as pass-through entity award expenditures on the “Schedule of Expenditures of Federal Awards”. Amounts Provided to Subrecipients Assistance – Assistance disbursed by the Commonwealth of Virginia to non-state subrecipients is classified as amount provided to subrecipients on the “Schedule of Expenditures of Federal Awards”. Major Programs – The Single Audit Act Amendments of 1996 and the Uniform Guidance establish the criteria to be used in defining major programs. Major programs for the Commonwealth of Virginia were determined using a risk-based approach in accordance with the Uniform Guidance. Assistance Listing Number – The Assistance Listing Number (ALN) is a government-wide compendium of individual federal programs. Each program included in the compendium is assigned a five-digit program identification number (ALN) and program name. The accompanying schedule and footnotes reflect the program names and ALN assigned by the https://sam.gov website. Programs without an ALN are labeled as Other Assistance and presented using the federal agency’s two-digit prefix followed by U and a two-digit number. If the federal program is part of the Research and Development Cluster (R&D) and the specific program is not known, the federal agency’s two-digit prefix followed by RD is presented. The ALNs used in this audit period were retrieved on July 8, 2024. Cluster of Programs – Closely related programs that share common compliance requirements are grouped into clusters of programs. A cluster of programs is considered as one federal program for determining major programs. The following are the clusters administered by the Commonwealth, as required in the 2024 Compliance Supplement: Aging Cluster, CCDF Cluster, CDBG - Disaster Recovery Grants Cluster, CDBG - Entitlement/Special Purpose Grants Cluster, Child Nutrition Cluster, Disability Insurance/SSI Cluster, Economic Development Cluster, Employment Service Cluster, Federal Transit Cluster, Fish and Wildlife Cluster, FMCSA Cluster, Food Distribution Cluster, Forest Service Schools and Roads Cluster, Head Start Cluster, Health Center Program Cluster, Highway Safety Cluster, Medicaid Cluster, Research and Development, SNAP Cluster, Special Education Cluster (IDEA), Student Financial Assistance Cluster, Transit Services Programs Cluster, TRIO Cluster, and WIOA Cluster. The total amount expended, distributed from U.S. Department of Health and Human Services, for the CCDF Cluster are presented as follows: CCDBG (Child Care Development Block Grant), $245,295,921, CCDF ARP Supplemental, $119,232,794, CCDF ARP Child Care Stabilization Fund, $18,018,556, CCDF Coronavirus Response and Relief Supplemental Appropriations (CRRSA) Act, $(85,868), CCDF Mandatory and Matching, $160,661,894; CCDF Cluster total of $ 543,123,297. Student Financial Assistance and Research and Development clusters expend funds from several Federal departments. The amounts expended for these clusters are reported under the appropriate federal department in the accompanying schedule and are also summarized as follows. The total amount expended for Student Financial Assistance was $1,590,450,126 consisting of the following federal departments: U.S. Department of Education, $1,587,714,101, and U.S. Department of Health and Human Services, $2,736,025.  The total direct award expenditures for Research and Development were $846,805,022 consisting of the following federal departments: U.S. Department of Health and Human Services, $416,413,428, National Science Foundation, $150,917,210, U.S. Department of Defense, $126,978,482, U.S. Department of Energy, $33,491,513, U.S. Department of Agriculture, $27,496,198, U.S. Department of Transportation, $22,156,914, National Aeronautics and Space Administration, $14,654,747, U.S. Department of Commerce, $14,137,375, U.S. Department of Education, $13,492,724, U.S. Department of the Interior, $7,922,561, Department of Homeland Security, $4,406,547, U.S. Department of Justice, $3,518,527, U.S. Department of State, $3,079,814, Environmental Protection Agency, $2,285,991, National Endowment for the Humanities, $1,495,005, National Archives and Records Administration, $1,046,133, U.S. Department of Veteran's Affairs, $1,039,572, Nuclear Regulatory Commission, $1,000,775, Corporation for National and Community Service, $386,136, Federal Communications Commission, $252,856, U.S. Department of Housing and Urban Development, $243,444, Small Business Administration, $126,419, Other Federal Assistance, $92,297, Appalachian Regional Commission, $83,232, Barry Goldwater Scholarship and Excellence in Education Fund, $70,316, U.S Agency for International Development, $16,806. (Continue on to see Note B) De Minimis Rate Used: Both Rate Explanation: For the year ended June 30, 2024, only the Virginia Museum of Fine Arts, Department of Forensic Science, Department of Historic Resources, Department of Wildlife Resources, Richard Bland College, Southern Virginia Higher Education Center, Virginia Biotechnology Research Partnership Authority, Virginia Economic Development Partnership, and Virginia Museum of Natural History have elected to use the de minimis indirect cost rate per Section 200.414 of the Uniform Guidance. Federal Perkins Loans - Federal Capital Contributions (ALN 84.038) – The amount in the accompanying schedule includes administrative costs during the fiscal year as well as the outstanding balance of loans receivable at June 30, 2024. Balances outstanding at the end of the audit period were $6,260,077. Health Professions Student Loans, Including Primary Care Loans/Loans for Disadvantaged Students (ALN 93.342) – The amount in the accompanying schedule includes administrative costs during the fiscal year as well as the outstanding balance of loans receivable at June 30, 2024. Balances outstanding at the end of the audit period were $11,985,806. Nurse Faculty Loan Program (ALN 93.264) – The amount in the accompanying schedule includes administrative costs during the fiscal year as well as the outstanding balance of loans receivable at June 30, 2024. Balances outstanding at the end of the audit period were $633,566. Nursing Student Loans (ALN 93.364) – The amount in the accompanying schedule includes administrative costs during the fiscal year as well as the outstanding balance of loans receivable at June 30, 2024. Balances outstanding at the end of the audit period were $2,171,029. Assistive Technology Alternative Financing Program (ALN 93.469) – The amount in the accompanying schedule includes administrative costs during the fiscal year as well as the outstanding balance of loans receivable at June 30, 2024. Balances outstanding at the end of the audit period were $3,817,756. Child Care and Development Block Grant (ALN 93.575) – The amount in the accompanying schedule includes administrative costs during the fiscal year as well as the outstanding balance of loans receivable at June 30, 2024. Balances outstanding at the end of the audit period were $4,106,672. Transportation Infrastructure Finance and Innovation Act (TIFIA) Program (ALN 20.223) – The amount in the accompanying schedule includes administrative costs during the fiscal year as well as the outstanding balance of loans receivable at June 30, 2024. Balances outstanding at the end of the audit period were $14,958,923.
Title: E. Emergency Unemployment Benefits Accounting Policies: A. Basis of Presentation The information in the accompanying “Schedule of Expenditures of Federal Awards” is presented in accordance with the Uniform Guidance. The schedule presents a summary of direct award expenditures, pass-through entity award expenditures, and amounts provided to subrecipients by federal department and ALN. For purposes of uploading to the Federal Audit Clearinghouse (FAC), stimulus Funds for COVID-19 related expenditures are designated as “COVID-19” in the column labeled Additional_Award_Identification. Federal Financial Assistance – The Single Audit Act Amendments of 1996 (Public Law 104-156) and the Uniform Guidance define federal financial assistance as grants, loans, loan guarantees, property (including donated surplus property), cooperative agreements, interest subsidies, insurance, food commodities, direct appropriations, or other assistance. Nonmonetary federal assistance, including food stamps, food commodities, and surplus property, is considered federal assistance and, therefore, is reported on the “Schedule of Expenditures of Federal Awards”. Federal financial assistance does not include direct federal cash assistance to individuals. Solicited contracts in a contractor relationship between the Commonwealth of Virginia and the federal government for which the federal government procures tangible goods or services are not considered to be federal financial assistance. Direct Award Assistance – Assistance received directly from the Federal government or received as a disbursement from other State entities is classified as direct award expenditures on the “Schedule of Expenditures of Federal Awards”. Pass-Through Entity Federal Assistance – Assistance received in a pass-through relationship from another non-federal entity is classified as pass-through entity award expenditures on the “Schedule of Expenditures of Federal Awards”. Amounts Provided to Subrecipients Assistance – Assistance disbursed by the Commonwealth of Virginia to non-state subrecipients is classified as amount provided to subrecipients on the “Schedule of Expenditures of Federal Awards”. Major Programs – The Single Audit Act Amendments of 1996 and the Uniform Guidance establish the criteria to be used in defining major programs. Major programs for the Commonwealth of Virginia were determined using a risk-based approach in accordance with the Uniform Guidance. Assistance Listing Number – The Assistance Listing Number (ALN) is a government-wide compendium of individual federal programs. Each program included in the compendium is assigned a five-digit program identification number (ALN) and program name. The accompanying schedule and footnotes reflect the program names and ALN assigned by the https://sam.gov website. Programs without an ALN are labeled as Other Assistance and presented using the federal agency’s two-digit prefix followed by U and a two-digit number. If the federal program is part of the Research and Development Cluster (R&D) and the specific program is not known, the federal agency’s two-digit prefix followed by RD is presented. The ALNs used in this audit period were retrieved on July 8, 2024. Cluster of Programs – Closely related programs that share common compliance requirements are grouped into clusters of programs. A cluster of programs is considered as one federal program for determining major programs. The following are the clusters administered by the Commonwealth, as required in the 2024 Compliance Supplement: Aging Cluster, CCDF Cluster, CDBG - Disaster Recovery Grants Cluster, CDBG - Entitlement/Special Purpose Grants Cluster, Child Nutrition Cluster, Disability Insurance/SSI Cluster, Economic Development Cluster, Employment Service Cluster, Federal Transit Cluster, Fish and Wildlife Cluster, FMCSA Cluster, Food Distribution Cluster, Forest Service Schools and Roads Cluster, Head Start Cluster, Health Center Program Cluster, Highway Safety Cluster, Medicaid Cluster, Research and Development, SNAP Cluster, Special Education Cluster (IDEA), Student Financial Assistance Cluster, Transit Services Programs Cluster, TRIO Cluster, and WIOA Cluster. The total amount expended, distributed from U.S. Department of Health and Human Services, for the CCDF Cluster are presented as follows: CCDBG (Child Care Development Block Grant), $245,295,921, CCDF ARP Supplemental, $119,232,794, CCDF ARP Child Care Stabilization Fund, $18,018,556, CCDF Coronavirus Response and Relief Supplemental Appropriations (CRRSA) Act, $(85,868), CCDF Mandatory and Matching, $160,661,894; CCDF Cluster total of $ 543,123,297. Student Financial Assistance and Research and Development clusters expend funds from several Federal departments. The amounts expended for these clusters are reported under the appropriate federal department in the accompanying schedule and are also summarized as follows. The total amount expended for Student Financial Assistance was $1,590,450,126 consisting of the following federal departments: U.S. Department of Education, $1,587,714,101, and U.S. Department of Health and Human Services, $2,736,025.  The total direct award expenditures for Research and Development were $846,805,022 consisting of the following federal departments: U.S. Department of Health and Human Services, $416,413,428, National Science Foundation, $150,917,210, U.S. Department of Defense, $126,978,482, U.S. Department of Energy, $33,491,513, U.S. Department of Agriculture, $27,496,198, U.S. Department of Transportation, $22,156,914, National Aeronautics and Space Administration, $14,654,747, U.S. Department of Commerce, $14,137,375, U.S. Department of Education, $13,492,724, U.S. Department of the Interior, $7,922,561, Department of Homeland Security, $4,406,547, U.S. Department of Justice, $3,518,527, U.S. Department of State, $3,079,814, Environmental Protection Agency, $2,285,991, National Endowment for the Humanities, $1,495,005, National Archives and Records Administration, $1,046,133, U.S. Department of Veteran's Affairs, $1,039,572, Nuclear Regulatory Commission, $1,000,775, Corporation for National and Community Service, $386,136, Federal Communications Commission, $252,856, U.S. Department of Housing and Urban Development, $243,444, Small Business Administration, $126,419, Other Federal Assistance, $92,297, Appalachian Regional Commission, $83,232, Barry Goldwater Scholarship and Excellence in Education Fund, $70,316, U.S Agency for International Development, $16,806. (Continue on to see Note B) De Minimis Rate Used: Both Rate Explanation: For the year ended June 30, 2024, only the Virginia Museum of Fine Arts, Department of Forensic Science, Department of Historic Resources, Department of Wildlife Resources, Richard Bland College, Southern Virginia Higher Education Center, Virginia Biotechnology Research Partnership Authority, Virginia Economic Development Partnership, and Virginia Museum of Natural History have elected to use the de minimis indirect cost rate per Section 200.414 of the Uniform Guidance. The amount included in the accompanying schedule for Unemployment Insurance (ALN 17.225) includes $43,260,182 non-COVID-19 related, and $12,583,577 COVID-19 related administrative costs; $ 4,105,815 non-COVID-19 related federal unemployment benefits paid to federal employees; $259,233,104 non-COVID-19 related benefits paid to non-federal employees, and $5,231,139 in COVID-19 related benefits paid to non-federal employees; and $1,033 in federal benefits paid to Trade Act impacted workers.
Title: F. Disaster Grants – Public Assistance Accounting Policies: A. Basis of Presentation The information in the accompanying “Schedule of Expenditures of Federal Awards” is presented in accordance with the Uniform Guidance. The schedule presents a summary of direct award expenditures, pass-through entity award expenditures, and amounts provided to subrecipients by federal department and ALN. For purposes of uploading to the Federal Audit Clearinghouse (FAC), stimulus Funds for COVID-19 related expenditures are designated as “COVID-19” in the column labeled Additional_Award_Identification. Federal Financial Assistance – The Single Audit Act Amendments of 1996 (Public Law 104-156) and the Uniform Guidance define federal financial assistance as grants, loans, loan guarantees, property (including donated surplus property), cooperative agreements, interest subsidies, insurance, food commodities, direct appropriations, or other assistance. Nonmonetary federal assistance, including food stamps, food commodities, and surplus property, is considered federal assistance and, therefore, is reported on the “Schedule of Expenditures of Federal Awards”. Federal financial assistance does not include direct federal cash assistance to individuals. Solicited contracts in a contractor relationship between the Commonwealth of Virginia and the federal government for which the federal government procures tangible goods or services are not considered to be federal financial assistance. Direct Award Assistance – Assistance received directly from the Federal government or received as a disbursement from other State entities is classified as direct award expenditures on the “Schedule of Expenditures of Federal Awards”. Pass-Through Entity Federal Assistance – Assistance received in a pass-through relationship from another non-federal entity is classified as pass-through entity award expenditures on the “Schedule of Expenditures of Federal Awards”. Amounts Provided to Subrecipients Assistance – Assistance disbursed by the Commonwealth of Virginia to non-state subrecipients is classified as amount provided to subrecipients on the “Schedule of Expenditures of Federal Awards”. Major Programs – The Single Audit Act Amendments of 1996 and the Uniform Guidance establish the criteria to be used in defining major programs. Major programs for the Commonwealth of Virginia were determined using a risk-based approach in accordance with the Uniform Guidance. Assistance Listing Number – The Assistance Listing Number (ALN) is a government-wide compendium of individual federal programs. Each program included in the compendium is assigned a five-digit program identification number (ALN) and program name. The accompanying schedule and footnotes reflect the program names and ALN assigned by the https://sam.gov website. Programs without an ALN are labeled as Other Assistance and presented using the federal agency’s two-digit prefix followed by U and a two-digit number. If the federal program is part of the Research and Development Cluster (R&D) and the specific program is not known, the federal agency’s two-digit prefix followed by RD is presented. The ALNs used in this audit period were retrieved on July 8, 2024. Cluster of Programs – Closely related programs that share common compliance requirements are grouped into clusters of programs. A cluster of programs is considered as one federal program for determining major programs. The following are the clusters administered by the Commonwealth, as required in the 2024 Compliance Supplement: Aging Cluster, CCDF Cluster, CDBG - Disaster Recovery Grants Cluster, CDBG - Entitlement/Special Purpose Grants Cluster, Child Nutrition Cluster, Disability Insurance/SSI Cluster, Economic Development Cluster, Employment Service Cluster, Federal Transit Cluster, Fish and Wildlife Cluster, FMCSA Cluster, Food Distribution Cluster, Forest Service Schools and Roads Cluster, Head Start Cluster, Health Center Program Cluster, Highway Safety Cluster, Medicaid Cluster, Research and Development, SNAP Cluster, Special Education Cluster (IDEA), Student Financial Assistance Cluster, Transit Services Programs Cluster, TRIO Cluster, and WIOA Cluster. The total amount expended, distributed from U.S. Department of Health and Human Services, for the CCDF Cluster are presented as follows: CCDBG (Child Care Development Block Grant), $245,295,921, CCDF ARP Supplemental, $119,232,794, CCDF ARP Child Care Stabilization Fund, $18,018,556, CCDF Coronavirus Response and Relief Supplemental Appropriations (CRRSA) Act, $(85,868), CCDF Mandatory and Matching, $160,661,894; CCDF Cluster total of $ 543,123,297. Student Financial Assistance and Research and Development clusters expend funds from several Federal departments. The amounts expended for these clusters are reported under the appropriate federal department in the accompanying schedule and are also summarized as follows. The total amount expended for Student Financial Assistance was $1,590,450,126 consisting of the following federal departments: U.S. Department of Education, $1,587,714,101, and U.S. Department of Health and Human Services, $2,736,025.  The total direct award expenditures for Research and Development were $846,805,022 consisting of the following federal departments: U.S. Department of Health and Human Services, $416,413,428, National Science Foundation, $150,917,210, U.S. Department of Defense, $126,978,482, U.S. Department of Energy, $33,491,513, U.S. Department of Agriculture, $27,496,198, U.S. Department of Transportation, $22,156,914, National Aeronautics and Space Administration, $14,654,747, U.S. Department of Commerce, $14,137,375, U.S. Department of Education, $13,492,724, U.S. Department of the Interior, $7,922,561, Department of Homeland Security, $4,406,547, U.S. Department of Justice, $3,518,527, U.S. Department of State, $3,079,814, Environmental Protection Agency, $2,285,991, National Endowment for the Humanities, $1,495,005, National Archives and Records Administration, $1,046,133, U.S. Department of Veteran's Affairs, $1,039,572, Nuclear Regulatory Commission, $1,000,775, Corporation for National and Community Service, $386,136, Federal Communications Commission, $252,856, U.S. Department of Housing and Urban Development, $243,444, Small Business Administration, $126,419, Other Federal Assistance, $92,297, Appalachian Regional Commission, $83,232, Barry Goldwater Scholarship and Excellence in Education Fund, $70,316, U.S Agency for International Development, $16,806. (Continue on to see Note B) De Minimis Rate Used: Both Rate Explanation: For the year ended June 30, 2024, only the Virginia Museum of Fine Arts, Department of Forensic Science, Department of Historic Resources, Department of Wildlife Resources, Richard Bland College, Southern Virginia Higher Education Center, Virginia Biotechnology Research Partnership Authority, Virginia Economic Development Partnership, and Virginia Museum of Natural History have elected to use the de minimis indirect cost rate per Section 200.414 of the Uniform Guidance. After a Presidentially-Declared disaster, FEMA provides a Public Assistance Grant to reimburse eligible costs associated with repair, replacement, or restoration of disaster-damaged facilities; and costs associated with Commonwealth’s response to the COVID-19 public health emergency. The federal government reimburses in the form of cost-shared grants which requires state matching funds. For the year ended June 30, 2024, the amount included in the accompanying schedules for Disaster Grants - Public Assistance (ALN 97.036) includes $211,117 of approved eligible expenditures that were included in a prior year.
Title: G. Program Expenditures Accounting Policies: A. Basis of Presentation The information in the accompanying “Schedule of Expenditures of Federal Awards” is presented in accordance with the Uniform Guidance. The schedule presents a summary of direct award expenditures, pass-through entity award expenditures, and amounts provided to subrecipients by federal department and ALN. For purposes of uploading to the Federal Audit Clearinghouse (FAC), stimulus Funds for COVID-19 related expenditures are designated as “COVID-19” in the column labeled Additional_Award_Identification. Federal Financial Assistance – The Single Audit Act Amendments of 1996 (Public Law 104-156) and the Uniform Guidance define federal financial assistance as grants, loans, loan guarantees, property (including donated surplus property), cooperative agreements, interest subsidies, insurance, food commodities, direct appropriations, or other assistance. Nonmonetary federal assistance, including food stamps, food commodities, and surplus property, is considered federal assistance and, therefore, is reported on the “Schedule of Expenditures of Federal Awards”. Federal financial assistance does not include direct federal cash assistance to individuals. Solicited contracts in a contractor relationship between the Commonwealth of Virginia and the federal government for which the federal government procures tangible goods or services are not considered to be federal financial assistance. Direct Award Assistance – Assistance received directly from the Federal government or received as a disbursement from other State entities is classified as direct award expenditures on the “Schedule of Expenditures of Federal Awards”. Pass-Through Entity Federal Assistance – Assistance received in a pass-through relationship from another non-federal entity is classified as pass-through entity award expenditures on the “Schedule of Expenditures of Federal Awards”. Amounts Provided to Subrecipients Assistance – Assistance disbursed by the Commonwealth of Virginia to non-state subrecipients is classified as amount provided to subrecipients on the “Schedule of Expenditures of Federal Awards”. Major Programs – The Single Audit Act Amendments of 1996 and the Uniform Guidance establish the criteria to be used in defining major programs. Major programs for the Commonwealth of Virginia were determined using a risk-based approach in accordance with the Uniform Guidance. Assistance Listing Number – The Assistance Listing Number (ALN) is a government-wide compendium of individual federal programs. Each program included in the compendium is assigned a five-digit program identification number (ALN) and program name. The accompanying schedule and footnotes reflect the program names and ALN assigned by the https://sam.gov website. Programs without an ALN are labeled as Other Assistance and presented using the federal agency’s two-digit prefix followed by U and a two-digit number. If the federal program is part of the Research and Development Cluster (R&D) and the specific program is not known, the federal agency’s two-digit prefix followed by RD is presented. The ALNs used in this audit period were retrieved on July 8, 2024. Cluster of Programs – Closely related programs that share common compliance requirements are grouped into clusters of programs. A cluster of programs is considered as one federal program for determining major programs. The following are the clusters administered by the Commonwealth, as required in the 2024 Compliance Supplement: Aging Cluster, CCDF Cluster, CDBG - Disaster Recovery Grants Cluster, CDBG - Entitlement/Special Purpose Grants Cluster, Child Nutrition Cluster, Disability Insurance/SSI Cluster, Economic Development Cluster, Employment Service Cluster, Federal Transit Cluster, Fish and Wildlife Cluster, FMCSA Cluster, Food Distribution Cluster, Forest Service Schools and Roads Cluster, Head Start Cluster, Health Center Program Cluster, Highway Safety Cluster, Medicaid Cluster, Research and Development, SNAP Cluster, Special Education Cluster (IDEA), Student Financial Assistance Cluster, Transit Services Programs Cluster, TRIO Cluster, and WIOA Cluster. The total amount expended, distributed from U.S. Department of Health and Human Services, for the CCDF Cluster are presented as follows: CCDBG (Child Care Development Block Grant), $245,295,921, CCDF ARP Supplemental, $119,232,794, CCDF ARP Child Care Stabilization Fund, $18,018,556, CCDF Coronavirus Response and Relief Supplemental Appropriations (CRRSA) Act, $(85,868), CCDF Mandatory and Matching, $160,661,894; CCDF Cluster total of $ 543,123,297. Student Financial Assistance and Research and Development clusters expend funds from several Federal departments. The amounts expended for these clusters are reported under the appropriate federal department in the accompanying schedule and are also summarized as follows. The total amount expended for Student Financial Assistance was $1,590,450,126 consisting of the following federal departments: U.S. Department of Education, $1,587,714,101, and U.S. Department of Health and Human Services, $2,736,025.  The total direct award expenditures for Research and Development were $846,805,022 consisting of the following federal departments: U.S. Department of Health and Human Services, $416,413,428, National Science Foundation, $150,917,210, U.S. Department of Defense, $126,978,482, U.S. Department of Energy, $33,491,513, U.S. Department of Agriculture, $27,496,198, U.S. Department of Transportation, $22,156,914, National Aeronautics and Space Administration, $14,654,747, U.S. Department of Commerce, $14,137,375, U.S. Department of Education, $13,492,724, U.S. Department of the Interior, $7,922,561, Department of Homeland Security, $4,406,547, U.S. Department of Justice, $3,518,527, U.S. Department of State, $3,079,814, Environmental Protection Agency, $2,285,991, National Endowment for the Humanities, $1,495,005, National Archives and Records Administration, $1,046,133, U.S. Department of Veteran's Affairs, $1,039,572, Nuclear Regulatory Commission, $1,000,775, Corporation for National and Community Service, $386,136, Federal Communications Commission, $252,856, U.S. Department of Housing and Urban Development, $243,444, Small Business Administration, $126,419, Other Federal Assistance, $92,297, Appalachian Regional Commission, $83,232, Barry Goldwater Scholarship and Excellence in Education Fund, $70,316, U.S Agency for International Development, $16,806. (Continue on to see Note B) De Minimis Rate Used: Both Rate Explanation: For the year ended June 30, 2024, only the Virginia Museum of Fine Arts, Department of Forensic Science, Department of Historic Resources, Department of Wildlife Resources, Richard Bland College, Southern Virginia Higher Education Center, Virginia Biotechnology Research Partnership Authority, Virginia Economic Development Partnership, and Virginia Museum of Natural History have elected to use the de minimis indirect cost rate per Section 200.414 of the Uniform Guidance. Certain transactions relating to federal financial assistance may appear in the records of more than one state recipient agency. To avoid duplication and the overstatement of the aggregate level of federal financial assistance expended by the Commonwealth of Virginia, the following policies have been adopted: 1. When federal financial assistance is received by one state recipient agency and distributed to another state agency (i.e., a transfer of funds by the primary recipient state agency to a secondary state agency), the federal financial assistance will be reflected as expenditures by the secondary state agency. 2. When federal financial assistance is received by one state agency to purchase goods or services from another state agency, the federal financial assistance will be reflected as expenditures by the recipient (purchaser) agency.

Finding Details

2024-010: Obtain, Review, and Document System and Organization Control Reports of Third-Party Service Providers Applicable to: Department of Social Services Prior Year Finding Number: 2023-085; 2022-089; 2021-019 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Pandemic EBT Food Benefits - 10.542 Federal Award Number and Year: Not Applicable - 2024 Name of Federal Agency: U.S. Department of Agriculture Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(a) Known Questioned Costs: $0 Social Services continues to not obtain, review, and document System and Organization Controls (SOC) reports, specifically SOC 1, Type 2 reports, to gain assurance over its third-party service providers’ internal controls relevant to financial reporting. SOC 1, Type 2 reports address the service organization’s internal controls and the effect those internal controls may have on the user entity’s financial statements. Social Services uses service organizations to perform functions that are significant to its financial operations such as administering the electronic benefit transfer (EBT) process for several of its public assistance programs. For instance, during fiscal year 2024, one of Social Services’ third-party service providers issued more than $2 billion in financial assistance to beneficiaries on EBT cards. Topic 10305 of the CAPP Manual requires agencies to have adequate interaction with service providers to appropriately understand the service provider’s internal control environment and maintain oversight over service providers to gain assurance over outsourced operations. Additionally, 2 CFR § 200.303(a) requires non-federal entities to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the non-federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Social Services’ tasks contract administrators with responsibility for obtaining, reviewing, and documenting SOC 1, Type 2 reports. However, contract administrators are often not familiar with the CAPP Manual requirements, and Social Services has not made them aware of the expectations for obtaining, reviewing, and documenting SOC 1, Type 2 reports through a documented policy and procedure. As a result, contract administrators have not been obtaining, reviewing, and documenting SOC 1, Type 2 reports. Without adopting a policy and procedure over SOC 1, Type 2 reports and communicating those expectations to contract administrators, Social Services is unable to ensure its complementary user entity controls are sufficient to support their reliance on the service providers’ control design, implementation, and operating effectiveness. Additionally, Social Services is unable to address any internal control deficiencies and/or exceptions identified in the SOC 1, Type 2 reports. In effect, Social Services is increasing the risk that it will not detect a weakness in a service provider’s environment by not obtaining the necessary SOC 1, Type 2 reports timely or properly documenting its review of the reports. Social Services should designate a resource within the agency, who is knowledgeable of the CAPP Manual and SOC 1, Type 2 report requirements, with responsibility for developing an office-wide policy and procedure that contract administrators can use for obtaining, reviewing, and documenting SOC 1, Type 2 reports. At a minimum, Social Services’ policy and procedure should include the timeframes for obtaining SOC 1, Type 2 reports from service providers, documentation requirements for user entity complementary controls, the steps needed to address internal control deficiencies and/or exceptions found in reviews, and the staff responsible for any corrective actions necessary to mitigate the risk to the Commonwealth until the service provider corrects the deficiency. Thereafter, Social Services should communicate the policy and procedure to all individuals responsible for overseeing service provider operations to ensure compliance with federal and state regulations. Finally, Social Services should retain this information as part of its annual Agency Risk Management and Internal Control Standard certification. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-032: Improve Database Security Applicable to: Department of Education - Direct Aid to Public Education Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management; Audit and Accountability ALPT or Cluster Name and ALN: Coronavirus State and Local Fiscal Recovery Funds (CSLFRF) - 21.027; Supporting Effective Instruction State Grants (formerly Improving Teacher Quality State Grants) - 84.367 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Treasury; U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Education does not implement some of the required controls to protect the database that supports Education’s system of record. The Commonwealth’s Information Security Standard, SEC530 (Security Standard), and industry best practices, such as the Center for Internet Security, prescribe certain required and recommended security controls to safeguard systems that contain or process sensitive data. The Security Standard requires and industry best practices recommend implementing specific controls to reduce unnecessary risk to data confidentiality, integrity, and availability. We communicated three control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. By not meeting the minimum requirements in the Security Standard and not aligning the database’s settings and configurations with industry best practices, Education cannot appropriately manage and maintain the database and ensure data integrity. Education should allocate the necessary resources to ensure database configurations, controls, and processes align with the requirements in the Security Standard and industry best practices. Implementing these controls will help maintain the confidentiality, integrity, and availability of the sensitive and mission critical data stored or processed in the database. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-032: Improve Database Security Applicable to: Department of Education - Direct Aid to Public Education Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management; Audit and Accountability ALPT or Cluster Name and ALN: Coronavirus State and Local Fiscal Recovery Funds (CSLFRF) - 21.027; Supporting Effective Instruction State Grants (formerly Improving Teacher Quality State Grants) - 84.367 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Treasury; U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Education does not implement some of the required controls to protect the database that supports Education’s system of record. The Commonwealth’s Information Security Standard, SEC530 (Security Standard), and industry best practices, such as the Center for Internet Security, prescribe certain required and recommended security controls to safeguard systems that contain or process sensitive data. The Security Standard requires and industry best practices recommend implementing specific controls to reduce unnecessary risk to data confidentiality, integrity, and availability. We communicated three control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. By not meeting the minimum requirements in the Security Standard and not aligning the database’s settings and configurations with industry best practices, Education cannot appropriately manage and maintain the database and ensure data integrity. Education should allocate the necessary resources to ensure database configurations, controls, and processes align with the requirements in the Security Standard and industry best practices. Implementing these controls will help maintain the confidentiality, integrity, and availability of the sensitive and mission critical data stored or processed in the database. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-032: Improve Database Security Applicable to: Department of Education - Direct Aid to Public Education Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management; Audit and Accountability ALPT or Cluster Name and ALN: Coronavirus State and Local Fiscal Recovery Funds (CSLFRF) - 21.027; Supporting Effective Instruction State Grants (formerly Improving Teacher Quality State Grants) - 84.367 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Treasury; U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Education does not implement some of the required controls to protect the database that supports Education’s system of record. The Commonwealth’s Information Security Standard, SEC530 (Security Standard), and industry best practices, such as the Center for Internet Security, prescribe certain required and recommended security controls to safeguard systems that contain or process sensitive data. The Security Standard requires and industry best practices recommend implementing specific controls to reduce unnecessary risk to data confidentiality, integrity, and availability. We communicated three control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. By not meeting the minimum requirements in the Security Standard and not aligning the database’s settings and configurations with industry best practices, Education cannot appropriately manage and maintain the database and ensure data integrity. Education should allocate the necessary resources to ensure database configurations, controls, and processes align with the requirements in the Security Standard and industry best practices. Implementing these controls will help maintain the confidentiality, integrity, and availability of the sensitive and mission critical data stored or processed in the database. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-032: Improve Database Security Applicable to: Department of Education - Direct Aid to Public Education Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management; Audit and Accountability ALPT or Cluster Name and ALN: Coronavirus State and Local Fiscal Recovery Funds (CSLFRF) - 21.027; Supporting Effective Instruction State Grants (formerly Improving Teacher Quality State Grants) - 84.367 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Treasury; U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Education does not implement some of the required controls to protect the database that supports Education’s system of record. The Commonwealth’s Information Security Standard, SEC530 (Security Standard), and industry best practices, such as the Center for Internet Security, prescribe certain required and recommended security controls to safeguard systems that contain or process sensitive data. The Security Standard requires and industry best practices recommend implementing specific controls to reduce unnecessary risk to data confidentiality, integrity, and availability. We communicated three control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. By not meeting the minimum requirements in the Security Standard and not aligning the database’s settings and configurations with industry best practices, Education cannot appropriately manage and maintain the database and ensure data integrity. Education should allocate the necessary resources to ensure database configurations, controls, and processes align with the requirements in the Security Standard and industry best practices. Implementing these controls will help maintain the confidentiality, integrity, and availability of the sensitive and mission critical data stored or processed in the database. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-032: Improve Database Security Applicable to: Department of Education - Direct Aid to Public Education Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management; Audit and Accountability ALPT or Cluster Name and ALN: Coronavirus State and Local Fiscal Recovery Funds (CSLFRF) - 21.027; Supporting Effective Instruction State Grants (formerly Improving Teacher Quality State Grants) - 84.367 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Treasury; U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Education does not implement some of the required controls to protect the database that supports Education’s system of record. The Commonwealth’s Information Security Standard, SEC530 (Security Standard), and industry best practices, such as the Center for Internet Security, prescribe certain required and recommended security controls to safeguard systems that contain or process sensitive data. The Security Standard requires and industry best practices recommend implementing specific controls to reduce unnecessary risk to data confidentiality, integrity, and availability. We communicated three control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. By not meeting the minimum requirements in the Security Standard and not aligning the database’s settings and configurations with industry best practices, Education cannot appropriately manage and maintain the database and ensure data integrity. Education should allocate the necessary resources to ensure database configurations, controls, and processes align with the requirements in the Security Standard and industry best practices. Implementing these controls will help maintain the confidentiality, integrity, and availability of the sensitive and mission critical data stored or processed in the database. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-090: Improve Reporting to the National Student Loan Data System Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College; Old Dominion University; Radford University; University of Virginia; Virginia State University Prior Year Finding Number: 2021-078; 2018-101 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 685.309 Known Questioned Costs: $0 The institutions noted below did not properly report accurate and/or timely enrollment data to the Department of Education (ED) using the National Student Loan Data System (NSLDS) in accordance with 34 CFR § 685.309 and the NSLDS Enrollment Guide, for students that had withdrawn, graduated or changed enrollment levels. The accuracy of Title IV enrollment data depends heavily on information reported by institutions. The institutions’ inaccurate and untimely enrollment data submissions to NSLDS can affect ED’s reliance on NSLDS for monitoring purposes and may interfere with establishing a student’s loan status, deferment privileges and grace periods. In addition, noncompliance may also impact an institution’s participation in Title IV programs. George Mason University GMU management determined the discrepancies in its enrollment reporting submissions were due to a lack of communication between the Office of the University Registrar and the Office of Student Financial Aid. From our sample of 40 students, we noted the following instances of noncompliance: GMU reported an inaccurate enrollment status for seven students (18%); GMU reported an inaccurate enrollment status effective date for nine students (23%); GMU did not report enrollment status changes timely for seven students (18%); GMU reported inaccurate information in at least one campus or program-level field deemed critical for nine students (23%); and GMU did not provide evidence supporting that it reported accurate physical addresses in NSLDS for eight students (20%). Norfolk State University NSU management indicated the errors in its enrollment reporting submissions were due to staff turnover in the Office of the Registrar and programming issues within the student information system. From our sample of 39 students, we noted the following instances of noncompliance: NSU reported an inaccurate enrollment status for six students (15%); NSU reported an inaccurate enrollment status effective date for 26 students (67%); NSU did not report enrollment status changes timely for one student (3%); and NSU reported inaccurate information in at least one campus or program-level field deemed critical for 17 students (44%). Northern Virginia Community College A lack of management oversight in NVCC’s Registrar’s Office led to the discrepancies in its enrollment reporting submissions. From our sample of 40 students, we noted the following instances of noncompliance: NVCC reported an inaccurate enrollment status for ten students (25%); NVCC reported an inaccurate enrollment status effective date for 12 students (30%); NVCC did not report enrollment status changes timely for eight students (20%); NVCC reported inaccurate information in at least one campus or program-level field deemed critical for 14 students (35%); and NVCC could not demonstrate proper approval for the academic program for one student (3%), since the academic program did not appear on the State Council of Higher Education for Virginia (SCHEV) degree inventory report. Old Dominion University ODU management indicated the errors in its enrollment reporting submission were due to staff turnover. From our sample of 50 students, we noted the following instances of noncompliance: ODU reported an inaccurate enrollment status for nine students (18%); ODU reported an inaccurate enrollment status effective date for 29 students (58%); ODU did not report enrollment status changes timely for 15 students (30%); and ODU reported inaccurate information in at least one campus or program-level field deemed critical for 29 students (58%). Radford University The primary cause of the discrepancies in RU’s enrollment reporting submissions was staff turnover and the time required for new staff to become proficient in their responsibilities. From our sample of 43 students, we noted the following instances of noncompliance: RU reported an inaccurate enrollment status for one student (2%); RU reported an inaccurate enrollment status effective date for three students (7%); RU did not report enrollment status changes timely for 10 students (23%); RU reported inaccurate information in at least one campus or program-level field deemed critical for three students (7%); and RU could not demonstrate proper approval for the academic program for one student (2%), since the academic program did not appear on the SCHEV degree inventory report. University of Virginia The underlying causes for the discrepancies in UVA’s enrollment reporting submissions were data entry errors and batch processing issues. Specifically, UVA recorded a student’s social security number inaccurately in its Student Information System. Additionally, batch enrollment updates caused new data submissions to overwrite previous data, which resulted in deactivated and inaccurate enrollment records. From our review of 40 students, we noted the following instances of noncompliance: UVA reported an inaccurate enrollment status effective date for four students (10%); UVA did not report enrollment status changes timely for five students (13%); and UVA reported inaccurate information in at least one campus or program-level field deemed critical for four students (10%). Virginia State University A lack of management oversight in VSU’s enrollment reporting process led to the discrepancies in its enrollment reporting submissions. From our sample of 49 students, we noted the following instances of noncompliance: VSU reported an inaccurate enrollment status for three students (6%); VSU reported an inaccurate enrollment status effective date for six students (12%); VSU did not report enrollment status changes timely for 21 students (43%); VSU reported inaccurate information in at least one campus or program-level field deemed critical for 10 students (20%); VSU could not demonstrate proper approval for the academic program for eight students (16%), since the academic program did not appear on the SCHEV degree inventory report; and The permanent address for two out of 39 applicable federal Direct Loan borrowers (5%) did not agree between the student information system and NSLDS. Recommendation Each institution should evaluate its current enrollment reporting procedures and implement corrective action to ensure it reports accurate and timely student enrollment data to NSLDS to prevent future noncompliance. Where applicable, institutions should also consider implementing a quality control review process to monitor the accuracy of campus and program-level batch submissions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-090: Improve Reporting to the National Student Loan Data System Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College; Old Dominion University; Radford University; University of Virginia; Virginia State University Prior Year Finding Number: 2021-078; 2018-101 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 685.309 Known Questioned Costs: $0 The institutions noted below did not properly report accurate and/or timely enrollment data to the Department of Education (ED) using the National Student Loan Data System (NSLDS) in accordance with 34 CFR § 685.309 and the NSLDS Enrollment Guide, for students that had withdrawn, graduated or changed enrollment levels. The accuracy of Title IV enrollment data depends heavily on information reported by institutions. The institutions’ inaccurate and untimely enrollment data submissions to NSLDS can affect ED’s reliance on NSLDS for monitoring purposes and may interfere with establishing a student’s loan status, deferment privileges and grace periods. In addition, noncompliance may also impact an institution’s participation in Title IV programs. George Mason University GMU management determined the discrepancies in its enrollment reporting submissions were due to a lack of communication between the Office of the University Registrar and the Office of Student Financial Aid. From our sample of 40 students, we noted the following instances of noncompliance: GMU reported an inaccurate enrollment status for seven students (18%); GMU reported an inaccurate enrollment status effective date for nine students (23%); GMU did not report enrollment status changes timely for seven students (18%); GMU reported inaccurate information in at least one campus or program-level field deemed critical for nine students (23%); and GMU did not provide evidence supporting that it reported accurate physical addresses in NSLDS for eight students (20%). Norfolk State University NSU management indicated the errors in its enrollment reporting submissions were due to staff turnover in the Office of the Registrar and programming issues within the student information system. From our sample of 39 students, we noted the following instances of noncompliance: NSU reported an inaccurate enrollment status for six students (15%); NSU reported an inaccurate enrollment status effective date for 26 students (67%); NSU did not report enrollment status changes timely for one student (3%); and NSU reported inaccurate information in at least one campus or program-level field deemed critical for 17 students (44%). Northern Virginia Community College A lack of management oversight in NVCC’s Registrar’s Office led to the discrepancies in its enrollment reporting submissions. From our sample of 40 students, we noted the following instances of noncompliance: NVCC reported an inaccurate enrollment status for ten students (25%); NVCC reported an inaccurate enrollment status effective date for 12 students (30%); NVCC did not report enrollment status changes timely for eight students (20%); NVCC reported inaccurate information in at least one campus or program-level field deemed critical for 14 students (35%); and NVCC could not demonstrate proper approval for the academic program for one student (3%), since the academic program did not appear on the State Council of Higher Education for Virginia (SCHEV) degree inventory report. Old Dominion University ODU management indicated the errors in its enrollment reporting submission were due to staff turnover. From our sample of 50 students, we noted the following instances of noncompliance: ODU reported an inaccurate enrollment status for nine students (18%); ODU reported an inaccurate enrollment status effective date for 29 students (58%); ODU did not report enrollment status changes timely for 15 students (30%); and ODU reported inaccurate information in at least one campus or program-level field deemed critical for 29 students (58%). Radford University The primary cause of the discrepancies in RU’s enrollment reporting submissions was staff turnover and the time required for new staff to become proficient in their responsibilities. From our sample of 43 students, we noted the following instances of noncompliance: RU reported an inaccurate enrollment status for one student (2%); RU reported an inaccurate enrollment status effective date for three students (7%); RU did not report enrollment status changes timely for 10 students (23%); RU reported inaccurate information in at least one campus or program-level field deemed critical for three students (7%); and RU could not demonstrate proper approval for the academic program for one student (2%), since the academic program did not appear on the SCHEV degree inventory report. University of Virginia The underlying causes for the discrepancies in UVA’s enrollment reporting submissions were data entry errors and batch processing issues. Specifically, UVA recorded a student’s social security number inaccurately in its Student Information System. Additionally, batch enrollment updates caused new data submissions to overwrite previous data, which resulted in deactivated and inaccurate enrollment records. From our review of 40 students, we noted the following instances of noncompliance: UVA reported an inaccurate enrollment status effective date for four students (10%); UVA did not report enrollment status changes timely for five students (13%); and UVA reported inaccurate information in at least one campus or program-level field deemed critical for four students (10%). Virginia State University A lack of management oversight in VSU’s enrollment reporting process led to the discrepancies in its enrollment reporting submissions. From our sample of 49 students, we noted the following instances of noncompliance: VSU reported an inaccurate enrollment status for three students (6%); VSU reported an inaccurate enrollment status effective date for six students (12%); VSU did not report enrollment status changes timely for 21 students (43%); VSU reported inaccurate information in at least one campus or program-level field deemed critical for 10 students (20%); VSU could not demonstrate proper approval for the academic program for eight students (16%), since the academic program did not appear on the SCHEV degree inventory report; and The permanent address for two out of 39 applicable federal Direct Loan borrowers (5%) did not agree between the student information system and NSLDS. Recommendation Each institution should evaluate its current enrollment reporting procedures and implement corrective action to ensure it reports accurate and timely student enrollment data to NSLDS to prevent future noncompliance. Where applicable, institutions should also consider implementing a quality control review process to monitor the accuracy of campus and program-level batch submissions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-097: Improve Notification Process for Federal Direct Loan Awards to Students Applicable to: Norfolk State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.165(a)(2) Known Questioned Costs: $0 NSU Financial Aid Office staff did not provide proper federal Direct Loan notification for one of 25 (4%) borrowers. The Financial Aid Office manually enters data into the student information system which transmits the required notifications to borrowers. However, a staff member assigned to send notifications was out of the office and the Financial Aid Office did not have a designated back-up. In accordance with 34 CFR § 668.165(a)(2), institutions should properly notify students receiving federal Direct Loans, in writing, of the date and amount of the disbursement, the student’s right to cancel all or a portion of a loan or loan disbursement, and the procedure and time by which the student must notify the institution that he or she wishes to cancel the loan. Additionally, 34 CFR § 668.165 (3) (i – ii) indicates that for Direct Loans, the institution must provide the notice in writing no earlier than 30 days before, and no later than 30 days after, crediting the student’s account at the institution if the institution obtains affirmative confirmation, and no later than seven days if the institution does not obtain an affirmative confirmation. Not properly notifying students in accordance with federal regulations may result in adverse actions and impact participation in Title IV programs. Additionally, improper notification could limit the amount of time a student or parent has to make an informed decision on whether to accept or reject a loan. The Financial Aid Office should revise its existing procedures to cross train staff, thus providing for proper back-up when staff are absent. NSU management should ensure each federal Direct Loan borrower receives the required notification. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-099: Reconcile Federal Assistance Programs Applicable to: Northern Virginia Community College Prior Year Finding Number: 2021-073 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Cash Management - 34 CFR § 676.19(b)(2) Known Questioned Costs: $0 NVCC Controller’s Office and Financial Aid Office staff did not adequately reconcile its federal Direct Loan program. For two out of two (100%) reconciliations sampled, each had a reconciling difference. The January 2024 ending cash balance had a reconciling difference of $144,734, and March 2024 had a reconciling difference of $7,692. NVCC management indicated management and staff turnover in the Controller’s Office, a lack of communication between the Controller’s Office and the Financial Aid Office, and the Controller’s Office not drawing down funds on a timely schedule contributed to the reconciling differences identified. In accordance with 34 CFR § 676.19(b)(2), institutions shall establish and maintain program and fiscal records that are reconciled at least monthly. By not reconciling federal student aid programs properly each month, NVCC increases its risk of not identifying issues and resolving them before they become a systemic problem. Systemic problems may result in potential adverse actions and impact participation in Title IV programs. The NVCC Financial Aid Office and Controller’s Office should review and enhance their current reconciliation process for federal assistance programs. Management should ensure that staff complete reconciliations properly and timely including addressing reconciling differences Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-032: Improve Database Security Applicable to: Department of Education - Direct Aid to Public Education Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management; Audit and Accountability ALPT or Cluster Name and ALN: Coronavirus State and Local Fiscal Recovery Funds (CSLFRF) - 21.027; Supporting Effective Instruction State Grants (formerly Improving Teacher Quality State Grants) - 84.367 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Treasury; U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Education does not implement some of the required controls to protect the database that supports Education’s system of record. The Commonwealth’s Information Security Standard, SEC530 (Security Standard), and industry best practices, such as the Center for Internet Security, prescribe certain required and recommended security controls to safeguard systems that contain or process sensitive data. The Security Standard requires and industry best practices recommend implementing specific controls to reduce unnecessary risk to data confidentiality, integrity, and availability. We communicated three control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. By not meeting the minimum requirements in the Security Standard and not aligning the database’s settings and configurations with industry best practices, Education cannot appropriately manage and maintain the database and ensure data integrity. Education should allocate the necessary resources to ensure database configurations, controls, and processes align with the requirements in the Security Standard and industry best practices. Implementing these controls will help maintain the confidentiality, integrity, and availability of the sensitive and mission critical data stored or processed in the database. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-072: Strengthen Controls over Procurement Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Procurement and Suspension and Debarment - 2 CFR § 200.317 Known Questioned Costs: $0 Epidemiology is not compiling and retaining a comprehensive contract listing for all procured and active contracts funded by the ELC federal grant program. Management was unable to provide the comprehensive contract listing due to not properly maintaining the documentation. Title 2 CFR § 200.317 governs procurements by states and requires that “when procuring property and services under a Federal award, a State must follow the same policies and procedures it uses for procurements from its non-Federal funds.” Department of General Services Agency Procurement and Surplus Property Manual (APSPM) - Section 10.3 requires agencies to maintain a complete file in one place for each purchase transaction. It states that the file must contain, at a minimum, as applicable, the description of requirements, sources solicited, a copy of the Virginia Business Opportunities receipt, cancellation notices, the method of evaluation and award, a signed copy of the contract or purchase order, contractor performance report submitted by the administrator, modifications or change orders, vendor complaint forms, cure letters, usage data such as release or obligation registers, and any other actions relating to the procurement. In addition, APSPM Annex 10-A, which is a Post Award Administration Checklist, requires the agency to list the contract on the agency’s master contract list or schedule to include period of performance and any renewal option(s) to allow for the planning of renewal or rebidding actions. Health's individual offices or Local Health Districts (LHD) complete procurements for the ELC federal grant program up to $100,000, with procurements over $10,000 and up to $100,000 being solicited through a “quick quote.” Health’s Office of Procurement and General Services handles complex procurements. Since Health has 35 LHDs, the absence of a comprehensive contract listing increases the risk of a contract being established by an LHD that goes unnoticed by Epidemiology. Due to limited staff and the number of health offices and LHDs involved in the procurement process, Epidemiology was unable to provide a comprehensive contract listing. By not maintaining proper documentation and support, Health is unable to ensure the effectiveness of internal controls. Furthermore, it is difficult to substantiate the legitimacy of the procurement transaction, increasing the risk of unauthorized transactions, which also increases the potential for questioned costs. Health’s management should develop a policy requiring the compilation of comprehensive contract listings and communicate the policy to the applicable offices and districts. Health’s management should also ensure that the applicable offices and districts involved have adequate staffing and training on contract procurement and the need to maintain adequate documentation for all procurements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-087: Review Subrecipient Audit Reports Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.331(d) Known Questioned Costs: $0 Health does not monitor subrecipients in accordance with federal regulations for the Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) and Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises federal grant programs. During our audit, we found that Health’s Office of Epidemiology (Epidemiology) and the Office of Health Equity (OHE) did not obtain and review a Single Audit or program-specific audit report for subrecipients who received $750,000 or more in subawards from ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. According to Title 2 U.S. Code of Federal Regulations (CFR) § 200.332(f), all pass-through entities must verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year will equal or exceed $750,000. Additionally, in the case of any findings, 2 CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Federal Audit Clearinghouse (Clearinghouse). Due to significant turnover in contract administrators responsible for subrecipient monitoring, Epidemiology and OHE were unable to provide evidence that staff reviewed Single Audit or program-specific audit reports for all subrecipients expending $750,000 or more during fiscal year 2024. In addition, OFM did not have a current subrecipient monitoring policy and procedure in place to detect subrecipients that met the audit threshold. Health last updated its subrecipient monitoring policy in 2014. Without obtaining the appropriate reports, Health is unable to show it is meeting the requirements set forth in 2 CFR part 200, subpart F, which includes issuing a management decision on audit findings within six months after receipt of the subrecipient’s audit report and ensuring that the subrecipient takes timely and appropriate corrective action on all audit findings. OFM should update its subrecipient monitoring policy and communicate the policy to the applicable offices and districts. In addition, OFM should periodically review the Clearinghouse to determine whether subrecipients who meet the audit threshold obtain the required audits, and that the applicable offices or districts are reviewing the audit reports and considering the impact of any deficiencies identified in audit findings. Epidemiology and OHE should ensure staff review Single Audit or program-specific audit reports for subrecipients who meet the audit threshold and should adhere to all federal requirements when conducting monitoring over such subrecipients. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-107: Strengthen Controls over FFATA Reporting Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Health is not completing Federal Funding Accountability and Transparency Act (FFATA) reporting for the ELC and STLT federal grant programs. During our audit, we found that Epidemiology and OHE did not complete FFATA reporting submissions for subrecipients who received $30,000 or more in ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. Title 2 CFR Part 170 Appendix A, included in award documents signed by management, requires Health to report each obligating action, exceeding $30,000, to the FFATA Subaward Reporting System (FSRS). Health’s FFATA reporting policy, which Health last updated in 2014, states that all offices and districts that are recipients of federal grants and contracts shall adhere to all requirements of the FFATA and ensure timely and accurate reporting. Epidemiology and OHE have experienced turnover in key positions that were historically responsible for completing and submitting FFATA reports. In addition, OFM did not have a procedure in place to detect subawards that it should have reported to FSRS. Not reporting to FSRS could result in a citizen or federal official having a distorted view as to how Health is obligating federal funds. Epidemiology and OHE should ensure program personnel adhere to Health policies and procedures and fulfill FFATA reporting responsibilities by submitting required FFATA subaward reporting information by the due date and retaining documentation to support the submissions. Additionally, OFM should update and communicate the FFATA reporting policy to applicable offices and districts. Further, OFM should periodically analyze subaward records to determine if there are instances where program personnel are not submitting the required FFATA subaward reporting information. If so, OFM should collect this information from the applicable program personnel promptly to comply with the FFATA reporting requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-072: Strengthen Controls over Procurement Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Procurement and Suspension and Debarment - 2 CFR § 200.317 Known Questioned Costs: $0 Epidemiology is not compiling and retaining a comprehensive contract listing for all procured and active contracts funded by the ELC federal grant program. Management was unable to provide the comprehensive contract listing due to not properly maintaining the documentation. Title 2 CFR § 200.317 governs procurements by states and requires that “when procuring property and services under a Federal award, a State must follow the same policies and procedures it uses for procurements from its non-Federal funds.” Department of General Services Agency Procurement and Surplus Property Manual (APSPM) - Section 10.3 requires agencies to maintain a complete file in one place for each purchase transaction. It states that the file must contain, at a minimum, as applicable, the description of requirements, sources solicited, a copy of the Virginia Business Opportunities receipt, cancellation notices, the method of evaluation and award, a signed copy of the contract or purchase order, contractor performance report submitted by the administrator, modifications or change orders, vendor complaint forms, cure letters, usage data such as release or obligation registers, and any other actions relating to the procurement. In addition, APSPM Annex 10-A, which is a Post Award Administration Checklist, requires the agency to list the contract on the agency’s master contract list or schedule to include period of performance and any renewal option(s) to allow for the planning of renewal or rebidding actions. Health's individual offices or Local Health Districts (LHD) complete procurements for the ELC federal grant program up to $100,000, with procurements over $10,000 and up to $100,000 being solicited through a “quick quote.” Health’s Office of Procurement and General Services handles complex procurements. Since Health has 35 LHDs, the absence of a comprehensive contract listing increases the risk of a contract being established by an LHD that goes unnoticed by Epidemiology. Due to limited staff and the number of health offices and LHDs involved in the procurement process, Epidemiology was unable to provide a comprehensive contract listing. By not maintaining proper documentation and support, Health is unable to ensure the effectiveness of internal controls. Furthermore, it is difficult to substantiate the legitimacy of the procurement transaction, increasing the risk of unauthorized transactions, which also increases the potential for questioned costs. Health’s management should develop a policy requiring the compilation of comprehensive contract listings and communicate the policy to the applicable offices and districts. Health’s management should also ensure that the applicable offices and districts involved have adequate staffing and training on contract procurement and the need to maintain adequate documentation for all procurements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-087: Review Subrecipient Audit Reports Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.331(d) Known Questioned Costs: $0 Health does not monitor subrecipients in accordance with federal regulations for the Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) and Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises federal grant programs. During our audit, we found that Health’s Office of Epidemiology (Epidemiology) and the Office of Health Equity (OHE) did not obtain and review a Single Audit or program-specific audit report for subrecipients who received $750,000 or more in subawards from ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. According to Title 2 U.S. Code of Federal Regulations (CFR) § 200.332(f), all pass-through entities must verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year will equal or exceed $750,000. Additionally, in the case of any findings, 2 CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Federal Audit Clearinghouse (Clearinghouse). Due to significant turnover in contract administrators responsible for subrecipient monitoring, Epidemiology and OHE were unable to provide evidence that staff reviewed Single Audit or program-specific audit reports for all subrecipients expending $750,000 or more during fiscal year 2024. In addition, OFM did not have a current subrecipient monitoring policy and procedure in place to detect subrecipients that met the audit threshold. Health last updated its subrecipient monitoring policy in 2014. Without obtaining the appropriate reports, Health is unable to show it is meeting the requirements set forth in 2 CFR part 200, subpart F, which includes issuing a management decision on audit findings within six months after receipt of the subrecipient’s audit report and ensuring that the subrecipient takes timely and appropriate corrective action on all audit findings. OFM should update its subrecipient monitoring policy and communicate the policy to the applicable offices and districts. In addition, OFM should periodically review the Clearinghouse to determine whether subrecipients who meet the audit threshold obtain the required audits, and that the applicable offices or districts are reviewing the audit reports and considering the impact of any deficiencies identified in audit findings. Epidemiology and OHE should ensure staff review Single Audit or program-specific audit reports for subrecipients who meet the audit threshold and should adhere to all federal requirements when conducting monitoring over such subrecipients. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-107: Strengthen Controls over FFATA Reporting Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Health is not completing Federal Funding Accountability and Transparency Act (FFATA) reporting for the ELC and STLT federal grant programs. During our audit, we found that Epidemiology and OHE did not complete FFATA reporting submissions for subrecipients who received $30,000 or more in ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. Title 2 CFR Part 170 Appendix A, included in award documents signed by management, requires Health to report each obligating action, exceeding $30,000, to the FFATA Subaward Reporting System (FSRS). Health’s FFATA reporting policy, which Health last updated in 2014, states that all offices and districts that are recipients of federal grants and contracts shall adhere to all requirements of the FFATA and ensure timely and accurate reporting. Epidemiology and OHE have experienced turnover in key positions that were historically responsible for completing and submitting FFATA reports. In addition, OFM did not have a procedure in place to detect subawards that it should have reported to FSRS. Not reporting to FSRS could result in a citizen or federal official having a distorted view as to how Health is obligating federal funds. Epidemiology and OHE should ensure program personnel adhere to Health policies and procedures and fulfill FFATA reporting responsibilities by submitting required FFATA subaward reporting information by the due date and retaining documentation to support the submissions. Additionally, OFM should update and communicate the FFATA reporting policy to applicable offices and districts. Further, OFM should periodically analyze subaward records to determine if there are instances where program personnel are not submitting the required FFATA subaward reporting information. If so, OFM should collect this information from the applicable program personnel promptly to comply with the FFATA reporting requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-072: Strengthen Controls over Procurement Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Procurement and Suspension and Debarment - 2 CFR § 200.317 Known Questioned Costs: $0 Epidemiology is not compiling and retaining a comprehensive contract listing for all procured and active contracts funded by the ELC federal grant program. Management was unable to provide the comprehensive contract listing due to not properly maintaining the documentation. Title 2 CFR § 200.317 governs procurements by states and requires that “when procuring property and services under a Federal award, a State must follow the same policies and procedures it uses for procurements from its non-Federal funds.” Department of General Services Agency Procurement and Surplus Property Manual (APSPM) - Section 10.3 requires agencies to maintain a complete file in one place for each purchase transaction. It states that the file must contain, at a minimum, as applicable, the description of requirements, sources solicited, a copy of the Virginia Business Opportunities receipt, cancellation notices, the method of evaluation and award, a signed copy of the contract or purchase order, contractor performance report submitted by the administrator, modifications or change orders, vendor complaint forms, cure letters, usage data such as release or obligation registers, and any other actions relating to the procurement. In addition, APSPM Annex 10-A, which is a Post Award Administration Checklist, requires the agency to list the contract on the agency’s master contract list or schedule to include period of performance and any renewal option(s) to allow for the planning of renewal or rebidding actions. Health's individual offices or Local Health Districts (LHD) complete procurements for the ELC federal grant program up to $100,000, with procurements over $10,000 and up to $100,000 being solicited through a “quick quote.” Health’s Office of Procurement and General Services handles complex procurements. Since Health has 35 LHDs, the absence of a comprehensive contract listing increases the risk of a contract being established by an LHD that goes unnoticed by Epidemiology. Due to limited staff and the number of health offices and LHDs involved in the procurement process, Epidemiology was unable to provide a comprehensive contract listing. By not maintaining proper documentation and support, Health is unable to ensure the effectiveness of internal controls. Furthermore, it is difficult to substantiate the legitimacy of the procurement transaction, increasing the risk of unauthorized transactions, which also increases the potential for questioned costs. Health’s management should develop a policy requiring the compilation of comprehensive contract listings and communicate the policy to the applicable offices and districts. Health’s management should also ensure that the applicable offices and districts involved have adequate staffing and training on contract procurement and the need to maintain adequate documentation for all procurements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-087: Review Subrecipient Audit Reports Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.331(d) Known Questioned Costs: $0 Health does not monitor subrecipients in accordance with federal regulations for the Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) and Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises federal grant programs. During our audit, we found that Health’s Office of Epidemiology (Epidemiology) and the Office of Health Equity (OHE) did not obtain and review a Single Audit or program-specific audit report for subrecipients who received $750,000 or more in subawards from ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. According to Title 2 U.S. Code of Federal Regulations (CFR) § 200.332(f), all pass-through entities must verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year will equal or exceed $750,000. Additionally, in the case of any findings, 2 CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Federal Audit Clearinghouse (Clearinghouse). Due to significant turnover in contract administrators responsible for subrecipient monitoring, Epidemiology and OHE were unable to provide evidence that staff reviewed Single Audit or program-specific audit reports for all subrecipients expending $750,000 or more during fiscal year 2024. In addition, OFM did not have a current subrecipient monitoring policy and procedure in place to detect subrecipients that met the audit threshold. Health last updated its subrecipient monitoring policy in 2014. Without obtaining the appropriate reports, Health is unable to show it is meeting the requirements set forth in 2 CFR part 200, subpart F, which includes issuing a management decision on audit findings within six months after receipt of the subrecipient’s audit report and ensuring that the subrecipient takes timely and appropriate corrective action on all audit findings. OFM should update its subrecipient monitoring policy and communicate the policy to the applicable offices and districts. In addition, OFM should periodically review the Clearinghouse to determine whether subrecipients who meet the audit threshold obtain the required audits, and that the applicable offices or districts are reviewing the audit reports and considering the impact of any deficiencies identified in audit findings. Epidemiology and OHE should ensure staff review Single Audit or program-specific audit reports for subrecipients who meet the audit threshold and should adhere to all federal requirements when conducting monitoring over such subrecipients. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-107: Strengthen Controls over FFATA Reporting Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Health is not completing Federal Funding Accountability and Transparency Act (FFATA) reporting for the ELC and STLT federal grant programs. During our audit, we found that Epidemiology and OHE did not complete FFATA reporting submissions for subrecipients who received $30,000 or more in ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. Title 2 CFR Part 170 Appendix A, included in award documents signed by management, requires Health to report each obligating action, exceeding $30,000, to the FFATA Subaward Reporting System (FSRS). Health’s FFATA reporting policy, which Health last updated in 2014, states that all offices and districts that are recipients of federal grants and contracts shall adhere to all requirements of the FFATA and ensure timely and accurate reporting. Epidemiology and OHE have experienced turnover in key positions that were historically responsible for completing and submitting FFATA reports. In addition, OFM did not have a procedure in place to detect subawards that it should have reported to FSRS. Not reporting to FSRS could result in a citizen or federal official having a distorted view as to how Health is obligating federal funds. Epidemiology and OHE should ensure program personnel adhere to Health policies and procedures and fulfill FFATA reporting responsibilities by submitting required FFATA subaward reporting information by the due date and retaining documentation to support the submissions. Additionally, OFM should update and communicate the FFATA reporting policy to applicable offices and districts. Further, OFM should periodically analyze subaward records to determine if there are instances where program personnel are not submitting the required FFATA subaward reporting information. If so, OFM should collect this information from the applicable program personnel promptly to comply with the FFATA reporting requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-087: Review Subrecipient Audit Reports Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.331(d) Known Questioned Costs: $0 Health does not monitor subrecipients in accordance with federal regulations for the Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) and Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises federal grant programs. During our audit, we found that Health’s Office of Epidemiology (Epidemiology) and the Office of Health Equity (OHE) did not obtain and review a Single Audit or program-specific audit report for subrecipients who received $750,000 or more in subawards from ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. According to Title 2 U.S. Code of Federal Regulations (CFR) § 200.332(f), all pass-through entities must verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year will equal or exceed $750,000. Additionally, in the case of any findings, 2 CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Federal Audit Clearinghouse (Clearinghouse). Due to significant turnover in contract administrators responsible for subrecipient monitoring, Epidemiology and OHE were unable to provide evidence that staff reviewed Single Audit or program-specific audit reports for all subrecipients expending $750,000 or more during fiscal year 2024. In addition, OFM did not have a current subrecipient monitoring policy and procedure in place to detect subrecipients that met the audit threshold. Health last updated its subrecipient monitoring policy in 2014. Without obtaining the appropriate reports, Health is unable to show it is meeting the requirements set forth in 2 CFR part 200, subpart F, which includes issuing a management decision on audit findings within six months after receipt of the subrecipient’s audit report and ensuring that the subrecipient takes timely and appropriate corrective action on all audit findings. OFM should update its subrecipient monitoring policy and communicate the policy to the applicable offices and districts. In addition, OFM should periodically review the Clearinghouse to determine whether subrecipients who meet the audit threshold obtain the required audits, and that the applicable offices or districts are reviewing the audit reports and considering the impact of any deficiencies identified in audit findings. Epidemiology and OHE should ensure staff review Single Audit or program-specific audit reports for subrecipients who meet the audit threshold and should adhere to all federal requirements when conducting monitoring over such subrecipients. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-107: Strengthen Controls over FFATA Reporting Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Health is not completing Federal Funding Accountability and Transparency Act (FFATA) reporting for the ELC and STLT federal grant programs. During our audit, we found that Epidemiology and OHE did not complete FFATA reporting submissions for subrecipients who received $30,000 or more in ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. Title 2 CFR Part 170 Appendix A, included in award documents signed by management, requires Health to report each obligating action, exceeding $30,000, to the FFATA Subaward Reporting System (FSRS). Health’s FFATA reporting policy, which Health last updated in 2014, states that all offices and districts that are recipients of federal grants and contracts shall adhere to all requirements of the FFATA and ensure timely and accurate reporting. Epidemiology and OHE have experienced turnover in key positions that were historically responsible for completing and submitting FFATA reports. In addition, OFM did not have a procedure in place to detect subawards that it should have reported to FSRS. Not reporting to FSRS could result in a citizen or federal official having a distorted view as to how Health is obligating federal funds. Epidemiology and OHE should ensure program personnel adhere to Health policies and procedures and fulfill FFATA reporting responsibilities by submitting required FFATA subaward reporting information by the due date and retaining documentation to support the submissions. Additionally, OFM should update and communicate the FFATA reporting policy to applicable offices and districts. Further, OFM should periodically analyze subaward records to determine if there are instances where program personnel are not submitting the required FFATA subaward reporting information. If so, OFM should collect this information from the applicable program personnel promptly to comply with the FFATA reporting requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-087: Review Subrecipient Audit Reports Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.331(d) Known Questioned Costs: $0 Health does not monitor subrecipients in accordance with federal regulations for the Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) and Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises federal grant programs. During our audit, we found that Health’s Office of Epidemiology (Epidemiology) and the Office of Health Equity (OHE) did not obtain and review a Single Audit or program-specific audit report for subrecipients who received $750,000 or more in subawards from ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. According to Title 2 U.S. Code of Federal Regulations (CFR) § 200.332(f), all pass-through entities must verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year will equal or exceed $750,000. Additionally, in the case of any findings, 2 CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Federal Audit Clearinghouse (Clearinghouse). Due to significant turnover in contract administrators responsible for subrecipient monitoring, Epidemiology and OHE were unable to provide evidence that staff reviewed Single Audit or program-specific audit reports for all subrecipients expending $750,000 or more during fiscal year 2024. In addition, OFM did not have a current subrecipient monitoring policy and procedure in place to detect subrecipients that met the audit threshold. Health last updated its subrecipient monitoring policy in 2014. Without obtaining the appropriate reports, Health is unable to show it is meeting the requirements set forth in 2 CFR part 200, subpart F, which includes issuing a management decision on audit findings within six months after receipt of the subrecipient’s audit report and ensuring that the subrecipient takes timely and appropriate corrective action on all audit findings. OFM should update its subrecipient monitoring policy and communicate the policy to the applicable offices and districts. In addition, OFM should periodically review the Clearinghouse to determine whether subrecipients who meet the audit threshold obtain the required audits, and that the applicable offices or districts are reviewing the audit reports and considering the impact of any deficiencies identified in audit findings. Epidemiology and OHE should ensure staff review Single Audit or program-specific audit reports for subrecipients who meet the audit threshold and should adhere to all federal requirements when conducting monitoring over such subrecipients. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-107: Strengthen Controls over FFATA Reporting Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Health is not completing Federal Funding Accountability and Transparency Act (FFATA) reporting for the ELC and STLT federal grant programs. During our audit, we found that Epidemiology and OHE did not complete FFATA reporting submissions for subrecipients who received $30,000 or more in ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. Title 2 CFR Part 170 Appendix A, included in award documents signed by management, requires Health to report each obligating action, exceeding $30,000, to the FFATA Subaward Reporting System (FSRS). Health’s FFATA reporting policy, which Health last updated in 2014, states that all offices and districts that are recipients of federal grants and contracts shall adhere to all requirements of the FFATA and ensure timely and accurate reporting. Epidemiology and OHE have experienced turnover in key positions that were historically responsible for completing and submitting FFATA reports. In addition, OFM did not have a procedure in place to detect subawards that it should have reported to FSRS. Not reporting to FSRS could result in a citizen or federal official having a distorted view as to how Health is obligating federal funds. Epidemiology and OHE should ensure program personnel adhere to Health policies and procedures and fulfill FFATA reporting responsibilities by submitting required FFATA subaward reporting information by the due date and retaining documentation to support the submissions. Additionally, OFM should update and communicate the FFATA reporting policy to applicable offices and districts. Further, OFM should periodically analyze subaward records to determine if there are instances where program personnel are not submitting the required FFATA subaward reporting information. If so, OFM should collect this information from the applicable program personnel promptly to comply with the FFATA reporting requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-087: Review Subrecipient Audit Reports Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.331(d) Known Questioned Costs: $0 Health does not monitor subrecipients in accordance with federal regulations for the Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) and Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises federal grant programs. During our audit, we found that Health’s Office of Epidemiology (Epidemiology) and the Office of Health Equity (OHE) did not obtain and review a Single Audit or program-specific audit report for subrecipients who received $750,000 or more in subawards from ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. According to Title 2 U.S. Code of Federal Regulations (CFR) § 200.332(f), all pass-through entities must verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year will equal or exceed $750,000. Additionally, in the case of any findings, 2 CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Federal Audit Clearinghouse (Clearinghouse). Due to significant turnover in contract administrators responsible for subrecipient monitoring, Epidemiology and OHE were unable to provide evidence that staff reviewed Single Audit or program-specific audit reports for all subrecipients expending $750,000 or more during fiscal year 2024. In addition, OFM did not have a current subrecipient monitoring policy and procedure in place to detect subrecipients that met the audit threshold. Health last updated its subrecipient monitoring policy in 2014. Without obtaining the appropriate reports, Health is unable to show it is meeting the requirements set forth in 2 CFR part 200, subpart F, which includes issuing a management decision on audit findings within six months after receipt of the subrecipient’s audit report and ensuring that the subrecipient takes timely and appropriate corrective action on all audit findings. OFM should update its subrecipient monitoring policy and communicate the policy to the applicable offices and districts. In addition, OFM should periodically review the Clearinghouse to determine whether subrecipients who meet the audit threshold obtain the required audits, and that the applicable offices or districts are reviewing the audit reports and considering the impact of any deficiencies identified in audit findings. Epidemiology and OHE should ensure staff review Single Audit or program-specific audit reports for subrecipients who meet the audit threshold and should adhere to all federal requirements when conducting monitoring over such subrecipients. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-107: Strengthen Controls over FFATA Reporting Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Health is not completing Federal Funding Accountability and Transparency Act (FFATA) reporting for the ELC and STLT federal grant programs. During our audit, we found that Epidemiology and OHE did not complete FFATA reporting submissions for subrecipients who received $30,000 or more in ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. Title 2 CFR Part 170 Appendix A, included in award documents signed by management, requires Health to report each obligating action, exceeding $30,000, to the FFATA Subaward Reporting System (FSRS). Health’s FFATA reporting policy, which Health last updated in 2014, states that all offices and districts that are recipients of federal grants and contracts shall adhere to all requirements of the FFATA and ensure timely and accurate reporting. Epidemiology and OHE have experienced turnover in key positions that were historically responsible for completing and submitting FFATA reports. In addition, OFM did not have a procedure in place to detect subawards that it should have reported to FSRS. Not reporting to FSRS could result in a citizen or federal official having a distorted view as to how Health is obligating federal funds. Epidemiology and OHE should ensure program personnel adhere to Health policies and procedures and fulfill FFATA reporting responsibilities by submitting required FFATA subaward reporting information by the due date and retaining documentation to support the submissions. Additionally, OFM should update and communicate the FFATA reporting policy to applicable offices and districts. Further, OFM should periodically analyze subaward records to determine if there are instances where program personnel are not submitting the required FFATA subaward reporting information. If so, OFM should collect this information from the applicable program personnel promptly to comply with the FFATA reporting requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-083: Ensure Subaward Agreements Meet Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(a)(1) Known Questioned Costs: $0 Social Services does not include all information required by federal regulations in its subaward renewal agreements. We tested 20 subaward renewal agreements and noted that all of them did not contain one or more of the elements required by 2 CFR § 200.332(a)(1). Specifically, we noted the following instances of non-compliance in these subaward renewal agreements: Social Services did not include the correct Federal Award Identification Number (FAIN) in 15 of the 20 (75%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iii). Social Services did not include the federal award date in eight of the 20 (40%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iv). Social Services did not update the federal award date in 12 of the 20 (60%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iv). Social Services did not include the FAIN in five of the 20 (25%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iii). Social Services did not include the amount of federal funds obligated in the subaward in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(vii). Social Services did not include the subrecipient’s unique entity identifier in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(ii). Social Services did not include the contact information for the awarding official of the pass-through entity in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xi). Social Services did not identify whether the federal award was for research and development in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xiii). Social Services did not include the federal award project description in two of the 20 (10%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(x). Social Services did not accurately report the name of the federal awarding agency in two of the 20 (10%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xi). Social Services did not include the Assistance Listing Number in one of the 20 (5%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xii). Social Services did not identify the indirect cost rate for the federal award in one of the 20 (5%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xiv). During fiscal year 2024, Social Services disbursed approximately $46 million in federal funds from the TANF federal grant program through 238 subawards. While Social Services communicates federal award information to subgrantees, it does not consistently communicate all of the federal grant award information required in its subaward renewal agreements. The Contract and Procurement team within Social Services’ Division of General Services works collaboratively with grants administrators when preparing subaward agreements. However, the Contract and Procurement team has experienced turnover over the last several years and has lost institutional knowledge in some of its key positions as it pertains to federal grant requirements. Additionally, the Contract and Procurement team does not consistently retain all incorporated attachments in the subaward agreement. Compliance is responsible for ensuring that the agency adheres to federal regulations in 2 CFR § 200.332 through its Agency Monitoring Plan; however, Compliance was not aware of these instances of non-compliance because it was not involved in the preparation of the subaward agreements. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps ensure adherence to state and federal legal and regulatory standards. Because of the lack of agency-wide collaboration, there were inconsistencies in the information included in the subaward agreements. Without communicating the required federal award information, Social Services increases the risk that subrecipients are unaware of the source of the funding and the applicable requirements, which increases the potential for unallowable costs and non-compliance with federal requirements. Compliance should work collaboratively with the Contract and Procurement team and grants administrators to ensure that subaward agreements include all information required by federal regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-084: Review Non-Locality Subrecipient Single Audit Reports Applicable to: Department of Social Services Prior Year Finding Number: 2023-098; 2022-013; 2021-072; 2020-075; 2019-091; 2018-092 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d)(3); 2 CFR § 200.332(f) Known Questioned Costs: $0 Compliance continues to not review non-locality subrecipient Single Audit reports as set forth within its Agency Monitoring Plan. Non-locality subrecipients are subrecipients who are not local governments and are mainly comprised of non-profit organizations. During fiscal year 2024, Social Services disbursed approximately $107 million in federal funds to 244 non-locality subrecipients. While reviewing the Single Audit reports submitted to the Federal Audit Clearinghouse (Clearinghouse) for the most recent audit period for the 27 non-locality subrecipients that received more than $750,000 in federal funds from Social Services during state fiscal year 2024, we noted the following: Six non-locality subrecipients (22%) did not have a Single Audit report available in the Clearinghouse for the most recent audit period. Of the six non-locality subrecipients, three appeared to have never submitted a Single Audit report to the Clearinghouse. Title 2 CFR § 200.332(f) requires pass-through entities to verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year equaled or exceeded $750,000. Three non-locality subrecipients (11%) had audit findings that affected at least one of Social Services’ federal grant programs. One of the non-locality subrecipient auditors identified $82,253 in known questioned costs as the non-locality subrecipient did not maintain proper documentation to support payroll charges to the TANF federal grant program. Title 2 U.S. CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Clearinghouse. A management decision is Social Services’ written determination, provided to its subrecipient, of the adequacy of the subrecipient’s proposed corrective actions to address the audit findings, based on Social Services’ evaluation of the audit findings, including determining if the questioned costs are disallowed and need to be repaid to the federal awarding agency, and proposed corrective actions. As part of its planned corrective action, Compliance stated that it intends to procure a grants management system with subrecipient monitoring capabilities necessary to comply with federal requirements and has worked with Social Services’ Executive Team to secure funding. However, Compliance has yet to establish a timeline for when it intends for the solution to be fully functional. Additionally, Compliance has not evaluated what alternative corrective actions are available to become compliant. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps ensure adherence to state and federal legal and regulatory standards. Additionally, Social Services’ Agency Monitoring Plan assigns the responsibility to Compliance for overseeing the agency’s subrecipient monitoring process. Without verifying whether non-locality subrecipients received a Single Audit, Compliance is unable to assure Social Services’ Executive Team that it is fulfilling the pass-through entity responsibilities in 2 CFR § 200.332. Not complying with federal regulations could result in federal awarding agencies temporarily withholding payments until it takes corrective action, disallowing costs for all or part of the activity associated with the noncompliance, suspending, or terminating the federal award in part or in its entirety, initiating initial suspension or debarment proceedings, and/or withholding further federal funds for the project or program. Further, Social Services may be unaware of a potential liability to the Commonwealth by not reviewing the non-locality Single Audit reports. Compliance should consider exploring alternative corrective actions as it continues to develop and implement its grants management system, such as obtaining a list of non-locality subrecipients from its internal accounting system and reviewing the Single Audit reports in the Clearinghouse. Evaluating alternative corrective actions to become compliant with federal regulations will help Social Services mitigate the risks of incurring federal sanctions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-101: Implement Internal Controls over TANF Federal Performance Reporting Applicable to: Department of Social Services Prior Year Finding Number: 2023-105; 2022-103 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 45 CFR § 265.7(b) Known Questioned Costs: $0 Benefit Programs does not have adequate internal controls in place to ensure accurate reporting in the ACF-199 and ACF-209 performance reports. The ACF requires Social Services to submit this data to ACF quarterly, and ACF uses the data to determine whether the Commonwealth met the minimum work participation requirements for the TANF federal grant program. Benefit Programs uses a third-party service provider to produce the ACF-199 and ACF-209 reports and relies solely on their internal controls during the data extraction and data reporting process. Since the prior audit, Benefit Programs has worked with its service provider to analyze the reporting errors to determine the cause and appropriate actions to resolve these errors. However, because of the extent of its corrective actions, Benefit Programs has not fully implemented all of its corrective actions and continues to rely on ACF’s error correction controls, performed after report submission, to obtain assurance over the accuracy of the data included in its submissions. We audited 60 cases and identified 19 instances (32%) where the third-party service provider did not report key line-item information accurately based on the data Social Services maintains in its case management system or other supporting data and Benefit Programs did not detect or correct these errors before the third-party service provider submitted the data to ACF. Specifically, we noted that Benefit Programs did not accurately report on the following key line items: Benefit Programs did not accurately report on the “Work Participation Status” key line item for 13 out of 60 (22%) cases tested during the audit. Benefit Programs did not accurately report on the “Receives Subsidized Child Care” key line item for four out of 31 (13%) cases tested during the audit. Benefit Programs did not accurately report on the “Hours of Participation” key line item for four out of 60 (7%) cases tested during the audit. Benefit Programs did not accurately report on the “Work Eligibility Individual Indicator” key line item for two out of 60 (3%) cases tested during the audit. Benefit Programs did not accurately report on the “Number of Months Countable Toward Federal Time Clock” key line item for two out of 56 (4%) cases tested during the audit. Benefit Programs did not accurately report on the “Type of Family for Work Participation” key line item for two out of 60 (3%) cases tested during the audit. Benefit Programs did not accurately report on the “Parent with Minor Child” key line item for one out of 56 (2%) cases tested during the audit. Benefit Programs did not accurately report on the “Unsubsidized Employment” key line item for one out of 60 (2%) cases tested during the audit. Additionally, because of the lack of internal control over the ACF-199 and ACF-209 federal reports, Benefit Programs did not identify that the ACF revised the reporting specifications in November 2023 for certain key line items. Although ACF provided administering agencies with nearly a year to implement the new reporting specifications, Benefit Programs has not yet initiated discussions with its service provider to bring its current reporting model in line with the new reporting specifications. Therefore, there is risk that Social Services will continue to report inaccurate information to ACF going forward without working with its service provider to implement the new reporting specifications. Title 45 CFR § 265.7(b) requires States to have complete and accurate reports, which means that the reported data accurately reflects information available in case records, are free of computational errors, and are internally consistent. Additionally, 2 CFR § 303(a) requires that Social Services establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the recipient or subrecipient is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Reporting potentially inaccurate or incomplete information prevents the ACF from adequately monitoring Social Services’ work participation rates and the overall performance for the TANF federal grant program. Further, ACF can impose a penalty if it finds Social Services did not meet statutory required work participation rates. Because of the scope of this matter and errors noted above, we consider it to be a material weakness in internal control. Additionally, we believe this matter represents material noncompliance since Social Services did not comply with the provisions at 45 CFR § 265.7(b). Benefit Programs should implement internal controls over the TANF federal performance reporting process and include a documented secondary review process of the service providers’ data for which it should complete prior to the report submission. Additionally, Benefit Programs should develop a process to track changes to the reporting specifications and communicate the changes to the service provider in advance of the applicable implementation date. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-102: Implement Internal Controls over TANF Federal Special Reporting Applicable to: Department of Social Services Prior Year Finding Number: 2023-106 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR § 200.303(a) Known Questioned Costs: $0 Benefit Programs has not documented its process for preparing the ACF’s Annual Report on State MOE Programs (ACF-204) for the TANF federal grant program. ACF requires Social Services submit this data annually and uses the information in reports to Congress about how TANF programs are evolving, in assessing State and Territory MOE expenditures, and in assessing the need for legislative changes. Title 2 CFR § 200.303(a) requires the non-federal entity to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the recipient is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. During fiscal year 2024, Benefit Programs performed an analysis of ACF-204 reporting errors identified during the prior audit to determine causality and has taken actions to resolve those errors. Additionally, Benefit Programs created a systems modification request to correct errors that it identified as occurring due to inaccurate programming in the data modification phase of the federal report creation. However, Benefit Programs has not yet documented its processes for preparing the ACF-204 report through a written policy and procedure. Documented policies and procedures will help Social Services maintain continuity with its processes to comply with laws and regulations. Without documented policies and procedures, there is a risk that Social Services could report inaccurate information to the federal government that could lead to Social Services incurring fines and/or penalties. Benefit Programs should dedicate the necessary resources to document its processes for preparing the ACF-204 report to ensure reasonably accurate reporting of TANF MOE Programs to ACF in accordance with the ACF-204 reporting instructions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-103: Monitor Case Management System Records to Ensure Compliance with TANF Eligibility Requirements Applicable to: Department of Social Services Prior Year Finding Number: 2023-103 Type of Finding: Compliance Severity of Deficiency: N/A Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Eligibility - 8 USC § 1611; 42 USC § 604(a)(1); 42 USC § 608(a)(3); 42 USC § 608(a)(10); 45 CFR § 261.13; 45 CFR § 263.2(b)(2) Known Questioned Costs: $6,968 Social Services did not comply with certain federal eligibility requirements for the TANF federal grant program, resulting in known questioned costs of $6,968. The TANF federal grant program provided over $89 million in assistance to approximately 26,000 needy families during fiscal year 2024. During the audit, we reperformed the eligibility determinations for all needy families that received assistance during the fiscal year and identified 24 instances (<1%) where the facts in the recipient's case record did not support the eligibility determination. Specifically: For 14 payments, Social Services did not properly evaluate whether individuals were already counted as eligible for TANF benefits under an existing case which allowed these individuals to receive multiple benefit payments in excess of its Standards of Assistance and maximum program benefit amounts. Title 42 United States Code (USC) § 604(a)(1) mandates that a state may use the grant in any manner that is reasonably calculated to accomplish the purpose of TANF where Social Services’ reasonable calculation is defined by its Standard of Assistance and maximum program benefit amounts within its TANF Program Manual. For five payments, Social Services did not properly assign to the state the rights that the family member may have for child support in which recipients were underpaid in their benefit amount. Title 42 USC § 608(a)(3) mandates that the state shall require that, as a condition of providing assistance, a member of the family assigned to the state the rights the family member may have for support from any other person and this assignment may not exceed the amount of assistance provided by the state. For one payment, Social Services did not properly evaluate the income eligibility of the case. Title 45 CFR § 263.2(b)(2) defines financially “needy” as financially eligible according to the state’s quantified income and resource criteria, which Social Services quantifies through its TANF Manual as maximum income charts in Section 305, Appendix 1. For one payment, Social Services did not properly evaluate the extended absence of a child or adult to the case. Title 42 USC § 608(a)(10) mandates that a state shall not use any part of the grant to provide assistance to a minor child who has been absent from the home for a period of 45 consecutive days. For two payments, Social Services did not properly reduce or terminate assistance for individuals not complying with the Commonwealth’s work requirements for the TANF program. Title 45 CFR § 261.13 mandates that if an individual in a family receiving assistance refuses to engage in required work without good cause, a state must reduce assistance to the family, at least pro rata, with respect to any period during the month in which the individual refuses or may terminate assistance. For one payment, Social Services did not properly evaluate the qualified alien status of the case as required by 8 USC § 1611. Social Services relies on its case management system to properly determine eligibility, correctly calculate benefit payments, and achieve the federal requirements of the TANF federal grant program. Of the exceptions noted above, five of the 24 (21%) were the result of local Social Services eligibility workers mistakenly reporting child support payments as unearned revenue beyond the acceptable timeframe instead of assigning these payments to the Commonwealth for referral to the Division of Child Support Enforcement, as required by the USC. The remaining 19 exceptions (79%) resulted from local Social Services eligibility workers not including sufficient documentation to justify the rationale for their eligibility determinations. Social Services did not identify these exceptions because it did not have a mechanism to identify risky transactions in its case management system that deviate from its normal practices and require further follow-up. Non-compliance with these provisions increases Social Services’ risk of incurring disallowed costs and having to repay grant funds to the federal government. Social Services should continue to provide additional training to local Social Services eligibility workers on how to properly determine and document eligibility determinations in its case management system. Additionally, Social Services should consider implementing a data-driven approach to monitor and analyze data from its case management system to identify risky transactions that deviate from its normal practices. By providing additional training and implementing additional risk-based data analytics, Social Services will be able to ensure that the facts in the applicant’s or recipient’s case record supports each decision in its case management system regarding eligibility and complies with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-106: Strengthen Internal Controls over FFATA Reporting Applicable to: Department of Social Services Prior Year Finding Number: 2023-107; 2022-106 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Finance is not maintaining adequate internal control over Federal Funding Accountability and Transparency Act (FFATA) reporting. FFATA reporting is intended to provide full disclosure of how entities and organizations are obligating federal funds. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds from roughly 5,300 subawards. While auditing FFATA reporting for the TANF federal grant program, we noted that Finance did not file any FFATA reports for its subrecipients. Social Services awarded over $72 million in nearly 300 new TANF subawards during fiscal year 2024. Title 2 CFR Part 170 Appendix A requires the non-federal entity to report each obligating action that equals or exceeds $30,000 to the FFATA Subaward Reporting System (FSRS) by the end of the month following the obligating action. This also applies to any subaward modifications that increase the amount to equal or exceed $30,000. Finally, 2 CFR § 200.303(a) states that the non-federal entity must establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the non-federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Finance uses a decentralized approach to fulfil its FFATA reporting responsibilities since it does not determine which subrecipients will receive federal funding. Since there is an elevated risk that Finance will not report all subaward information to FSRS, it has obtained a report of subrecipients from its financial reporting system and identified those who spent $30,000 or more in TANF funds during fiscal year 2024. However, Finance management did not compare this report to its FSRS submissions to verify that the agency submitted the submissions accurately and timely. As a result, Finance management did not recognize that it did not comply with the FFATA reporting requirements. When Social Services does not upload all obligating actions meeting the reporting threshold to FSRS as required, a citizen or federal official may have a distorted view as to how Social Services is obligating federal funds. Finance management should provide sufficient oversight to confirm that the agency is submitting FFATA reporting submissions timely. Specifically, Finance management should periodically compare the report of subrecipients from its financial reporting system to FSRS to ensure it is reporting all subawards to FSRS and escalate any concerns that hinder its ability to comply with federal regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-083: Ensure Subaward Agreements Meet Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(a)(1) Known Questioned Costs: $0 Social Services does not include all information required by federal regulations in its subaward renewal agreements. We tested 20 subaward renewal agreements and noted that all of them did not contain one or more of the elements required by 2 CFR § 200.332(a)(1). Specifically, we noted the following instances of non-compliance in these subaward renewal agreements: Social Services did not include the correct Federal Award Identification Number (FAIN) in 15 of the 20 (75%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iii). Social Services did not include the federal award date in eight of the 20 (40%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iv). Social Services did not update the federal award date in 12 of the 20 (60%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iv). Social Services did not include the FAIN in five of the 20 (25%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iii). Social Services did not include the amount of federal funds obligated in the subaward in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(vii). Social Services did not include the subrecipient’s unique entity identifier in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(ii). Social Services did not include the contact information for the awarding official of the pass-through entity in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xi). Social Services did not identify whether the federal award was for research and development in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xiii). Social Services did not include the federal award project description in two of the 20 (10%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(x). Social Services did not accurately report the name of the federal awarding agency in two of the 20 (10%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xi). Social Services did not include the Assistance Listing Number in one of the 20 (5%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xii). Social Services did not identify the indirect cost rate for the federal award in one of the 20 (5%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xiv). During fiscal year 2024, Social Services disbursed approximately $46 million in federal funds from the TANF federal grant program through 238 subawards. While Social Services communicates federal award information to subgrantees, it does not consistently communicate all of the federal grant award information required in its subaward renewal agreements. The Contract and Procurement team within Social Services’ Division of General Services works collaboratively with grants administrators when preparing subaward agreements. However, the Contract and Procurement team has experienced turnover over the last several years and has lost institutional knowledge in some of its key positions as it pertains to federal grant requirements. Additionally, the Contract and Procurement team does not consistently retain all incorporated attachments in the subaward agreement. Compliance is responsible for ensuring that the agency adheres to federal regulations in 2 CFR § 200.332 through its Agency Monitoring Plan; however, Compliance was not aware of these instances of non-compliance because it was not involved in the preparation of the subaward agreements. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps ensure adherence to state and federal legal and regulatory standards. Because of the lack of agency-wide collaboration, there were inconsistencies in the information included in the subaward agreements. Without communicating the required federal award information, Social Services increases the risk that subrecipients are unaware of the source of the funding and the applicable requirements, which increases the potential for unallowable costs and non-compliance with federal requirements. Compliance should work collaboratively with the Contract and Procurement team and grants administrators to ensure that subaward agreements include all information required by federal regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-084: Review Non-Locality Subrecipient Single Audit Reports Applicable to: Department of Social Services Prior Year Finding Number: 2023-098; 2022-013; 2021-072; 2020-075; 2019-091; 2018-092 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d)(3); 2 CFR § 200.332(f) Known Questioned Costs: $0 Compliance continues to not review non-locality subrecipient Single Audit reports as set forth within its Agency Monitoring Plan. Non-locality subrecipients are subrecipients who are not local governments and are mainly comprised of non-profit organizations. During fiscal year 2024, Social Services disbursed approximately $107 million in federal funds to 244 non-locality subrecipients. While reviewing the Single Audit reports submitted to the Federal Audit Clearinghouse (Clearinghouse) for the most recent audit period for the 27 non-locality subrecipients that received more than $750,000 in federal funds from Social Services during state fiscal year 2024, we noted the following: Six non-locality subrecipients (22%) did not have a Single Audit report available in the Clearinghouse for the most recent audit period. Of the six non-locality subrecipients, three appeared to have never submitted a Single Audit report to the Clearinghouse. Title 2 CFR § 200.332(f) requires pass-through entities to verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year equaled or exceeded $750,000. Three non-locality subrecipients (11%) had audit findings that affected at least one of Social Services’ federal grant programs. One of the non-locality subrecipient auditors identified $82,253 in known questioned costs as the non-locality subrecipient did not maintain proper documentation to support payroll charges to the TANF federal grant program. Title 2 U.S. CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Clearinghouse. A management decision is Social Services’ written determination, provided to its subrecipient, of the adequacy of the subrecipient’s proposed corrective actions to address the audit findings, based on Social Services’ evaluation of the audit findings, including determining if the questioned costs are disallowed and need to be repaid to the federal awarding agency, and proposed corrective actions. As part of its planned corrective action, Compliance stated that it intends to procure a grants management system with subrecipient monitoring capabilities necessary to comply with federal requirements and has worked with Social Services’ Executive Team to secure funding. However, Compliance has yet to establish a timeline for when it intends for the solution to be fully functional. Additionally, Compliance has not evaluated what alternative corrective actions are available to become compliant. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps ensure adherence to state and federal legal and regulatory standards. Additionally, Social Services’ Agency Monitoring Plan assigns the responsibility to Compliance for overseeing the agency’s subrecipient monitoring process. Without verifying whether non-locality subrecipients received a Single Audit, Compliance is unable to assure Social Services’ Executive Team that it is fulfilling the pass-through entity responsibilities in 2 CFR § 200.332. Not complying with federal regulations could result in federal awarding agencies temporarily withholding payments until it takes corrective action, disallowing costs for all or part of the activity associated with the noncompliance, suspending, or terminating the federal award in part or in its entirety, initiating initial suspension or debarment proceedings, and/or withholding further federal funds for the project or program. Further, Social Services may be unaware of a potential liability to the Commonwealth by not reviewing the non-locality Single Audit reports. Compliance should consider exploring alternative corrective actions as it continues to develop and implement its grants management system, such as obtaining a list of non-locality subrecipients from its internal accounting system and reviewing the Single Audit reports in the Clearinghouse. Evaluating alternative corrective actions to become compliant with federal regulations will help Social Services mitigate the risks of incurring federal sanctions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-101: Implement Internal Controls over TANF Federal Performance Reporting Applicable to: Department of Social Services Prior Year Finding Number: 2023-105; 2022-103 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 45 CFR § 265.7(b) Known Questioned Costs: $0 Benefit Programs does not have adequate internal controls in place to ensure accurate reporting in the ACF-199 and ACF-209 performance reports. The ACF requires Social Services to submit this data to ACF quarterly, and ACF uses the data to determine whether the Commonwealth met the minimum work participation requirements for the TANF federal grant program. Benefit Programs uses a third-party service provider to produce the ACF-199 and ACF-209 reports and relies solely on their internal controls during the data extraction and data reporting process. Since the prior audit, Benefit Programs has worked with its service provider to analyze the reporting errors to determine the cause and appropriate actions to resolve these errors. However, because of the extent of its corrective actions, Benefit Programs has not fully implemented all of its corrective actions and continues to rely on ACF’s error correction controls, performed after report submission, to obtain assurance over the accuracy of the data included in its submissions. We audited 60 cases and identified 19 instances (32%) where the third-party service provider did not report key line-item information accurately based on the data Social Services maintains in its case management system or other supporting data and Benefit Programs did not detect or correct these errors before the third-party service provider submitted the data to ACF. Specifically, we noted that Benefit Programs did not accurately report on the following key line items: Benefit Programs did not accurately report on the “Work Participation Status” key line item for 13 out of 60 (22%) cases tested during the audit. Benefit Programs did not accurately report on the “Receives Subsidized Child Care” key line item for four out of 31 (13%) cases tested during the audit. Benefit Programs did not accurately report on the “Hours of Participation” key line item for four out of 60 (7%) cases tested during the audit. Benefit Programs did not accurately report on the “Work Eligibility Individual Indicator” key line item for two out of 60 (3%) cases tested during the audit. Benefit Programs did not accurately report on the “Number of Months Countable Toward Federal Time Clock” key line item for two out of 56 (4%) cases tested during the audit. Benefit Programs did not accurately report on the “Type of Family for Work Participation” key line item for two out of 60 (3%) cases tested during the audit. Benefit Programs did not accurately report on the “Parent with Minor Child” key line item for one out of 56 (2%) cases tested during the audit. Benefit Programs did not accurately report on the “Unsubsidized Employment” key line item for one out of 60 (2%) cases tested during the audit. Additionally, because of the lack of internal control over the ACF-199 and ACF-209 federal reports, Benefit Programs did not identify that the ACF revised the reporting specifications in November 2023 for certain key line items. Although ACF provided administering agencies with nearly a year to implement the new reporting specifications, Benefit Programs has not yet initiated discussions with its service provider to bring its current reporting model in line with the new reporting specifications. Therefore, there is risk that Social Services will continue to report inaccurate information to ACF going forward without working with its service provider to implement the new reporting specifications. Title 45 CFR § 265.7(b) requires States to have complete and accurate reports, which means that the reported data accurately reflects information available in case records, are free of computational errors, and are internally consistent. Additionally, 2 CFR § 303(a) requires that Social Services establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the recipient or subrecipient is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Reporting potentially inaccurate or incomplete information prevents the ACF from adequately monitoring Social Services’ work participation rates and the overall performance for the TANF federal grant program. Further, ACF can impose a penalty if it finds Social Services did not meet statutory required work participation rates. Because of the scope of this matter and errors noted above, we consider it to be a material weakness in internal control. Additionally, we believe this matter represents material noncompliance since Social Services did not comply with the provisions at 45 CFR § 265.7(b). Benefit Programs should implement internal controls over the TANF federal performance reporting process and include a documented secondary review process of the service providers’ data for which it should complete prior to the report submission. Additionally, Benefit Programs should develop a process to track changes to the reporting specifications and communicate the changes to the service provider in advance of the applicable implementation date. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-102: Implement Internal Controls over TANF Federal Special Reporting Applicable to: Department of Social Services Prior Year Finding Number: 2023-106 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR § 200.303(a) Known Questioned Costs: $0 Benefit Programs has not documented its process for preparing the ACF’s Annual Report on State MOE Programs (ACF-204) for the TANF federal grant program. ACF requires Social Services submit this data annually and uses the information in reports to Congress about how TANF programs are evolving, in assessing State and Territory MOE expenditures, and in assessing the need for legislative changes. Title 2 CFR § 200.303(a) requires the non-federal entity to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the recipient is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. During fiscal year 2024, Benefit Programs performed an analysis of ACF-204 reporting errors identified during the prior audit to determine causality and has taken actions to resolve those errors. Additionally, Benefit Programs created a systems modification request to correct errors that it identified as occurring due to inaccurate programming in the data modification phase of the federal report creation. However, Benefit Programs has not yet documented its processes for preparing the ACF-204 report through a written policy and procedure. Documented policies and procedures will help Social Services maintain continuity with its processes to comply with laws and regulations. Without documented policies and procedures, there is a risk that Social Services could report inaccurate information to the federal government that could lead to Social Services incurring fines and/or penalties. Benefit Programs should dedicate the necessary resources to document its processes for preparing the ACF-204 report to ensure reasonably accurate reporting of TANF MOE Programs to ACF in accordance with the ACF-204 reporting instructions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-103: Monitor Case Management System Records to Ensure Compliance with TANF Eligibility Requirements Applicable to: Department of Social Services Prior Year Finding Number: 2023-103 Type of Finding: Compliance Severity of Deficiency: N/A Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Eligibility - 8 USC § 1611; 42 USC § 604(a)(1); 42 USC § 608(a)(3); 42 USC § 608(a)(10); 45 CFR § 261.13; 45 CFR § 263.2(b)(2) Known Questioned Costs: $6,968 Social Services did not comply with certain federal eligibility requirements for the TANF federal grant program, resulting in known questioned costs of $6,968. The TANF federal grant program provided over $89 million in assistance to approximately 26,000 needy families during fiscal year 2024. During the audit, we reperformed the eligibility determinations for all needy families that received assistance during the fiscal year and identified 24 instances (<1%) where the facts in the recipient's case record did not support the eligibility determination. Specifically: For 14 payments, Social Services did not properly evaluate whether individuals were already counted as eligible for TANF benefits under an existing case which allowed these individuals to receive multiple benefit payments in excess of its Standards of Assistance and maximum program benefit amounts. Title 42 United States Code (USC) § 604(a)(1) mandates that a state may use the grant in any manner that is reasonably calculated to accomplish the purpose of TANF where Social Services’ reasonable calculation is defined by its Standard of Assistance and maximum program benefit amounts within its TANF Program Manual. For five payments, Social Services did not properly assign to the state the rights that the family member may have for child support in which recipients were underpaid in their benefit amount. Title 42 USC § 608(a)(3) mandates that the state shall require that, as a condition of providing assistance, a member of the family assigned to the state the rights the family member may have for support from any other person and this assignment may not exceed the amount of assistance provided by the state. For one payment, Social Services did not properly evaluate the income eligibility of the case. Title 45 CFR § 263.2(b)(2) defines financially “needy” as financially eligible according to the state’s quantified income and resource criteria, which Social Services quantifies through its TANF Manual as maximum income charts in Section 305, Appendix 1. For one payment, Social Services did not properly evaluate the extended absence of a child or adult to the case. Title 42 USC § 608(a)(10) mandates that a state shall not use any part of the grant to provide assistance to a minor child who has been absent from the home for a period of 45 consecutive days. For two payments, Social Services did not properly reduce or terminate assistance for individuals not complying with the Commonwealth’s work requirements for the TANF program. Title 45 CFR § 261.13 mandates that if an individual in a family receiving assistance refuses to engage in required work without good cause, a state must reduce assistance to the family, at least pro rata, with respect to any period during the month in which the individual refuses or may terminate assistance. For one payment, Social Services did not properly evaluate the qualified alien status of the case as required by 8 USC § 1611. Social Services relies on its case management system to properly determine eligibility, correctly calculate benefit payments, and achieve the federal requirements of the TANF federal grant program. Of the exceptions noted above, five of the 24 (21%) were the result of local Social Services eligibility workers mistakenly reporting child support payments as unearned revenue beyond the acceptable timeframe instead of assigning these payments to the Commonwealth for referral to the Division of Child Support Enforcement, as required by the USC. The remaining 19 exceptions (79%) resulted from local Social Services eligibility workers not including sufficient documentation to justify the rationale for their eligibility determinations. Social Services did not identify these exceptions because it did not have a mechanism to identify risky transactions in its case management system that deviate from its normal practices and require further follow-up. Non-compliance with these provisions increases Social Services’ risk of incurring disallowed costs and having to repay grant funds to the federal government. Social Services should continue to provide additional training to local Social Services eligibility workers on how to properly determine and document eligibility determinations in its case management system. Additionally, Social Services should consider implementing a data-driven approach to monitor and analyze data from its case management system to identify risky transactions that deviate from its normal practices. By providing additional training and implementing additional risk-based data analytics, Social Services will be able to ensure that the facts in the applicant’s or recipient’s case record supports each decision in its case management system regarding eligibility and complies with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-106: Strengthen Internal Controls over FFATA Reporting Applicable to: Department of Social Services Prior Year Finding Number: 2023-107; 2022-106 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Finance is not maintaining adequate internal control over Federal Funding Accountability and Transparency Act (FFATA) reporting. FFATA reporting is intended to provide full disclosure of how entities and organizations are obligating federal funds. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds from roughly 5,300 subawards. While auditing FFATA reporting for the TANF federal grant program, we noted that Finance did not file any FFATA reports for its subrecipients. Social Services awarded over $72 million in nearly 300 new TANF subawards during fiscal year 2024. Title 2 CFR Part 170 Appendix A requires the non-federal entity to report each obligating action that equals or exceeds $30,000 to the FFATA Subaward Reporting System (FSRS) by the end of the month following the obligating action. This also applies to any subaward modifications that increase the amount to equal or exceed $30,000. Finally, 2 CFR § 200.303(a) states that the non-federal entity must establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the non-federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Finance uses a decentralized approach to fulfil its FFATA reporting responsibilities since it does not determine which subrecipients will receive federal funding. Since there is an elevated risk that Finance will not report all subaward information to FSRS, it has obtained a report of subrecipients from its financial reporting system and identified those who spent $30,000 or more in TANF funds during fiscal year 2024. However, Finance management did not compare this report to its FSRS submissions to verify that the agency submitted the submissions accurately and timely. As a result, Finance management did not recognize that it did not comply with the FFATA reporting requirements. When Social Services does not upload all obligating actions meeting the reporting threshold to FSRS as required, a citizen or federal official may have a distorted view as to how Social Services is obligating federal funds. Finance management should provide sufficient oversight to confirm that the agency is submitting FFATA reporting submissions timely. Specifically, Finance management should periodically compare the report of subrecipients from its financial reporting system to FSRS to ensure it is reporting all subawards to FSRS and escalate any concerns that hinder its ability to comply with federal regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-104: Implement Internal Controls over LIHEAP Federal Special Reporting Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VALIEA - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR § 200.303(a); 45 CFR § 96.82(a) Known Questioned Costs: $0 Benefit Programs has not documented its processes for preparing and verifying the information reported in the LIHEAP federal grant program’s Annual Household Report. The federal government requires Social Services to annually submit this data and uses this information to provide reports to Congress for assessing the uses of funds for the assistance of households in need. Benefit Programs uses a third-party service provider to produce data reports from its case management system that program staff use to populate the LIHEAP Annual Household Report and Benefit Programs relies on the third-party service provider’s internal controls during the data extraction process. Benefit Programs could not substantiate the information reported for four out of seven (57%) of the line items in Section I - Number of assisted households of the most recent LIHEAP Annual Household Report. Specifically, we noted the following inconsistencies: Benefit Programs reported 2,571 households assisted on the Emergency Furnace Repair and Replacement line, which is 12 percent higher than the information in the case management system. Benefit Programs reported 118,347 households assisted on the Any Type of LIHEAP Assistance line, which is 21 percent lower than the information in the case management system. Benefit Programs reported 117,274 households assisted on the Bill Payment Assistance line, which is 20 percent higher than the information in the case management system. Benefit Programs could not provide support to substantiate the Weatherization line. Title 2 CFR § 200.303(a) requires the non-federal entity to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the recipient is managing the federal award in compliance with federal statutes, regulations, and its terms and conditions. Further, 45 CFR § 96.82(a) requires each grantee, whether a State or an insular area, that receives an annual allotment of at least $200,000 to submit this data for the 12-month period preceding the federal fiscal year in which the grantee requests the funds. The grantee must report the data separately for LIHEAP heating, cooling, crisis, and weatherization assistance. If Social Services does not submit this report properly, ACF may not grant them their LIHEAP grant allotment as per 45 CFR § 96.82(c). Benefit Programs has not dedicated the necessary resources to document its processes for preparing the LIHEAP Annual Household Report. Documented policies and procedures will help Social Services maintain continuity with its processes to comply with laws and regulations. Without documented policies and procedures, there is a risk that Social Services could report inaccurate information to the federal government that could lead to Social Services incurring fines and/or penalties. Additionally, reporting potentially inaccurate information prevents the federal government from adequately monitoring Social Services’ overall performance for the LIHEAP federal grant program. Therefore, Benefit Programs should dedicate the necessary resources to document its processes for preparing the LIHEAP Annual Household Report, including the processes used to verify the data provided by its third-party service provider. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-105: Monitor Case Management System Records to Ensure Compliance with LIHEAP Eligibility Requirements Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Compliance Severity of Deficiency: N/A Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VALIEA - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Eligibility - 42 USC § 8624(b)(10) Known Questioned Costs: $6,569 Social Services did not comply with certain federal eligibility requirements for the LIHEAP federal grant program, resulting in known questioned costs of $6,569. Social Services provided over $114 million in assistance to approximately 215,000 needy families during fiscal year 2024 through the LIHEAP federal grant program. During the audit, we reperformed the eligibility determinations for all needy families that received assistance during the fiscal year and identified 12 instances (<1%) where individuals applied for benefits more than once and received benefit payments in excess of Social Services’ maximum benefit amounts. Social Services relies on its case management system to ensure it determines eligibility properly, calculates benefit payments correctly, and complies with the federal and state laws and regulations. However, Social Services’ case management system does not prevent eligibility workers from authorizing individuals on multiple cases but instead provides a warning message for which they could choose to ignore. Additionally, Social Services does not have a mechanism to detect when an individual has received benefits from multiple cases and/or received benefit payments in excess of its maximum benefit amount. Title 42 USC § 8624(b)(10) mandates that the State shall provide fiscal control to assure the proper disbursal of and accounting for Federal funds, including procedures for monitoring the assistance provided. Further, Social Services’ Energy Assistance Program Manual, which it developed to comply with 42 USC § 8624(b)(10), stipulates that the eligibility worker will determine whether each adult household member is associated with an existing case number when they apply or reapply for benefits. Non-compliance with these provisions increases Social Services’ risk of incurring disallowed costs and having to repay grant funds to the federal government. Social Services should provide additional training to eligibility workers to properly identify individuals who have already applied for and received LIHEAP benefits. Additionally, Social Services should review the case management system’s current warning messages to determine how it can strengthen internal controls so that eligibility workers will not be able to approve cases which could result in this type of error. Finally, Social Services should consider implementing a detective control, such as reviewing payment reports, to identify potential disallowed payments resulting from an individual appearing on multiple case records. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-104: Implement Internal Controls over LIHEAP Federal Special Reporting Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VALIEA - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR § 200.303(a); 45 CFR § 96.82(a) Known Questioned Costs: $0 Benefit Programs has not documented its processes for preparing and verifying the information reported in the LIHEAP federal grant program’s Annual Household Report. The federal government requires Social Services to annually submit this data and uses this information to provide reports to Congress for assessing the uses of funds for the assistance of households in need. Benefit Programs uses a third-party service provider to produce data reports from its case management system that program staff use to populate the LIHEAP Annual Household Report and Benefit Programs relies on the third-party service provider’s internal controls during the data extraction process. Benefit Programs could not substantiate the information reported for four out of seven (57%) of the line items in Section I - Number of assisted households of the most recent LIHEAP Annual Household Report. Specifically, we noted the following inconsistencies: Benefit Programs reported 2,571 households assisted on the Emergency Furnace Repair and Replacement line, which is 12 percent higher than the information in the case management system. Benefit Programs reported 118,347 households assisted on the Any Type of LIHEAP Assistance line, which is 21 percent lower than the information in the case management system. Benefit Programs reported 117,274 households assisted on the Bill Payment Assistance line, which is 20 percent higher than the information in the case management system. Benefit Programs could not provide support to substantiate the Weatherization line. Title 2 CFR § 200.303(a) requires the non-federal entity to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the recipient is managing the federal award in compliance with federal statutes, regulations, and its terms and conditions. Further, 45 CFR § 96.82(a) requires each grantee, whether a State or an insular area, that receives an annual allotment of at least $200,000 to submit this data for the 12-month period preceding the federal fiscal year in which the grantee requests the funds. The grantee must report the data separately for LIHEAP heating, cooling, crisis, and weatherization assistance. If Social Services does not submit this report properly, ACF may not grant them their LIHEAP grant allotment as per 45 CFR § 96.82(c). Benefit Programs has not dedicated the necessary resources to document its processes for preparing the LIHEAP Annual Household Report. Documented policies and procedures will help Social Services maintain continuity with its processes to comply with laws and regulations. Without documented policies and procedures, there is a risk that Social Services could report inaccurate information to the federal government that could lead to Social Services incurring fines and/or penalties. Additionally, reporting potentially inaccurate information prevents the federal government from adequately monitoring Social Services’ overall performance for the LIHEAP federal grant program. Therefore, Benefit Programs should dedicate the necessary resources to document its processes for preparing the LIHEAP Annual Household Report, including the processes used to verify the data provided by its third-party service provider. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-105: Monitor Case Management System Records to Ensure Compliance with LIHEAP Eligibility Requirements Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Compliance Severity of Deficiency: N/A Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VALIEA - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Eligibility - 42 USC § 8624(b)(10) Known Questioned Costs: $6,569 Social Services did not comply with certain federal eligibility requirements for the LIHEAP federal grant program, resulting in known questioned costs of $6,569. Social Services provided over $114 million in assistance to approximately 215,000 needy families during fiscal year 2024 through the LIHEAP federal grant program. During the audit, we reperformed the eligibility determinations for all needy families that received assistance during the fiscal year and identified 12 instances (<1%) where individuals applied for benefits more than once and received benefit payments in excess of Social Services’ maximum benefit amounts. Social Services relies on its case management system to ensure it determines eligibility properly, calculates benefit payments correctly, and complies with the federal and state laws and regulations. However, Social Services’ case management system does not prevent eligibility workers from authorizing individuals on multiple cases but instead provides a warning message for which they could choose to ignore. Additionally, Social Services does not have a mechanism to detect when an individual has received benefits from multiple cases and/or received benefit payments in excess of its maximum benefit amount. Title 42 USC § 8624(b)(10) mandates that the State shall provide fiscal control to assure the proper disbursal of and accounting for Federal funds, including procedures for monitoring the assistance provided. Further, Social Services’ Energy Assistance Program Manual, which it developed to comply with 42 USC § 8624(b)(10), stipulates that the eligibility worker will determine whether each adult household member is associated with an existing case number when they apply or reapply for benefits. Non-compliance with these provisions increases Social Services’ risk of incurring disallowed costs and having to repay grant funds to the federal government. Social Services should provide additional training to eligibility workers to properly identify individuals who have already applied for and received LIHEAP benefits. Additionally, Social Services should review the case management system’s current warning messages to determine how it can strengthen internal controls so that eligibility workers will not be able to approve cases which could result in this type of error. Finally, Social Services should consider implementing a detective control, such as reviewing payment reports, to identify potential disallowed payments resulting from an individual appearing on multiple case records. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-011: Improve Fiscal Agent Oversight Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(a) Known Questioned Costs: $0 Medical Assistance Services did not obtain and review a System and Organization Controls (SOC) report, specifically a SOC I, Type 2 report, to gain assurance over its fiscal agent’s internal controls relevant to financial reporting. In addition to services related to information systems management and security, Medical Assistance Services contracts with the fiscal agent to perform accurate and timely payments of Medicaid claims to providers and maintain an accounts receivable ledger for the collection of provider funds owed to Medical Assistance Services. The fiscal agent processed over $22 billion in Medicaid-related payments during fiscal year 2024. Medical Assistance Services obtained a SOC 2, Type 2 report related to the fiscal agent’s controls over information systems management and security, however, this report did not provide an opinion over internal controls relevant to Medical Assistance Services’ significant fiscal activity and financial reporting. The Commonwealth’s Accounting Policies and Procedures Manual Topic 10305 requires agencies to have adequate interaction with service providers to appropriately understand the service provider’s internal control environment. It also states that agencies must also maintain oversight over service providers to gain assurance over outsourced operations. Additionally, Title 2 U.S. Code of Federal Regulations (CFR) § 200.303(a) requires non-federal entities to establish and maintain effective internal control over the federal award that provides reasonable assurance that the non-federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. The existing contract between Medical Assistance Services and the fiscal agent does not require the fiscal agent to obtain an independent review opining to the effectiveness of internal controls related to Medical Assistance Services’ significant fiscal activities and financial reporting. Management asserted that they are currently working to modify the contract with the provider to add this requirement. Although management maintains a high degree of interaction with its fiscal agent, they cannot adequately ensure the fiscal agent has designed and implemented sufficient controls, and whether the controls are operating effectively without obtaining and reviewing a SOC I, Type 2 report. This issue increases the risk that management will not detect a weakness in the fiscal agent’s environment, which could negatively impact the Commonwealth. Medical Assistance Services should continue to work with the fiscal agent to add language to the contract that would require the fiscal agent to obtain an appropriate independent audit of its internal controls relevant to Medical Assistance Services’ financial activities and reporting. Once the new contract language is in effect, Medical Assistance Services’ management should obtain and review the SOC I, Type 2 report annually to ensure the fiscal agent is meeting contractual obligations and has proper internal controls over Medical Assistance Services’ significant fiscal activities and financial reporting. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-017: Improve IT Third-Party Oversight Process Applicable to: Department of Medical Assistance Services Prior Year Finding Number: 2023-086; 2022-090 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Third-Party Service Providers (Information Systems) ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services has made progress to document and implement a formal process for maintaining oversight for three of its IT third-party service providers that manage and support its Medicaid management system. The Medicaid management system encompasses different functions, such as member and provider reporting, financial reporting, and federal reporting. Since the prior year audit, Medical Assistance Services developed its Information Technology (IT) Third Party Risk Management Procedure, which was effective on February 1, 2024, to facilitate the implementation of its IT System and Services Acquisition Policy. However, Medical Assistance Services is still working to implement the new procedure, which has resulted in the agency not yet verifying the following required controls and processes for one of the Medicaid management system IT service providers that is not covered by the Virginia Information Technologies Agency (VITA) Commonwealth of Virginia Risk and Authority Management Program. Medical Assistance Services does not confirm the geographic location of sensitive data monthly for IT service providers. Without confirming the geographic location of sensitive data, Medical Assistance Services may be unable to enforce contract requirements, laws, and standards due to the data falling outside of the United States’ jurisdiction. Medical Assistance Services does not confirm whether IT service providers perform vulnerability scans every 90 days. By not obtaining and analyzing the vulnerability scan results from the IT service provider, Medical Assistance Services increases the risk that the IT service providers are not remediating legitimate vulnerabilities in a timely manner. Medical Assistance Services experienced delays in implementing its new procedure due to limited staffing to properly communicate and train those responsible for monitoring IT service providers. Medical Assistance Services expects to complete its implementation by October 2024. Medical Assistance Services should dedicate the resources necessary to finish implementing its Third-Party Risk Management Procedure. Additionally, Medical Assistance Services should ensure that those tasked with monitoring IT service providers are confirming the geographic location of sensitive data and the provider’s performance of vulnerability scanning and remediation efforts per the Security Standard. Medical Assistance Services should also ensure the individuals responsible for monitoring consistently perform formal oversight processes in a timely manner, which will help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-022: Improve Information Security Program and Controls Applicable to: Department of Medical Assistance Services Prior Year Finding Number: 2023-010; 2022-024; 2021-024; 2020-024 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: Access Control; Awareness and Training; Incident Response; Information Security Roles and Responsibilities; Planning; Risk Assessment; Security Assessment and Authorization; System and Services Acquisition ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services continues to address weaknesses in its information technology (IT) general controls originally identified in a 2020 audit and confirmed in a 2023 audit covering the same IT general controls conducted by Medical Assistance Services’ Internal Audit division. During the 2023 audit, Internal Audit tested 105 controls required by the Commonwealth’s previous version of the Information Security Standard, SEC501, and identified 61 individual control weaknesses, a 58% non-compliance rate, that Internal Audit grouped into eight findings. Medical Assistance Services addressed four of the eight findings during fiscal year 2024. Noncompliance with required security controls increases the risk for unauthorized access to mission-critical systems and data in addition to weakening Medical Assistance Services ability to respond to malicious attacks to its IT environment. Medical Assistance Services has experienced delays in addressing these findings due to the number of findings and resources required to remediate the weaknesses. Medical Assistance Services updated its corrective action plan for the four remaining findings in June 2024, stating corrective actions are still ongoing with an estimated completion date of September 2024. Medical Assistance Services should prioritize and dedicate the necessary resources to ensure timely completion of its corrective action plans and to become compliant with the current version of the Commonwealth’s Information Security Standard, SEC530 (Security Standard). These actions will help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-023: Improve Database Security Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control; Audit and Accountability; Configuration Management; Contingency Planning; Identification and Authentication; System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services does not have formal policies, procedures, and a baseline configuration that outlines requirements and justifications for securing and maintaining the database supporting its primary system for financial accounting and reporting operations in accordance with the Security Standard, and industry best practices, such as the Center for Internet Security Benchmarks (CIS Benchmark). As a result, Medical Assistance Services has not implemented some required controls over the database. We communicated the weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. The Security Standard requires Medical Assistance Services to develop, document, and disseminate information security policies and procedures that align with the control requirements in the Security Standard. Additionally, the Security Standard requires Medical Assistance Services to develop, document, and maintain a current baseline configuration of the system and apply more restrictive security configurations for sensitive systems. The Security Standard also requires Medical Assistance Services to review and update the policies, procedures, and baseline configuration on an annual basis and following an environmental change. Without detailed policies, procedures, and a baseline configuration that outlines requirements and justifications for securing and maintaining its database, Medical Assistance Services increases the risk that the system will not meet the minimum security requirements and recommendations to protect its sensitive data from malicious parties. Medical Assistance Services has experienced a lack of resources which has contributed to the absence of documentation outlining control requirements and procedures needed to properly secure the database. The absence of this documentation contributed to the deficiencies communicated in the FOIAE document and as a result, Medical Assistance Services has not consistently evaluated and applied security controls. Medical Assistance Services should dedicate the resources necessary to develop and implement formal policies and procedures to support its database based on the Security Standard requirements and settings recommended by industry best practices, such as the CIS Benchmark. Medical Assistance Services should develop a formal baseline configuration for the database that defines required security controls outlined in industry best practices, such as the CIS Benchmark. The baseline configuration should define deviations from recommended and expected security configurations as well as business justification and approval for any deviations. Additionally, Medical Assistance Services should develop a process to review the database’s configuration against its established baseline configuration on a scheduled basis and after major changes occur to help detect and address potential misconfigurations timely. Furthermore, Medical Assistance Services should implement the security controls and processes communicated in the FOIAE document to address risks present in the database to ensure the configuration aligns with the Security Standard and CIS Benchmark. These actions will help maintain the confidentiality, availability, and integrity of Medical Assistance Services’ sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-024: Continue Improving IT Risk Management Program Applicable to: Department of Social Services Prior Year Finding Number: 2023-014; 2022-030; 2021-026; 2020-027; 2019-063; 2018-025 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Planning; Risk Assessment ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to not have a formal and effective IT risk management program that aligns with the requirements in the Security Standard. Since we first issued this finding in 2018, Social Services remediated some risk management and contingency planning issues. However, Social Services continues not to: accurately verify and validate data and system sensitivity ratings; create risk assessments for 90 percent of its sensitive systems; create system security plans for the 55 current systems identified as sensitive; review risk assessments for 100 percent of its existing documentation; and implement corrective actions identified in risk assessments. We communicated the details of these weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. ISRM and TSD defined and documented a new risk assessment policy and procedure in April 2024. Social Services also established a new risk assessment process that engages system administrators and system owners to complete a risk assessment worksheet to submit to ISRM for evaluation. ISRM meets with system administrators, system owners, and the Agency Head, to review the resulting risk assessment report and establish a risk mitigation plan. However, Social Services has not yet matured the new risk assessment process due to recently formalizing the process. Social Services established the Cybersecurity Team as part of TSD in fiscal year 2024; therefore, the Cybersecurity Team and ISRM have not yet assessed and integrated the various risk management processes. Additionally, the new risk assessment procedure does not define and document the requirements and processes Social Services must follow to implement the corrective action responsibilities. ISRM should work with TSD, the Cybersecurity Team, and business units to ensure Social Services establishes and maintains an up-to-date sensitive systems list. The Information Security Officer, in conjunction with system and data owners, should classify agency IT systems and data based on sensitivity. Following its new risk assessment procedure and process, ISRM and the Cybersecurity Team should prioritize completing risk assessments and system security plans for its sensitive systems and review those documents annually to validate that the information reflects the current environment. Additionally, TSD should implement security controls to mitigate the risks and vulnerabilities identified in its risk assessments. Improving the IT risk management program will help to ensure the confidentiality, integrity, and availability of the agency’s sensitive systems and mission-essential functions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-025: Improve Web Application Security Applicable to: Department of Social Services Prior Year Finding Number: 2023-015; 2022-029; 2021-025; 2020-026; 2019-037 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Audit and Accountability; Configuration Management; Risk Assessment; System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to not configure a sensitive web application in accordance with the Security Standard. During fiscal year 2024, Social Services remediated two of the five previously identified weaknesses; however, these two weaknesses existed during the fiscal year under review. Additionally, Social Services has not remediated three of the previously identified weaknesses. We communicated the weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. Lacking and insufficient procedures and processes to manage the web application contributed to the five weaknesses outlined in the separate FOIAE document. Social Services prioritizing other projects also contributed to the weaknesses persisting. TSD, ISRM, and business owners should work together to remediate the remaining weaknesses to secure the web application and meet the minimum requirements in its internal policies and the Security Standard. Addressing these weaknesses will help to ensure the confidentiality, integrity, and availability of sensitive and mission-critical data and achieve compliance with both internal policies and the Security Standard. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-035: Improve Information Security Program and IT Governance Applicable to: Department of Social Services Prior Year Finding Number: 2023-027; 2022-022 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: Information Security Roles and Responsibilities ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to have an insufficient governance structure to manage and maintain its information security program in accordance with the Security Standard. Specifically, Social Services does not assess information security requirements for its information technology (IT) projects and prioritize information security and IT resources to ensure its information security program effectively protects sensitive Commonwealth data in accordance with the Security Standard. We communicated the control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to its sensitivity and description of security controls. The Security Standard requires the agency head to maintain an information security program that is sufficient to protect the agency’s IT systems and to ensure the agency documents and effectively communicates the information security program. Not prioritizing IT resources to properly manage its information security program can result in a data breach or unauthorized access to confidential and mission-critical data, leading to data corruption, data loss, or system disruption if accessed by a malicious attacker, either internal or external. The control weaknesses described in the communication marked FOIAE are the result of Social Services not assessing information security requirements prior to project implementation, in addition to Social Services not prioritizing information security within the IT environment. Social Services has hindered its ability to consistently and timely remediate findings from management recommendations issued during prior year audits and bring the information security program in compliance with the Security Standard by not dedicating the necessary IT resources to information security. During fiscal year 2024, Social Services created a cybersecurity team under the Technology Services Division (TSD) to liaison between TSD and the Division of Information Security and Risk Management (ISRM) to help bring the information security program in compliance with the Security Standard. However, due to the magnitude of the project, TSD, the cybersecurity team, ISRM, and the executive team have not yet completed efforts to remediate this finding. TSD, ISRM, and Social Services’ Cybersecurity and Executive teams should continue to work together to bring the IT security program in compliance with the Security Standard. TSD and ISRM should continue to evaluate IT resource levels to ensure sufficient resources are available and dedicated to prioritizing and implementing IT governance changes and address the control deficiencies discussed in the communication marked FOIAE. Additionally, Social Services should evaluate the organizational placement of the Information Security Officer (ISO) to ensure effective implementation of the information security program and controls. Implementing these recommendations will help to ensure Social Services protects the confidentiality, integrity, and availability of its sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-041: Evaluate Separation of Duty Conflicts within the Case Management System Applicable to: Department of Social Services Prior Year Finding Number: 2023-034 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Benefit Programs, which is the owner of Social Services’ case management system, has not performed nor documented a conflicting access review to identify the combination of roles that could pose a separation of duties conflict or to ensure compensating controls are in place to mitigate risks arising from those conflicts. Social Services uses the case management system to determine applicant eligibility and authorize benefit payments for the Medicaid, SNAP, CCDF, LIHEAP, and TANF federal grant programs. Social Services authorized over $17 billion in public assistance payments to beneficiaries from these federal programs through its case management system during fiscal year 2024. The Security Standard requires the agency to separate duties of individuals as necessary, document separation of duties of individuals, and define information system access authorizations to support the separation of duties. Further, Social Services’ Information Security Policy states that the system owner is responsible for identifying and documenting separation of duties of individuals and defining system access authorizations to support separation of duties. Without performing and documenting a conflicting access review, Social Services does not know which combination of roles may pose a separation of duties conflict and is unable to implement compensating controls. In effect, this increases the possibility of a system breach or other malicious attack on Social Services’ data and places Social Services’ reputation at risk. Benefit Programs has not yet begun their corrective action efforts and ISRM has not included this finding in its Plan of Actions and Milestones (POAM) report, which is its internal corrective action plan that it shares with Social Services’ Executive Team. As a result, Social Services’ Executive Team was not aware that Social Services continues to be non-compliant with the Security Standard and its Information Security Policy. According to Social Services’ Organizational Structure Report, ISRM provides guidance to system owners about security requirements and is ultimately responsible for protecting Social Services’ information systems by addressing security compliance and risk. Benefit Programs should conduct a conflicting access review for the case management system and collaborate with ISRM to ensure it performs and documents this review in accordance with Social Services’ Information Security Policy. Additionally, ISRM should monitor this finding’s progress through its POAM report and provide periodic updates to Social Services’ Executive Team. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-042: Perform Annual Review of Case Management System Access Applicable to: Department of Social Services Prior Year Finding Number: 2023-035 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Benefit Programs, which is the owner of Social Services’ case management system, continues to not perform the required annual access review. Social Services uses the case management system to determine applicant eligibility and authorize benefit payments for the Medicaid, SNAP, CCDF, LIHEAP, and TANF federal grant programs. Social Services authorized over $17 billion in public assistance payments to beneficiaries from these federal programs through its case management system during fiscal year 2024. The Security Standard requires the agency to review accounts for compliance with account management on an annual basis. Additionally, ISRM’s Procedures Manual for State and Local Security Officers requires system owners and security officers to review user access privileges annually. System owners and security officers must complete this review within 364 days from the completion date of the last security review. Benefit Programs last completed a security review over the case management system in June 2022. Benefit Programs is responsible for obtaining the case management system’s access listing from ISRM, coordinating the annual review with the security officers, and working with ISRM to modify user access privileges as necessary. However, Benefit Programs did not perform the required annual access review for the case management system because it did not initiate the process with ISRM, and ISRM did not include this finding in its POAM report, which is its internal corrective action plan that it shares with Social Services’ Executive Team. As a result, Social Services’ Executive Team was not aware that Social Services continues to be non-compliant with the Security Standard and its Procedures Manual for State and Local Security Officers. According to Social Services’ Organizational Structure Report, ISRM provides guidance to System Owners about security requirements and is ultimately responsible for protecting Social Services’ information systems by addressing security compliance and risk. Social Services increases the risk of improper or unnecessary access to sensitive systems by not reviewing access to the case management system annually, which could potentially result in a system breach or other malicious attack on Social Services’ data and adversely affect its reputation. Benefit Programs should perform the required annual security review for the case management system and collaborate with ISRM to ensure it completes this review in accordance with the Procedures Manual for State and Local Officers. Additionally, ISRM should monitor this finding’s progress through its POAM report and provide periodic updates to Social Services’ Executive Team. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-047: Continue Improving IT Change and Configuration Management Process Applicable to: Department of Social Services Prior Year Finding Number: 2023-049; 2022-052; 2021-049; 2020-044; 2019-038 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to improve its IT change and configuration management process to align with the Security Standard. Change management is a key control to evaluate, approve, and verify configuration changes to security components. Two weaknesses remain since our last review, which we communicated to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing description of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. Social Services’ Change Management Process Guide details the process Social Services follows to manage changes, but does not include all the required elements, which contributed to the weaknesses remaining. Additionally, Social Services migrated to a new change management system of record in October 2023, which also contributed to the delay in remediating the remaining issues due to Social Services prioritizing the migration project. Not prioritizing and aligning IT change management processes with the Security Standard increases the risk of a data breach or unauthorized access to confidential and mission-critical data, leading to data corruption, data loss, or system disruption if accessed by a malicious attacker, either internal or external. Social Services should resolve the remaining two weaknesses discussed in the communication marked FOIAE in accordance with the Security Standard. Continuing to improve Social Services’ IT change and configuration management process will decrease the risk of unauthorized modifications to sensitive systems and help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-053: Improve Vulnerability Remediation Efforts Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Risk Assessment ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services does not install security patches to mitigate vulnerabilities within its IT environment in accordance with its Vulnerability Scan Management procedure. Specifically, as of November 2024, Medical Assistance Services identified a significant number of vulnerabilities classified with a severity of critical and high and numerous vulnerabilities with a severity of medium or low in its IT environment that remained unmitigated beyond the time limits set in its procedure. Medical Assistance Services’ procedure requires the agency to mitigate and validate vulnerabilities within the following timeframes, depending on the vulnerability’s severity rating: High-severity flaws within 30 calendar days; Medium-severity flaws within 60 calendar days; and All others within 90 calendar days. Additionally, the Security Standard requires Medical Assistance Services to “monitor and scan for vulnerabilities in the system and hosted applications at least once every 30 days, and when new vulnerabilities potentially affecting the system are identified and reported.” The Security Standard also requires Medical Assistance Services to remediate legitimate vulnerabilities within 30 days unless otherwise specified by Commonwealth Security Risk Management (CSRM) in accordance with an organizational assessment of risk. The Commonwealth’s IT Risk Management Standard, SEC520 (Risk Management Standard) requires Medical Assistance Services to “fix vulnerabilities within 30 days of a fix becoming available that are either rated as critical or high according to the National Vulnerability Database or otherwise identified by CSRM.” Additionally, the Risk Management Standard requires Medical Assistance Services to remediate all other vulnerabilities within 90 days of a fix becoming available and acquire an approved security exception for the vulnerability should Medical Assistance Services not remediate it within the timeframes identified. Software vulnerabilities are publicly known flaws that bad actors may exploit and use to circumvent organizational information security controls to infiltrate a network or application. The longer these vulnerabilities exist in an environment, the higher the risk of a compromise and unauthorized access to sensitive and mission-critical systems and data. It is therefore imperative for organizations to respond quickly and mitigate these publicly known flaws as soon as possible. Without appropriate software patching and vulnerability management controls, Medical Assistance Services increases the risk of unauthorized access to sensitive and mission-critical systems. Medical Assistance Services lacks the staffing necessary to remediate the high number of vulnerabilities detected within the timeframes required by its Vulnerability Scan Management procedure. Medical Assistance Services should allocate the necessary resources to apply patches within the Vulnerability Scan Management procedure’s required timeframe to mitigate the vulnerabilities affecting its IT environment. If Medical Assistance Services is unable to mitigate vulnerabilities within the required timeframe, it should obtain an extension approval from CSRM that is based on an organizational assessment of risk. Timely remediation of significant vulnerabilities will help protect the confidentiality, integrity, and availability of Medical Assistance Services’ sensitive and mission-critical information. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-058: Conduct Information Technology Security Audits Applicable to: Department of Social Services Prior Year Finding Number: 2023-056 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Audit and Accountability ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services is making progress in conducting a comprehensive IT security audit on each sensitive system at least once every three years. While Social Services conducted an IT security audit over an additional 22 percent of its sensitive systems, 14 of the 79 sensitive systems (18%) due for an IT Security Audit remain unaudited. Social Services indicates it is on track to complete the remaining IT security audits by the end of calendar year 2025. The Security Standard requires that each IT system classified as sensitive undergo an IT security audit as required by and in accordance with the current version of the Commonwealth’s IT Security Audit Standard, SEC502 (IT Audit Standard). The IT Audit Standard requires that IT systems containing sensitive data, or systems with an assessed sensitivity of high on any of the criteria of confidentiality, integrity, or availability, shall receive an IT security audit at least once every three years. Without conducting full IT security audits for each sensitive system every three years, Social Services increases the risk that IT staff will not detect and mitigate existing weaknesses. Malicious parties taking advantage of continued weaknesses could compromise sensitive and confidential data. Further, such security incidents could lead to mission-critical systems being unavailable. During fiscal year 2024, Social Services’ Audit Services Manager collaborated with the business divisions, TSD, and ISRM to schedule and conduct audits. However, Social Services did not perform the remaining IT security audits due to the large number of sensitive systems requiring an audit. Lack of a documented procedure and process for conducting IT security audits also contributed to the lapse in IT security audits conducted over the last three years. Social Services should define and document a formal procedure and process for conducting IT security audits over each sensitive system at least once every three years that tests the effectiveness of the IT security controls and their compliance with Security Standard requirements. Social Services should then complete all outstanding IT security audits to ensure it meets the Security Standard requirements. Compliance with the IT Audit Standard will help to ensure the confidentiality, integrity, and availability of sensitive and mission critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-061: Develop and Provide Role-Based Security Awareness Training to System Administrators and Data Custodians Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Awareness and Training ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 ISRM does not provide applicable role-based training to system administrators or data custodians that have security roles and responsibilities with elevated privileges. Additionally, ISRM does not document a procedure that outlines the steps it follows to administer the role-based training. An established security awareness training program is essential to protecting agency IT systems and data by ensuring that employees understand their roles and responsibilities in securing sensitive information at the agency. Social Services’ Awareness and Training Policy requires that Social Services’ Information Security Officer or designee provide role-based security and privacy training to personnel with the roles and responsibilities of system administrator and data custodian. Social Services’ Security Awareness and Training Policy and the Security Standard also require that Social Services administer role-based training to personnel before authorizing access to the system, information, or performing assigned duties; and annually thereafter, as well as when required by system changes. Without providing role-based training to all personnel with security-related roles, including personnel with the roles and responsibilities of system administrator and data custodian, Social Services increases the risk of human error and negligence. Additionally, lack of adequate role-based training increases the risk that users will be unaware or lack pertinent skills and knowledge to perform their security-related functions, resulting in an increased security risk. ISRM did not provide role-based training to personnel with designated information security roles due to competing priorities. Additionally, although the Awareness and Training Policy requires role-based training, Social Services does not define and document their process to provide role-based training to personnel with security-related functions, such as the specific training that each role should take, the deadline for role-based training completion, and the enforcement measure resulting from not completing the role-based training timely. ISRM should develop procedures that detail the process to provide role-based training to personnel with designated security roles. ISRM should also develop and administer role-based training for systems administrators and data custodians. Improving the security awareness training program will help protect Social Services from malicious attempts to compromise the confidentiality, integrity, and availability of sensitive data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-064: Upgrade End-of-Life Technology Applicable to: Department of Social Services Prior Year Finding Number: 2023-058; 2022-060 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services uses end-of-life (EOL) technologies in its IT environment and maintains technologies that support mission-essential data on IT systems running software that its vendors no longer support. We communicated the control weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard prohibits agencies from using software that is EOL and which the vendor no longer supports to reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. In May 2024, Social Services established a Cybersecurity Team to track and manage technologies but has not yet completed their processes. Using EOL technologies increases the risk of successful cyberattack, exploit, and data breach by malicious parties. Further, vendors do not offer operational and technical support for EOL or end-of-support technology, which affects data availability by increasing the difficulty of restoring system functionality if a technical failure occurs. Social Services should dedicate the necessary resources to evaluate and implement the controls and recommendations discussed in the communication marked FOIAE in accordance with the Security Standard. By dedicating the necessary resources to evaluate and implement these controls and recommendations, Social Services will help to ensure that it adequately secures its IT environment and systems. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-067: Continue Developing Record Retention Requirements and Processes for Electronic Records Applicable to: Department of Social Services Prior Year Finding Number: 2023-066; 2022-064; 2021-047; 2020-041; 2019-049; 2018-054 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Contingency Planning ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to operate without an adequate data retention process that ensures consistent compliance with retention requirements for its case management system and adherence to federal regulations and state law. Social Services’ case management system stores several types of federal benefit program records with varying retention requirements supporting ten programs and services, such as the Medical Assistance (Medicaid), Supplemental Nutrition Assistance (SNAP), Child Care and Development Fund (CCDF), LIHEAP, and TANF federal grant programs. Social Services’ case management system authorized over $17 billion in public assistance payments to beneficiaries from these federal programs during fiscal year 2024. Since fiscal year 2019, Social Services gathered retention requirements from the business divisions that support the federal programs and services. In fiscal year 2022, Social Services finalized and documented policies with retention requirements for the data sets handled by each of the ten programs and services supported by its case management system. Social Services determined that due to the risk and complexity of the project, as well as changes to federal requirements since its first analysis, the retention requirements for all ten programs and services supported by its case management system were not feasible as a single release. Therefore, Social Services planned a phased delivery approach including multiple releases. In November 2023, Social Services defined and documented a purge and retention design document to implement Release 1 of the record purge and retention project for its case management system. Social Services subsequently implemented Release 1 of the record purge and retention project in February 2024. However, Social Services has not completed the process to implement the records retention policies for each of the programs and services to ensure consistent retention and destruction of records in compliance with regulations and laws. Title 45 CFR § 155.1210, governs record retention for Medicaid and requires state agencies to maintain records for ten years. Additionally, the Virginia Public Records Act outlined in § 42.1-91 of the Code of Virginia makes an agency responsible for ensuring that it preserves, maintains, and makes accessible public records throughout their lifecycle, including converting and migrating electronic records as often as necessary so that an agency does not lose information due to hardware, software, or media obsolescence or deterioration. Furthermore, the Virginia Public Records Act in § 42.1-86.1 of the Code of Virginia details requirements for the disposition of records. Section § 42.1-86.1 requires that records created after July 1, 2006, and authorized to be destroyed or discarded, must be discarded in a timely manner and in accordance with the provisions of Chapter 7 of the Virginia Public Records Act. Further, records that contain identifying information as defined by subsection C of § 18.2-186.3 of the Code of Virginia shall be destroyed within six months of the expiration of the records retention period. Finally, the Security Standard requires agencies to implement backup and restoration plans that address the retention of the data in accordance with the records retention policy for every IT system identified as sensitive relative to availability. Without implementing records retention requirements, Social Services increases the risk of a data or privacy breach. Additionally, destroying documents that should be available for business processes or audit, or keeping data longer than stated, could expose Social Services to fines, penalties, or other legal consequences. Further, Social Services may not be able to ensure that backup and restoration efforts will provide mission critical information according to recovery times. Finally, retaining records longer than necessary causes the Commonwealth to spend additional resources to maintain, back-up, and protect information that no longer serves a business purpose. The magnitude and complexity of effectively implementing a retention and purge process for an integrated eligibility system delayed completion of the record purge and retention project. Additionally, following Release 1 implementation, Social Services identified an additional required element of the purge and retention project. For these reasons, Social Services plans to update the purge and retention design document and implement Release 2 in February 2025. Further, Social Services plans to complete the purge and retention project with the final release, Release 3, by September 2025. Social Services should complete the record purge and retention project for its case management system and, thereafter, implement consistent records retention and destruction processes across business divisions to ensure compliance with laws and regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-068: Monitor Internal Controls to Ensure Timely Removal of System Access Applicable to: Department of Social Services Prior Year Finding Number: 2023-043; 2022-059; 2021-038;2021-027;2020-025;2019-027;2018-042 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Personnel Security ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to implement internal controls to monitor the timely removal of system access. The Security Standard requires the organization to disable information system access within 24 hours of employment termination. In response to the prior audit recommendations, ISRM developed an overarching policy governing system access that addresses the timely removal of system access and Social Services’ Division of Human Resources developed a policy to ensure supervisors follow the appropriate steps to offboard separated employees. Additionally, ISRM and the Division of Human Resources worked collaboratively to develop a process to identify individuals whose separation did not follow the offboarding policy and manually removed their access from Social Services’ access management system. However, because of the extent of its corrective actions, Social Services was not able to implement all of its planned corrective actions by the end of fiscal year 2024. Social Services administers numerous public assistance programs that collect personally identifiable information and other protected information from beneficiaries. Social Services could place its data and reputation at risk by not removing access timely. Additionally, Social Services could incur potential financial liabilities should its information become compromised. Therefore, Social Services should continue its corrective action efforts to implement internal controls to monitor the timely removal of system access. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-071: Continue to Ensure ITISP Suppliers Meet All Contractual Requirements Applicable to: Virginia Information Technologies Agency Prior Year Finding Number: 2023-072; 2022-100; 2021-023; 2020-070 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 VITA has made significant progress to monitor and enforce the contractual requirements for the Information Technology Infrastructure Services Program (ITISP) suppliers. During fiscal year 2024, VITA and the Multisource Service Integration (MSI) continued to evaluate the current service level measurements to ensure they align with the Commonwealth’s needs. VITA and the MSI monitored the service level related to security and vulnerability patching for the entire fiscal year. The requirements of this service level for fiscal year 2024 included a Common Vulnerabilities and Exposures (CVE) threshold, which required that ITISP suppliers install any patch with a CVE score above the threshold within 60 days. If the supplier did not meet the service level threshold, VITA enforced a credit for the Commonwealth. Although VITA monitored the service levels implemented in the prior year, not enough time has passed to prove the effects of the consequences enforced. Our audits at various agencies for fiscal year 2024 found critical and highly important security patches not installed within 30 days as required by the Commonwealth’s Information Security Standard, SEC530 (Security Standard). As a result, the systems missing critical security updates are at an increased risk of cyberattack, exploitation, and data breach by malicious parties. When ITISP suppliers do not meet all contractual requirements (e.g., Service Level Agreements, Critical Deliverables, etc.) it impacts the ability of Commonwealth agencies that rely on the ITISP services to comply with the Security Standard. The Security Standard is a baseline for information security and risk management activities for Commonwealth agencies. Many agencies rely on services provided through ITISP suppliers to ensure compliance with the Security Standard. For example, the Security Standard requires the installation of security-relevant software and firmware updates within at least 30 days of the update’s release or within a timeframe approved by Commonwealth Security and Risk Management (CSRM) . Commonwealth agencies rely on the ITISP suppliers for the installation of security patches in systems that support agencies’ operations. Additionally, during fiscal year 2024, VITA continued to work with the managed security supplier to address the inability of agencies to access the audit log information in the managed detection and response (MDR) platform. VITA implemented a separate security and event management (SIEM) tool at the end of October 2023 to expand agencies’ capabilities to monitor audit log information. While the supplier implemented the MDR platform, VITA and the supplier determined to replace the MDR platform with the VITA-managed SIEM tool as the permanent audit log monitoring tool. However, while the SIEM tool is in production, it also does not include all audit log information in a usable format to allow agencies to adequately monitor their IT environments. The Security Standard requires agencies to review and analyze audit records at least every 30 days for indications of inappropriate or unusual activity. Our audits of various agencies for fiscal year 2024 found that agencies rely on VITA and ITISP suppliers to provide access to a centralized monitoring tool that collects audit log information about activities in the IT environment. Although the supplier was performing audit logging and monitoring, most agencies were unable to obtain access to the audit log information during fiscal year 2024, and thus, were not able to comply with the Security Standard requirements related to audit log monitoring. An inability for all agencies to review and monitor their individual audit logs increases the risk associated with the Commonwealth’s data confidentiality, integrity, and availability. To ensure all agencies that rely on the ITISP’s services comply with the Security Standard, VITA should ensure suppliers meet all contractual requirements (e.g., Service Level Agreements, Critical Deliverables, etc.). If VITA determines suppliers are not meeting these requirements, VITA should implement escalation procedures to compel the ITISP services to comply with the contractual requirements. Additionally, VITA should communicate with the affected agencies and provide guidance on what the agencies can do to comply with the Security Standard while the suppliers work to meet the requirements of the contract. VITA should also continue working with the ITISP suppliers and agencies to import audit log information to the SIEM tool to ensure agencies can review the activities occurring in their IT environments in accordance with the Security Standard. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-082: Perform Responsibilities Outlined in the Agency Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-097; 2022-011; 2021-070; 2020-074; 2019-090; 2018-093 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.303(a); 2 CFR § 200.332 Known Questioned Costs: $0 Compliance continues to not adhere to its established approach to oversee the agency’s subrecipient monitoring activities, as outlined in its Agency Monitoring Plan. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps to ensure adherence to state and federal legal and regulatory standards, including subrecipient monitoring. During fiscal year 2024, Social Services disbursed approximately $660 million to 342 subrecipients from 30 federal grant programs. During the audit, we noted the following deviations from the Agency Monitoring Plan: Compliance continues to not review programmatic division annual subrecipient monitoring plans to ensure they implement a risk-based approach. The Agency Monitoring Plan states that Compliance will use a Monitoring Plan Checklist to evaluate and determine if all the required elements for subrecipient monitoring are present in each division’s plan. Compliance does not hold monthly meetings with Subrecipient Monitoring Coordinators, as required by the Agency Monitoring Plan, where divisions can share information concerning risks and federal and/or grant-specific requirements, approaches to assessing risk, and changes that could affect subrecipients and the monitoring processes. Compliance has not reviewed each division’s monitoring activities nor provided quarterly reports of variances and noncompliance from the Agency Monitoring Plan to Social Services’ executive team. As a result, Compliance did not identify that the Division of Benefit Programs (Benefit Programs) did not complete risk assessments for 50 of its 324 (15%) locality subrecipients, properly document considerations for localities with elevated risks, nor perform adequate risk assessments for their non-locality subrecipients. Since the prior audit, Compliance has communicated the Agency Monitoring Plan to the Subrecipient Monitoring Coordinators. Additionally, Compliance has worked with Social Services’ Executive Team to secure funding for a grants management system and additional subrecipient monitor positions. However, Compliance has yet to establish a timeline for when it intends for the system to be fully functional and has not explored alternate options to comply with its Agency Monitoring Plan. Further, Compliance has not collaborated with Subrecipient Monitoring Coordinators to determine how the agency collectively plans to accomplish the goals and objectives set forth within the Agency Monitoring Plan. Collaboration between Compliance and Subrecipient Monitoring Coordinators is imperative to ensuring that Social Services complies with the pass-through entity requirements in 2 CFR § 200.332. Title 2 CFR § 200.303(a) requires pass-through entities to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the non-Federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Without performing the responsibilities in the Agency Monitoring Plan, Compliance cannot assure that the agency’s subrecipient monitoring efforts are adequate to comply with the regulations at 2 CFR § 200.332. Additionally, Compliance places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards by not monitoring the agency’s subrecipient monitoring activities. Because of the scope of this matter and the magnitude of Social Services’ subrecipient monitoring responsibilities, we consider these weaknesses collectively to create a material weakness in internal controls over compliance. Compliance should work collaboratively with Social Services’ Executive Team and the subrecipient monitoring coordinators to fulfil the agency’s responsibilities in the Agency Monitoring Plan. Further, Compliance should explore alternative solutions to track and monitor each division’s subrecipient monitoring activities and report the results to the Executive Team until it develops and implements its grants management system. Evaluating alternative solutions will help Social Services mitigate the risk of incurring federal sanctions because of non-compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-011: Improve Fiscal Agent Oversight Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(a) Known Questioned Costs: $0 Medical Assistance Services did not obtain and review a System and Organization Controls (SOC) report, specifically a SOC I, Type 2 report, to gain assurance over its fiscal agent’s internal controls relevant to financial reporting. In addition to services related to information systems management and security, Medical Assistance Services contracts with the fiscal agent to perform accurate and timely payments of Medicaid claims to providers and maintain an accounts receivable ledger for the collection of provider funds owed to Medical Assistance Services. The fiscal agent processed over $22 billion in Medicaid-related payments during fiscal year 2024. Medical Assistance Services obtained a SOC 2, Type 2 report related to the fiscal agent’s controls over information systems management and security, however, this report did not provide an opinion over internal controls relevant to Medical Assistance Services’ significant fiscal activity and financial reporting. The Commonwealth’s Accounting Policies and Procedures Manual Topic 10305 requires agencies to have adequate interaction with service providers to appropriately understand the service provider’s internal control environment. It also states that agencies must also maintain oversight over service providers to gain assurance over outsourced operations. Additionally, Title 2 U.S. Code of Federal Regulations (CFR) § 200.303(a) requires non-federal entities to establish and maintain effective internal control over the federal award that provides reasonable assurance that the non-federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. The existing contract between Medical Assistance Services and the fiscal agent does not require the fiscal agent to obtain an independent review opining to the effectiveness of internal controls related to Medical Assistance Services’ significant fiscal activities and financial reporting. Management asserted that they are currently working to modify the contract with the provider to add this requirement. Although management maintains a high degree of interaction with its fiscal agent, they cannot adequately ensure the fiscal agent has designed and implemented sufficient controls, and whether the controls are operating effectively without obtaining and reviewing a SOC I, Type 2 report. This issue increases the risk that management will not detect a weakness in the fiscal agent’s environment, which could negatively impact the Commonwealth. Medical Assistance Services should continue to work with the fiscal agent to add language to the contract that would require the fiscal agent to obtain an appropriate independent audit of its internal controls relevant to Medical Assistance Services’ financial activities and reporting. Once the new contract language is in effect, Medical Assistance Services’ management should obtain and review the SOC I, Type 2 report annually to ensure the fiscal agent is meeting contractual obligations and has proper internal controls over Medical Assistance Services’ significant fiscal activities and financial reporting. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-017: Improve IT Third-Party Oversight Process Applicable to: Department of Medical Assistance Services Prior Year Finding Number: 2023-086; 2022-090 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Third-Party Service Providers (Information Systems) ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services has made progress to document and implement a formal process for maintaining oversight for three of its IT third-party service providers that manage and support its Medicaid management system. The Medicaid management system encompasses different functions, such as member and provider reporting, financial reporting, and federal reporting. Since the prior year audit, Medical Assistance Services developed its Information Technology (IT) Third Party Risk Management Procedure, which was effective on February 1, 2024, to facilitate the implementation of its IT System and Services Acquisition Policy. However, Medical Assistance Services is still working to implement the new procedure, which has resulted in the agency not yet verifying the following required controls and processes for one of the Medicaid management system IT service providers that is not covered by the Virginia Information Technologies Agency (VITA) Commonwealth of Virginia Risk and Authority Management Program. Medical Assistance Services does not confirm the geographic location of sensitive data monthly for IT service providers. Without confirming the geographic location of sensitive data, Medical Assistance Services may be unable to enforce contract requirements, laws, and standards due to the data falling outside of the United States’ jurisdiction. Medical Assistance Services does not confirm whether IT service providers perform vulnerability scans every 90 days. By not obtaining and analyzing the vulnerability scan results from the IT service provider, Medical Assistance Services increases the risk that the IT service providers are not remediating legitimate vulnerabilities in a timely manner. Medical Assistance Services experienced delays in implementing its new procedure due to limited staffing to properly communicate and train those responsible for monitoring IT service providers. Medical Assistance Services expects to complete its implementation by October 2024. Medical Assistance Services should dedicate the resources necessary to finish implementing its Third-Party Risk Management Procedure. Additionally, Medical Assistance Services should ensure that those tasked with monitoring IT service providers are confirming the geographic location of sensitive data and the provider’s performance of vulnerability scanning and remediation efforts per the Security Standard. Medical Assistance Services should also ensure the individuals responsible for monitoring consistently perform formal oversight processes in a timely manner, which will help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-022: Improve Information Security Program and Controls Applicable to: Department of Medical Assistance Services Prior Year Finding Number: 2023-010; 2022-024; 2021-024; 2020-024 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: Access Control; Awareness and Training; Incident Response; Information Security Roles and Responsibilities; Planning; Risk Assessment; Security Assessment and Authorization; System and Services Acquisition ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services continues to address weaknesses in its information technology (IT) general controls originally identified in a 2020 audit and confirmed in a 2023 audit covering the same IT general controls conducted by Medical Assistance Services’ Internal Audit division. During the 2023 audit, Internal Audit tested 105 controls required by the Commonwealth’s previous version of the Information Security Standard, SEC501, and identified 61 individual control weaknesses, a 58% non-compliance rate, that Internal Audit grouped into eight findings. Medical Assistance Services addressed four of the eight findings during fiscal year 2024. Noncompliance with required security controls increases the risk for unauthorized access to mission-critical systems and data in addition to weakening Medical Assistance Services ability to respond to malicious attacks to its IT environment. Medical Assistance Services has experienced delays in addressing these findings due to the number of findings and resources required to remediate the weaknesses. Medical Assistance Services updated its corrective action plan for the four remaining findings in June 2024, stating corrective actions are still ongoing with an estimated completion date of September 2024. Medical Assistance Services should prioritize and dedicate the necessary resources to ensure timely completion of its corrective action plans and to become compliant with the current version of the Commonwealth’s Information Security Standard, SEC530 (Security Standard). These actions will help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-023: Improve Database Security Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control; Audit and Accountability; Configuration Management; Contingency Planning; Identification and Authentication; System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services does not have formal policies, procedures, and a baseline configuration that outlines requirements and justifications for securing and maintaining the database supporting its primary system for financial accounting and reporting operations in accordance with the Security Standard, and industry best practices, such as the Center for Internet Security Benchmarks (CIS Benchmark). As a result, Medical Assistance Services has not implemented some required controls over the database. We communicated the weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. The Security Standard requires Medical Assistance Services to develop, document, and disseminate information security policies and procedures that align with the control requirements in the Security Standard. Additionally, the Security Standard requires Medical Assistance Services to develop, document, and maintain a current baseline configuration of the system and apply more restrictive security configurations for sensitive systems. The Security Standard also requires Medical Assistance Services to review and update the policies, procedures, and baseline configuration on an annual basis and following an environmental change. Without detailed policies, procedures, and a baseline configuration that outlines requirements and justifications for securing and maintaining its database, Medical Assistance Services increases the risk that the system will not meet the minimum security requirements and recommendations to protect its sensitive data from malicious parties. Medical Assistance Services has experienced a lack of resources which has contributed to the absence of documentation outlining control requirements and procedures needed to properly secure the database. The absence of this documentation contributed to the deficiencies communicated in the FOIAE document and as a result, Medical Assistance Services has not consistently evaluated and applied security controls. Medical Assistance Services should dedicate the resources necessary to develop and implement formal policies and procedures to support its database based on the Security Standard requirements and settings recommended by industry best practices, such as the CIS Benchmark. Medical Assistance Services should develop a formal baseline configuration for the database that defines required security controls outlined in industry best practices, such as the CIS Benchmark. The baseline configuration should define deviations from recommended and expected security configurations as well as business justification and approval for any deviations. Additionally, Medical Assistance Services should develop a process to review the database’s configuration against its established baseline configuration on a scheduled basis and after major changes occur to help detect and address potential misconfigurations timely. Furthermore, Medical Assistance Services should implement the security controls and processes communicated in the FOIAE document to address risks present in the database to ensure the configuration aligns with the Security Standard and CIS Benchmark. These actions will help maintain the confidentiality, availability, and integrity of Medical Assistance Services’ sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-024: Continue Improving IT Risk Management Program Applicable to: Department of Social Services Prior Year Finding Number: 2023-014; 2022-030; 2021-026; 2020-027; 2019-063; 2018-025 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Planning; Risk Assessment ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to not have a formal and effective IT risk management program that aligns with the requirements in the Security Standard. Since we first issued this finding in 2018, Social Services remediated some risk management and contingency planning issues. However, Social Services continues not to: accurately verify and validate data and system sensitivity ratings; create risk assessments for 90 percent of its sensitive systems; create system security plans for the 55 current systems identified as sensitive; review risk assessments for 100 percent of its existing documentation; and implement corrective actions identified in risk assessments. We communicated the details of these weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. ISRM and TSD defined and documented a new risk assessment policy and procedure in April 2024. Social Services also established a new risk assessment process that engages system administrators and system owners to complete a risk assessment worksheet to submit to ISRM for evaluation. ISRM meets with system administrators, system owners, and the Agency Head, to review the resulting risk assessment report and establish a risk mitigation plan. However, Social Services has not yet matured the new risk assessment process due to recently formalizing the process. Social Services established the Cybersecurity Team as part of TSD in fiscal year 2024; therefore, the Cybersecurity Team and ISRM have not yet assessed and integrated the various risk management processes. Additionally, the new risk assessment procedure does not define and document the requirements and processes Social Services must follow to implement the corrective action responsibilities. ISRM should work with TSD, the Cybersecurity Team, and business units to ensure Social Services establishes and maintains an up-to-date sensitive systems list. The Information Security Officer, in conjunction with system and data owners, should classify agency IT systems and data based on sensitivity. Following its new risk assessment procedure and process, ISRM and the Cybersecurity Team should prioritize completing risk assessments and system security plans for its sensitive systems and review those documents annually to validate that the information reflects the current environment. Additionally, TSD should implement security controls to mitigate the risks and vulnerabilities identified in its risk assessments. Improving the IT risk management program will help to ensure the confidentiality, integrity, and availability of the agency’s sensitive systems and mission-essential functions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-025: Improve Web Application Security Applicable to: Department of Social Services Prior Year Finding Number: 2023-015; 2022-029; 2021-025; 2020-026; 2019-037 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Audit and Accountability; Configuration Management; Risk Assessment; System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to not configure a sensitive web application in accordance with the Security Standard. During fiscal year 2024, Social Services remediated two of the five previously identified weaknesses; however, these two weaknesses existed during the fiscal year under review. Additionally, Social Services has not remediated three of the previously identified weaknesses. We communicated the weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. Lacking and insufficient procedures and processes to manage the web application contributed to the five weaknesses outlined in the separate FOIAE document. Social Services prioritizing other projects also contributed to the weaknesses persisting. TSD, ISRM, and business owners should work together to remediate the remaining weaknesses to secure the web application and meet the minimum requirements in its internal policies and the Security Standard. Addressing these weaknesses will help to ensure the confidentiality, integrity, and availability of sensitive and mission-critical data and achieve compliance with both internal policies and the Security Standard. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-035: Improve Information Security Program and IT Governance Applicable to: Department of Social Services Prior Year Finding Number: 2023-027; 2022-022 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: Information Security Roles and Responsibilities ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to have an insufficient governance structure to manage and maintain its information security program in accordance with the Security Standard. Specifically, Social Services does not assess information security requirements for its information technology (IT) projects and prioritize information security and IT resources to ensure its information security program effectively protects sensitive Commonwealth data in accordance with the Security Standard. We communicated the control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to its sensitivity and description of security controls. The Security Standard requires the agency head to maintain an information security program that is sufficient to protect the agency’s IT systems and to ensure the agency documents and effectively communicates the information security program. Not prioritizing IT resources to properly manage its information security program can result in a data breach or unauthorized access to confidential and mission-critical data, leading to data corruption, data loss, or system disruption if accessed by a malicious attacker, either internal or external. The control weaknesses described in the communication marked FOIAE are the result of Social Services not assessing information security requirements prior to project implementation, in addition to Social Services not prioritizing information security within the IT environment. Social Services has hindered its ability to consistently and timely remediate findings from management recommendations issued during prior year audits and bring the information security program in compliance with the Security Standard by not dedicating the necessary IT resources to information security. During fiscal year 2024, Social Services created a cybersecurity team under the Technology Services Division (TSD) to liaison between TSD and the Division of Information Security and Risk Management (ISRM) to help bring the information security program in compliance with the Security Standard. However, due to the magnitude of the project, TSD, the cybersecurity team, ISRM, and the executive team have not yet completed efforts to remediate this finding. TSD, ISRM, and Social Services’ Cybersecurity and Executive teams should continue to work together to bring the IT security program in compliance with the Security Standard. TSD and ISRM should continue to evaluate IT resource levels to ensure sufficient resources are available and dedicated to prioritizing and implementing IT governance changes and address the control deficiencies discussed in the communication marked FOIAE. Additionally, Social Services should evaluate the organizational placement of the Information Security Officer (ISO) to ensure effective implementation of the information security program and controls. Implementing these recommendations will help to ensure Social Services protects the confidentiality, integrity, and availability of its sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-041: Evaluate Separation of Duty Conflicts within the Case Management System Applicable to: Department of Social Services Prior Year Finding Number: 2023-034 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Benefit Programs, which is the owner of Social Services’ case management system, has not performed nor documented a conflicting access review to identify the combination of roles that could pose a separation of duties conflict or to ensure compensating controls are in place to mitigate risks arising from those conflicts. Social Services uses the case management system to determine applicant eligibility and authorize benefit payments for the Medicaid, SNAP, CCDF, LIHEAP, and TANF federal grant programs. Social Services authorized over $17 billion in public assistance payments to beneficiaries from these federal programs through its case management system during fiscal year 2024. The Security Standard requires the agency to separate duties of individuals as necessary, document separation of duties of individuals, and define information system access authorizations to support the separation of duties. Further, Social Services’ Information Security Policy states that the system owner is responsible for identifying and documenting separation of duties of individuals and defining system access authorizations to support separation of duties. Without performing and documenting a conflicting access review, Social Services does not know which combination of roles may pose a separation of duties conflict and is unable to implement compensating controls. In effect, this increases the possibility of a system breach or other malicious attack on Social Services’ data and places Social Services’ reputation at risk. Benefit Programs has not yet begun their corrective action efforts and ISRM has not included this finding in its Plan of Actions and Milestones (POAM) report, which is its internal corrective action plan that it shares with Social Services’ Executive Team. As a result, Social Services’ Executive Team was not aware that Social Services continues to be non-compliant with the Security Standard and its Information Security Policy. According to Social Services’ Organizational Structure Report, ISRM provides guidance to system owners about security requirements and is ultimately responsible for protecting Social Services’ information systems by addressing security compliance and risk. Benefit Programs should conduct a conflicting access review for the case management system and collaborate with ISRM to ensure it performs and documents this review in accordance with Social Services’ Information Security Policy. Additionally, ISRM should monitor this finding’s progress through its POAM report and provide periodic updates to Social Services’ Executive Team. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-042: Perform Annual Review of Case Management System Access Applicable to: Department of Social Services Prior Year Finding Number: 2023-035 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Benefit Programs, which is the owner of Social Services’ case management system, continues to not perform the required annual access review. Social Services uses the case management system to determine applicant eligibility and authorize benefit payments for the Medicaid, SNAP, CCDF, LIHEAP, and TANF federal grant programs. Social Services authorized over $17 billion in public assistance payments to beneficiaries from these federal programs through its case management system during fiscal year 2024. The Security Standard requires the agency to review accounts for compliance with account management on an annual basis. Additionally, ISRM’s Procedures Manual for State and Local Security Officers requires system owners and security officers to review user access privileges annually. System owners and security officers must complete this review within 364 days from the completion date of the last security review. Benefit Programs last completed a security review over the case management system in June 2022. Benefit Programs is responsible for obtaining the case management system’s access listing from ISRM, coordinating the annual review with the security officers, and working with ISRM to modify user access privileges as necessary. However, Benefit Programs did not perform the required annual access review for the case management system because it did not initiate the process with ISRM, and ISRM did not include this finding in its POAM report, which is its internal corrective action plan that it shares with Social Services’ Executive Team. As a result, Social Services’ Executive Team was not aware that Social Services continues to be non-compliant with the Security Standard and its Procedures Manual for State and Local Security Officers. According to Social Services’ Organizational Structure Report, ISRM provides guidance to System Owners about security requirements and is ultimately responsible for protecting Social Services’ information systems by addressing security compliance and risk. Social Services increases the risk of improper or unnecessary access to sensitive systems by not reviewing access to the case management system annually, which could potentially result in a system breach or other malicious attack on Social Services’ data and adversely affect its reputation. Benefit Programs should perform the required annual security review for the case management system and collaborate with ISRM to ensure it completes this review in accordance with the Procedures Manual for State and Local Officers. Additionally, ISRM should monitor this finding’s progress through its POAM report and provide periodic updates to Social Services’ Executive Team. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-047: Continue Improving IT Change and Configuration Management Process Applicable to: Department of Social Services Prior Year Finding Number: 2023-049; 2022-052; 2021-049; 2020-044; 2019-038 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to improve its IT change and configuration management process to align with the Security Standard. Change management is a key control to evaluate, approve, and verify configuration changes to security components. Two weaknesses remain since our last review, which we communicated to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing description of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. Social Services’ Change Management Process Guide details the process Social Services follows to manage changes, but does not include all the required elements, which contributed to the weaknesses remaining. Additionally, Social Services migrated to a new change management system of record in October 2023, which also contributed to the delay in remediating the remaining issues due to Social Services prioritizing the migration project. Not prioritizing and aligning IT change management processes with the Security Standard increases the risk of a data breach or unauthorized access to confidential and mission-critical data, leading to data corruption, data loss, or system disruption if accessed by a malicious attacker, either internal or external. Social Services should resolve the remaining two weaknesses discussed in the communication marked FOIAE in accordance with the Security Standard. Continuing to improve Social Services’ IT change and configuration management process will decrease the risk of unauthorized modifications to sensitive systems and help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-053: Improve Vulnerability Remediation Efforts Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Risk Assessment ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services does not install security patches to mitigate vulnerabilities within its IT environment in accordance with its Vulnerability Scan Management procedure. Specifically, as of November 2024, Medical Assistance Services identified a significant number of vulnerabilities classified with a severity of critical and high and numerous vulnerabilities with a severity of medium or low in its IT environment that remained unmitigated beyond the time limits set in its procedure. Medical Assistance Services’ procedure requires the agency to mitigate and validate vulnerabilities within the following timeframes, depending on the vulnerability’s severity rating: High-severity flaws within 30 calendar days; Medium-severity flaws within 60 calendar days; and All others within 90 calendar days. Additionally, the Security Standard requires Medical Assistance Services to “monitor and scan for vulnerabilities in the system and hosted applications at least once every 30 days, and when new vulnerabilities potentially affecting the system are identified and reported.” The Security Standard also requires Medical Assistance Services to remediate legitimate vulnerabilities within 30 days unless otherwise specified by Commonwealth Security Risk Management (CSRM) in accordance with an organizational assessment of risk. The Commonwealth’s IT Risk Management Standard, SEC520 (Risk Management Standard) requires Medical Assistance Services to “fix vulnerabilities within 30 days of a fix becoming available that are either rated as critical or high according to the National Vulnerability Database or otherwise identified by CSRM.” Additionally, the Risk Management Standard requires Medical Assistance Services to remediate all other vulnerabilities within 90 days of a fix becoming available and acquire an approved security exception for the vulnerability should Medical Assistance Services not remediate it within the timeframes identified. Software vulnerabilities are publicly known flaws that bad actors may exploit and use to circumvent organizational information security controls to infiltrate a network or application. The longer these vulnerabilities exist in an environment, the higher the risk of a compromise and unauthorized access to sensitive and mission-critical systems and data. It is therefore imperative for organizations to respond quickly and mitigate these publicly known flaws as soon as possible. Without appropriate software patching and vulnerability management controls, Medical Assistance Services increases the risk of unauthorized access to sensitive and mission-critical systems. Medical Assistance Services lacks the staffing necessary to remediate the high number of vulnerabilities detected within the timeframes required by its Vulnerability Scan Management procedure. Medical Assistance Services should allocate the necessary resources to apply patches within the Vulnerability Scan Management procedure’s required timeframe to mitigate the vulnerabilities affecting its IT environment. If Medical Assistance Services is unable to mitigate vulnerabilities within the required timeframe, it should obtain an extension approval from CSRM that is based on an organizational assessment of risk. Timely remediation of significant vulnerabilities will help protect the confidentiality, integrity, and availability of Medical Assistance Services’ sensitive and mission-critical information. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-058: Conduct Information Technology Security Audits Applicable to: Department of Social Services Prior Year Finding Number: 2023-056 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Audit and Accountability ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services is making progress in conducting a comprehensive IT security audit on each sensitive system at least once every three years. While Social Services conducted an IT security audit over an additional 22 percent of its sensitive systems, 14 of the 79 sensitive systems (18%) due for an IT Security Audit remain unaudited. Social Services indicates it is on track to complete the remaining IT security audits by the end of calendar year 2025. The Security Standard requires that each IT system classified as sensitive undergo an IT security audit as required by and in accordance with the current version of the Commonwealth’s IT Security Audit Standard, SEC502 (IT Audit Standard). The IT Audit Standard requires that IT systems containing sensitive data, or systems with an assessed sensitivity of high on any of the criteria of confidentiality, integrity, or availability, shall receive an IT security audit at least once every three years. Without conducting full IT security audits for each sensitive system every three years, Social Services increases the risk that IT staff will not detect and mitigate existing weaknesses. Malicious parties taking advantage of continued weaknesses could compromise sensitive and confidential data. Further, such security incidents could lead to mission-critical systems being unavailable. During fiscal year 2024, Social Services’ Audit Services Manager collaborated with the business divisions, TSD, and ISRM to schedule and conduct audits. However, Social Services did not perform the remaining IT security audits due to the large number of sensitive systems requiring an audit. Lack of a documented procedure and process for conducting IT security audits also contributed to the lapse in IT security audits conducted over the last three years. Social Services should define and document a formal procedure and process for conducting IT security audits over each sensitive system at least once every three years that tests the effectiveness of the IT security controls and their compliance with Security Standard requirements. Social Services should then complete all outstanding IT security audits to ensure it meets the Security Standard requirements. Compliance with the IT Audit Standard will help to ensure the confidentiality, integrity, and availability of sensitive and mission critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-061: Develop and Provide Role-Based Security Awareness Training to System Administrators and Data Custodians Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Awareness and Training ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 ISRM does not provide applicable role-based training to system administrators or data custodians that have security roles and responsibilities with elevated privileges. Additionally, ISRM does not document a procedure that outlines the steps it follows to administer the role-based training. An established security awareness training program is essential to protecting agency IT systems and data by ensuring that employees understand their roles and responsibilities in securing sensitive information at the agency. Social Services’ Awareness and Training Policy requires that Social Services’ Information Security Officer or designee provide role-based security and privacy training to personnel with the roles and responsibilities of system administrator and data custodian. Social Services’ Security Awareness and Training Policy and the Security Standard also require that Social Services administer role-based training to personnel before authorizing access to the system, information, or performing assigned duties; and annually thereafter, as well as when required by system changes. Without providing role-based training to all personnel with security-related roles, including personnel with the roles and responsibilities of system administrator and data custodian, Social Services increases the risk of human error and negligence. Additionally, lack of adequate role-based training increases the risk that users will be unaware or lack pertinent skills and knowledge to perform their security-related functions, resulting in an increased security risk. ISRM did not provide role-based training to personnel with designated information security roles due to competing priorities. Additionally, although the Awareness and Training Policy requires role-based training, Social Services does not define and document their process to provide role-based training to personnel with security-related functions, such as the specific training that each role should take, the deadline for role-based training completion, and the enforcement measure resulting from not completing the role-based training timely. ISRM should develop procedures that detail the process to provide role-based training to personnel with designated security roles. ISRM should also develop and administer role-based training for systems administrators and data custodians. Improving the security awareness training program will help protect Social Services from malicious attempts to compromise the confidentiality, integrity, and availability of sensitive data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-064: Upgrade End-of-Life Technology Applicable to: Department of Social Services Prior Year Finding Number: 2023-058; 2022-060 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services uses end-of-life (EOL) technologies in its IT environment and maintains technologies that support mission-essential data on IT systems running software that its vendors no longer support. We communicated the control weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard prohibits agencies from using software that is EOL and which the vendor no longer supports to reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. In May 2024, Social Services established a Cybersecurity Team to track and manage technologies but has not yet completed their processes. Using EOL technologies increases the risk of successful cyberattack, exploit, and data breach by malicious parties. Further, vendors do not offer operational and technical support for EOL or end-of-support technology, which affects data availability by increasing the difficulty of restoring system functionality if a technical failure occurs. Social Services should dedicate the necessary resources to evaluate and implement the controls and recommendations discussed in the communication marked FOIAE in accordance with the Security Standard. By dedicating the necessary resources to evaluate and implement these controls and recommendations, Social Services will help to ensure that it adequately secures its IT environment and systems. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-067: Continue Developing Record Retention Requirements and Processes for Electronic Records Applicable to: Department of Social Services Prior Year Finding Number: 2023-066; 2022-064; 2021-047; 2020-041; 2019-049; 2018-054 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Contingency Planning ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to operate without an adequate data retention process that ensures consistent compliance with retention requirements for its case management system and adherence to federal regulations and state law. Social Services’ case management system stores several types of federal benefit program records with varying retention requirements supporting ten programs and services, such as the Medical Assistance (Medicaid), Supplemental Nutrition Assistance (SNAP), Child Care and Development Fund (CCDF), LIHEAP, and TANF federal grant programs. Social Services’ case management system authorized over $17 billion in public assistance payments to beneficiaries from these federal programs during fiscal year 2024. Since fiscal year 2019, Social Services gathered retention requirements from the business divisions that support the federal programs and services. In fiscal year 2022, Social Services finalized and documented policies with retention requirements for the data sets handled by each of the ten programs and services supported by its case management system. Social Services determined that due to the risk and complexity of the project, as well as changes to federal requirements since its first analysis, the retention requirements for all ten programs and services supported by its case management system were not feasible as a single release. Therefore, Social Services planned a phased delivery approach including multiple releases. In November 2023, Social Services defined and documented a purge and retention design document to implement Release 1 of the record purge and retention project for its case management system. Social Services subsequently implemented Release 1 of the record purge and retention project in February 2024. However, Social Services has not completed the process to implement the records retention policies for each of the programs and services to ensure consistent retention and destruction of records in compliance with regulations and laws. Title 45 CFR § 155.1210, governs record retention for Medicaid and requires state agencies to maintain records for ten years. Additionally, the Virginia Public Records Act outlined in § 42.1-91 of the Code of Virginia makes an agency responsible for ensuring that it preserves, maintains, and makes accessible public records throughout their lifecycle, including converting and migrating electronic records as often as necessary so that an agency does not lose information due to hardware, software, or media obsolescence or deterioration. Furthermore, the Virginia Public Records Act in § 42.1-86.1 of the Code of Virginia details requirements for the disposition of records. Section § 42.1-86.1 requires that records created after July 1, 2006, and authorized to be destroyed or discarded, must be discarded in a timely manner and in accordance with the provisions of Chapter 7 of the Virginia Public Records Act. Further, records that contain identifying information as defined by subsection C of § 18.2-186.3 of the Code of Virginia shall be destroyed within six months of the expiration of the records retention period. Finally, the Security Standard requires agencies to implement backup and restoration plans that address the retention of the data in accordance with the records retention policy for every IT system identified as sensitive relative to availability. Without implementing records retention requirements, Social Services increases the risk of a data or privacy breach. Additionally, destroying documents that should be available for business processes or audit, or keeping data longer than stated, could expose Social Services to fines, penalties, or other legal consequences. Further, Social Services may not be able to ensure that backup and restoration efforts will provide mission critical information according to recovery times. Finally, retaining records longer than necessary causes the Commonwealth to spend additional resources to maintain, back-up, and protect information that no longer serves a business purpose. The magnitude and complexity of effectively implementing a retention and purge process for an integrated eligibility system delayed completion of the record purge and retention project. Additionally, following Release 1 implementation, Social Services identified an additional required element of the purge and retention project. For these reasons, Social Services plans to update the purge and retention design document and implement Release 2 in February 2025. Further, Social Services plans to complete the purge and retention project with the final release, Release 3, by September 2025. Social Services should complete the record purge and retention project for its case management system and, thereafter, implement consistent records retention and destruction processes across business divisions to ensure compliance with laws and regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-068: Monitor Internal Controls to Ensure Timely Removal of System Access Applicable to: Department of Social Services Prior Year Finding Number: 2023-043; 2022-059; 2021-038;2021-027;2020-025;2019-027;2018-042 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Personnel Security ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to implement internal controls to monitor the timely removal of system access. The Security Standard requires the organization to disable information system access within 24 hours of employment termination. In response to the prior audit recommendations, ISRM developed an overarching policy governing system access that addresses the timely removal of system access and Social Services’ Division of Human Resources developed a policy to ensure supervisors follow the appropriate steps to offboard separated employees. Additionally, ISRM and the Division of Human Resources worked collaboratively to develop a process to identify individuals whose separation did not follow the offboarding policy and manually removed their access from Social Services’ access management system. However, because of the extent of its corrective actions, Social Services was not able to implement all of its planned corrective actions by the end of fiscal year 2024. Social Services administers numerous public assistance programs that collect personally identifiable information and other protected information from beneficiaries. Social Services could place its data and reputation at risk by not removing access timely. Additionally, Social Services could incur potential financial liabilities should its information become compromised. Therefore, Social Services should continue its corrective action efforts to implement internal controls to monitor the timely removal of system access. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-071: Continue to Ensure ITISP Suppliers Meet All Contractual Requirements Applicable to: Virginia Information Technologies Agency Prior Year Finding Number: 2023-072; 2022-100; 2021-023; 2020-070 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 VITA has made significant progress to monitor and enforce the contractual requirements for the Information Technology Infrastructure Services Program (ITISP) suppliers. During fiscal year 2024, VITA and the Multisource Service Integration (MSI) continued to evaluate the current service level measurements to ensure they align with the Commonwealth’s needs. VITA and the MSI monitored the service level related to security and vulnerability patching for the entire fiscal year. The requirements of this service level for fiscal year 2024 included a Common Vulnerabilities and Exposures (CVE) threshold, which required that ITISP suppliers install any patch with a CVE score above the threshold within 60 days. If the supplier did not meet the service level threshold, VITA enforced a credit for the Commonwealth. Although VITA monitored the service levels implemented in the prior year, not enough time has passed to prove the effects of the consequences enforced. Our audits at various agencies for fiscal year 2024 found critical and highly important security patches not installed within 30 days as required by the Commonwealth’s Information Security Standard, SEC530 (Security Standard). As a result, the systems missing critical security updates are at an increased risk of cyberattack, exploitation, and data breach by malicious parties. When ITISP suppliers do not meet all contractual requirements (e.g., Service Level Agreements, Critical Deliverables, etc.) it impacts the ability of Commonwealth agencies that rely on the ITISP services to comply with the Security Standard. The Security Standard is a baseline for information security and risk management activities for Commonwealth agencies. Many agencies rely on services provided through ITISP suppliers to ensure compliance with the Security Standard. For example, the Security Standard requires the installation of security-relevant software and firmware updates within at least 30 days of the update’s release or within a timeframe approved by Commonwealth Security and Risk Management (CSRM) . Commonwealth agencies rely on the ITISP suppliers for the installation of security patches in systems that support agencies’ operations. Additionally, during fiscal year 2024, VITA continued to work with the managed security supplier to address the inability of agencies to access the audit log information in the managed detection and response (MDR) platform. VITA implemented a separate security and event management (SIEM) tool at the end of October 2023 to expand agencies’ capabilities to monitor audit log information. While the supplier implemented the MDR platform, VITA and the supplier determined to replace the MDR platform with the VITA-managed SIEM tool as the permanent audit log monitoring tool. However, while the SIEM tool is in production, it also does not include all audit log information in a usable format to allow agencies to adequately monitor their IT environments. The Security Standard requires agencies to review and analyze audit records at least every 30 days for indications of inappropriate or unusual activity. Our audits of various agencies for fiscal year 2024 found that agencies rely on VITA and ITISP suppliers to provide access to a centralized monitoring tool that collects audit log information about activities in the IT environment. Although the supplier was performing audit logging and monitoring, most agencies were unable to obtain access to the audit log information during fiscal year 2024, and thus, were not able to comply with the Security Standard requirements related to audit log monitoring. An inability for all agencies to review and monitor their individual audit logs increases the risk associated with the Commonwealth’s data confidentiality, integrity, and availability. To ensure all agencies that rely on the ITISP’s services comply with the Security Standard, VITA should ensure suppliers meet all contractual requirements (e.g., Service Level Agreements, Critical Deliverables, etc.). If VITA determines suppliers are not meeting these requirements, VITA should implement escalation procedures to compel the ITISP services to comply with the contractual requirements. Additionally, VITA should communicate with the affected agencies and provide guidance on what the agencies can do to comply with the Security Standard while the suppliers work to meet the requirements of the contract. VITA should also continue working with the ITISP suppliers and agencies to import audit log information to the SIEM tool to ensure agencies can review the activities occurring in their IT environments in accordance with the Security Standard. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-082: Perform Responsibilities Outlined in the Agency Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-097; 2022-011; 2021-070; 2020-074; 2019-090; 2018-093 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.303(a); 2 CFR § 200.332 Known Questioned Costs: $0 Compliance continues to not adhere to its established approach to oversee the agency’s subrecipient monitoring activities, as outlined in its Agency Monitoring Plan. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps to ensure adherence to state and federal legal and regulatory standards, including subrecipient monitoring. During fiscal year 2024, Social Services disbursed approximately $660 million to 342 subrecipients from 30 federal grant programs. During the audit, we noted the following deviations from the Agency Monitoring Plan: Compliance continues to not review programmatic division annual subrecipient monitoring plans to ensure they implement a risk-based approach. The Agency Monitoring Plan states that Compliance will use a Monitoring Plan Checklist to evaluate and determine if all the required elements for subrecipient monitoring are present in each division’s plan. Compliance does not hold monthly meetings with Subrecipient Monitoring Coordinators, as required by the Agency Monitoring Plan, where divisions can share information concerning risks and federal and/or grant-specific requirements, approaches to assessing risk, and changes that could affect subrecipients and the monitoring processes. Compliance has not reviewed each division’s monitoring activities nor provided quarterly reports of variances and noncompliance from the Agency Monitoring Plan to Social Services’ executive team. As a result, Compliance did not identify that the Division of Benefit Programs (Benefit Programs) did not complete risk assessments for 50 of its 324 (15%) locality subrecipients, properly document considerations for localities with elevated risks, nor perform adequate risk assessments for their non-locality subrecipients. Since the prior audit, Compliance has communicated the Agency Monitoring Plan to the Subrecipient Monitoring Coordinators. Additionally, Compliance has worked with Social Services’ Executive Team to secure funding for a grants management system and additional subrecipient monitor positions. However, Compliance has yet to establish a timeline for when it intends for the system to be fully functional and has not explored alternate options to comply with its Agency Monitoring Plan. Further, Compliance has not collaborated with Subrecipient Monitoring Coordinators to determine how the agency collectively plans to accomplish the goals and objectives set forth within the Agency Monitoring Plan. Collaboration between Compliance and Subrecipient Monitoring Coordinators is imperative to ensuring that Social Services complies with the pass-through entity requirements in 2 CFR § 200.332. Title 2 CFR § 200.303(a) requires pass-through entities to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the non-Federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Without performing the responsibilities in the Agency Monitoring Plan, Compliance cannot assure that the agency’s subrecipient monitoring efforts are adequate to comply with the regulations at 2 CFR § 200.332. Additionally, Compliance places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards by not monitoring the agency’s subrecipient monitoring activities. Because of the scope of this matter and the magnitude of Social Services’ subrecipient monitoring responsibilities, we consider these weaknesses collectively to create a material weakness in internal controls over compliance. Compliance should work collaboratively with Social Services’ Executive Team and the subrecipient monitoring coordinators to fulfil the agency’s responsibilities in the Agency Monitoring Plan. Further, Compliance should explore alternative solutions to track and monitor each division’s subrecipient monitoring activities and report the results to the Executive Team until it develops and implements its grants management system. Evaluating alternative solutions will help Social Services mitigate the risk of incurring federal sanctions because of non-compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-011: Improve Fiscal Agent Oversight Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(a) Known Questioned Costs: $0 Medical Assistance Services did not obtain and review a System and Organization Controls (SOC) report, specifically a SOC I, Type 2 report, to gain assurance over its fiscal agent’s internal controls relevant to financial reporting. In addition to services related to information systems management and security, Medical Assistance Services contracts with the fiscal agent to perform accurate and timely payments of Medicaid claims to providers and maintain an accounts receivable ledger for the collection of provider funds owed to Medical Assistance Services. The fiscal agent processed over $22 billion in Medicaid-related payments during fiscal year 2024. Medical Assistance Services obtained a SOC 2, Type 2 report related to the fiscal agent’s controls over information systems management and security, however, this report did not provide an opinion over internal controls relevant to Medical Assistance Services’ significant fiscal activity and financial reporting. The Commonwealth’s Accounting Policies and Procedures Manual Topic 10305 requires agencies to have adequate interaction with service providers to appropriately understand the service provider’s internal control environment. It also states that agencies must also maintain oversight over service providers to gain assurance over outsourced operations. Additionally, Title 2 U.S. Code of Federal Regulations (CFR) § 200.303(a) requires non-federal entities to establish and maintain effective internal control over the federal award that provides reasonable assurance that the non-federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. The existing contract between Medical Assistance Services and the fiscal agent does not require the fiscal agent to obtain an independent review opining to the effectiveness of internal controls related to Medical Assistance Services’ significant fiscal activities and financial reporting. Management asserted that they are currently working to modify the contract with the provider to add this requirement. Although management maintains a high degree of interaction with its fiscal agent, they cannot adequately ensure the fiscal agent has designed and implemented sufficient controls, and whether the controls are operating effectively without obtaining and reviewing a SOC I, Type 2 report. This issue increases the risk that management will not detect a weakness in the fiscal agent’s environment, which could negatively impact the Commonwealth. Medical Assistance Services should continue to work with the fiscal agent to add language to the contract that would require the fiscal agent to obtain an appropriate independent audit of its internal controls relevant to Medical Assistance Services’ financial activities and reporting. Once the new contract language is in effect, Medical Assistance Services’ management should obtain and review the SOC I, Type 2 report annually to ensure the fiscal agent is meeting contractual obligations and has proper internal controls over Medical Assistance Services’ significant fiscal activities and financial reporting. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-017: Improve IT Third-Party Oversight Process Applicable to: Department of Medical Assistance Services Prior Year Finding Number: 2023-086; 2022-090 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Third-Party Service Providers (Information Systems) ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services has made progress to document and implement a formal process for maintaining oversight for three of its IT third-party service providers that manage and support its Medicaid management system. The Medicaid management system encompasses different functions, such as member and provider reporting, financial reporting, and federal reporting. Since the prior year audit, Medical Assistance Services developed its Information Technology (IT) Third Party Risk Management Procedure, which was effective on February 1, 2024, to facilitate the implementation of its IT System and Services Acquisition Policy. However, Medical Assistance Services is still working to implement the new procedure, which has resulted in the agency not yet verifying the following required controls and processes for one of the Medicaid management system IT service providers that is not covered by the Virginia Information Technologies Agency (VITA) Commonwealth of Virginia Risk and Authority Management Program. Medical Assistance Services does not confirm the geographic location of sensitive data monthly for IT service providers. Without confirming the geographic location of sensitive data, Medical Assistance Services may be unable to enforce contract requirements, laws, and standards due to the data falling outside of the United States’ jurisdiction. Medical Assistance Services does not confirm whether IT service providers perform vulnerability scans every 90 days. By not obtaining and analyzing the vulnerability scan results from the IT service provider, Medical Assistance Services increases the risk that the IT service providers are not remediating legitimate vulnerabilities in a timely manner. Medical Assistance Services experienced delays in implementing its new procedure due to limited staffing to properly communicate and train those responsible for monitoring IT service providers. Medical Assistance Services expects to complete its implementation by October 2024. Medical Assistance Services should dedicate the resources necessary to finish implementing its Third-Party Risk Management Procedure. Additionally, Medical Assistance Services should ensure that those tasked with monitoring IT service providers are confirming the geographic location of sensitive data and the provider’s performance of vulnerability scanning and remediation efforts per the Security Standard. Medical Assistance Services should also ensure the individuals responsible for monitoring consistently perform formal oversight processes in a timely manner, which will help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-022: Improve Information Security Program and Controls Applicable to: Department of Medical Assistance Services Prior Year Finding Number: 2023-010; 2022-024; 2021-024; 2020-024 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: Access Control; Awareness and Training; Incident Response; Information Security Roles and Responsibilities; Planning; Risk Assessment; Security Assessment and Authorization; System and Services Acquisition ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services continues to address weaknesses in its information technology (IT) general controls originally identified in a 2020 audit and confirmed in a 2023 audit covering the same IT general controls conducted by Medical Assistance Services’ Internal Audit division. During the 2023 audit, Internal Audit tested 105 controls required by the Commonwealth’s previous version of the Information Security Standard, SEC501, and identified 61 individual control weaknesses, a 58% non-compliance rate, that Internal Audit grouped into eight findings. Medical Assistance Services addressed four of the eight findings during fiscal year 2024. Noncompliance with required security controls increases the risk for unauthorized access to mission-critical systems and data in addition to weakening Medical Assistance Services ability to respond to malicious attacks to its IT environment. Medical Assistance Services has experienced delays in addressing these findings due to the number of findings and resources required to remediate the weaknesses. Medical Assistance Services updated its corrective action plan for the four remaining findings in June 2024, stating corrective actions are still ongoing with an estimated completion date of September 2024. Medical Assistance Services should prioritize and dedicate the necessary resources to ensure timely completion of its corrective action plans and to become compliant with the current version of the Commonwealth’s Information Security Standard, SEC530 (Security Standard). These actions will help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-023: Improve Database Security Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control; Audit and Accountability; Configuration Management; Contingency Planning; Identification and Authentication; System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services does not have formal policies, procedures, and a baseline configuration that outlines requirements and justifications for securing and maintaining the database supporting its primary system for financial accounting and reporting operations in accordance with the Security Standard, and industry best practices, such as the Center for Internet Security Benchmarks (CIS Benchmark). As a result, Medical Assistance Services has not implemented some required controls over the database. We communicated the weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. The Security Standard requires Medical Assistance Services to develop, document, and disseminate information security policies and procedures that align with the control requirements in the Security Standard. Additionally, the Security Standard requires Medical Assistance Services to develop, document, and maintain a current baseline configuration of the system and apply more restrictive security configurations for sensitive systems. The Security Standard also requires Medical Assistance Services to review and update the policies, procedures, and baseline configuration on an annual basis and following an environmental change. Without detailed policies, procedures, and a baseline configuration that outlines requirements and justifications for securing and maintaining its database, Medical Assistance Services increases the risk that the system will not meet the minimum security requirements and recommendations to protect its sensitive data from malicious parties. Medical Assistance Services has experienced a lack of resources which has contributed to the absence of documentation outlining control requirements and procedures needed to properly secure the database. The absence of this documentation contributed to the deficiencies communicated in the FOIAE document and as a result, Medical Assistance Services has not consistently evaluated and applied security controls. Medical Assistance Services should dedicate the resources necessary to develop and implement formal policies and procedures to support its database based on the Security Standard requirements and settings recommended by industry best practices, such as the CIS Benchmark. Medical Assistance Services should develop a formal baseline configuration for the database that defines required security controls outlined in industry best practices, such as the CIS Benchmark. The baseline configuration should define deviations from recommended and expected security configurations as well as business justification and approval for any deviations. Additionally, Medical Assistance Services should develop a process to review the database’s configuration against its established baseline configuration on a scheduled basis and after major changes occur to help detect and address potential misconfigurations timely. Furthermore, Medical Assistance Services should implement the security controls and processes communicated in the FOIAE document to address risks present in the database to ensure the configuration aligns with the Security Standard and CIS Benchmark. These actions will help maintain the confidentiality, availability, and integrity of Medical Assistance Services’ sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-024: Continue Improving IT Risk Management Program Applicable to: Department of Social Services Prior Year Finding Number: 2023-014; 2022-030; 2021-026; 2020-027; 2019-063; 2018-025 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Planning; Risk Assessment ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to not have a formal and effective IT risk management program that aligns with the requirements in the Security Standard. Since we first issued this finding in 2018, Social Services remediated some risk management and contingency planning issues. However, Social Services continues not to: accurately verify and validate data and system sensitivity ratings; create risk assessments for 90 percent of its sensitive systems; create system security plans for the 55 current systems identified as sensitive; review risk assessments for 100 percent of its existing documentation; and implement corrective actions identified in risk assessments. We communicated the details of these weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. ISRM and TSD defined and documented a new risk assessment policy and procedure in April 2024. Social Services also established a new risk assessment process that engages system administrators and system owners to complete a risk assessment worksheet to submit to ISRM for evaluation. ISRM meets with system administrators, system owners, and the Agency Head, to review the resulting risk assessment report and establish a risk mitigation plan. However, Social Services has not yet matured the new risk assessment process due to recently formalizing the process. Social Services established the Cybersecurity Team as part of TSD in fiscal year 2024; therefore, the Cybersecurity Team and ISRM have not yet assessed and integrated the various risk management processes. Additionally, the new risk assessment procedure does not define and document the requirements and processes Social Services must follow to implement the corrective action responsibilities. ISRM should work with TSD, the Cybersecurity Team, and business units to ensure Social Services establishes and maintains an up-to-date sensitive systems list. The Information Security Officer, in conjunction with system and data owners, should classify agency IT systems and data based on sensitivity. Following its new risk assessment procedure and process, ISRM and the Cybersecurity Team should prioritize completing risk assessments and system security plans for its sensitive systems and review those documents annually to validate that the information reflects the current environment. Additionally, TSD should implement security controls to mitigate the risks and vulnerabilities identified in its risk assessments. Improving the IT risk management program will help to ensure the confidentiality, integrity, and availability of the agency’s sensitive systems and mission-essential functions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-025: Improve Web Application Security Applicable to: Department of Social Services Prior Year Finding Number: 2023-015; 2022-029; 2021-025; 2020-026; 2019-037 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Audit and Accountability; Configuration Management; Risk Assessment; System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to not configure a sensitive web application in accordance with the Security Standard. During fiscal year 2024, Social Services remediated two of the five previously identified weaknesses; however, these two weaknesses existed during the fiscal year under review. Additionally, Social Services has not remediated three of the previously identified weaknesses. We communicated the weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. Lacking and insufficient procedures and processes to manage the web application contributed to the five weaknesses outlined in the separate FOIAE document. Social Services prioritizing other projects also contributed to the weaknesses persisting. TSD, ISRM, and business owners should work together to remediate the remaining weaknesses to secure the web application and meet the minimum requirements in its internal policies and the Security Standard. Addressing these weaknesses will help to ensure the confidentiality, integrity, and availability of sensitive and mission-critical data and achieve compliance with both internal policies and the Security Standard. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-035: Improve Information Security Program and IT Governance Applicable to: Department of Social Services Prior Year Finding Number: 2023-027; 2022-022 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: Information Security Roles and Responsibilities ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to have an insufficient governance structure to manage and maintain its information security program in accordance with the Security Standard. Specifically, Social Services does not assess information security requirements for its information technology (IT) projects and prioritize information security and IT resources to ensure its information security program effectively protects sensitive Commonwealth data in accordance with the Security Standard. We communicated the control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to its sensitivity and description of security controls. The Security Standard requires the agency head to maintain an information security program that is sufficient to protect the agency’s IT systems and to ensure the agency documents and effectively communicates the information security program. Not prioritizing IT resources to properly manage its information security program can result in a data breach or unauthorized access to confidential and mission-critical data, leading to data corruption, data loss, or system disruption if accessed by a malicious attacker, either internal or external. The control weaknesses described in the communication marked FOIAE are the result of Social Services not assessing information security requirements prior to project implementation, in addition to Social Services not prioritizing information security within the IT environment. Social Services has hindered its ability to consistently and timely remediate findings from management recommendations issued during prior year audits and bring the information security program in compliance with the Security Standard by not dedicating the necessary IT resources to information security. During fiscal year 2024, Social Services created a cybersecurity team under the Technology Services Division (TSD) to liaison between TSD and the Division of Information Security and Risk Management (ISRM) to help bring the information security program in compliance with the Security Standard. However, due to the magnitude of the project, TSD, the cybersecurity team, ISRM, and the executive team have not yet completed efforts to remediate this finding. TSD, ISRM, and Social Services’ Cybersecurity and Executive teams should continue to work together to bring the IT security program in compliance with the Security Standard. TSD and ISRM should continue to evaluate IT resource levels to ensure sufficient resources are available and dedicated to prioritizing and implementing IT governance changes and address the control deficiencies discussed in the communication marked FOIAE. Additionally, Social Services should evaluate the organizational placement of the Information Security Officer (ISO) to ensure effective implementation of the information security program and controls. Implementing these recommendations will help to ensure Social Services protects the confidentiality, integrity, and availability of its sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-041: Evaluate Separation of Duty Conflicts within the Case Management System Applicable to: Department of Social Services Prior Year Finding Number: 2023-034 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Benefit Programs, which is the owner of Social Services’ case management system, has not performed nor documented a conflicting access review to identify the combination of roles that could pose a separation of duties conflict or to ensure compensating controls are in place to mitigate risks arising from those conflicts. Social Services uses the case management system to determine applicant eligibility and authorize benefit payments for the Medicaid, SNAP, CCDF, LIHEAP, and TANF federal grant programs. Social Services authorized over $17 billion in public assistance payments to beneficiaries from these federal programs through its case management system during fiscal year 2024. The Security Standard requires the agency to separate duties of individuals as necessary, document separation of duties of individuals, and define information system access authorizations to support the separation of duties. Further, Social Services’ Information Security Policy states that the system owner is responsible for identifying and documenting separation of duties of individuals and defining system access authorizations to support separation of duties. Without performing and documenting a conflicting access review, Social Services does not know which combination of roles may pose a separation of duties conflict and is unable to implement compensating controls. In effect, this increases the possibility of a system breach or other malicious attack on Social Services’ data and places Social Services’ reputation at risk. Benefit Programs has not yet begun their corrective action efforts and ISRM has not included this finding in its Plan of Actions and Milestones (POAM) report, which is its internal corrective action plan that it shares with Social Services’ Executive Team. As a result, Social Services’ Executive Team was not aware that Social Services continues to be non-compliant with the Security Standard and its Information Security Policy. According to Social Services’ Organizational Structure Report, ISRM provides guidance to system owners about security requirements and is ultimately responsible for protecting Social Services’ information systems by addressing security compliance and risk. Benefit Programs should conduct a conflicting access review for the case management system and collaborate with ISRM to ensure it performs and documents this review in accordance with Social Services’ Information Security Policy. Additionally, ISRM should monitor this finding’s progress through its POAM report and provide periodic updates to Social Services’ Executive Team. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-042: Perform Annual Review of Case Management System Access Applicable to: Department of Social Services Prior Year Finding Number: 2023-035 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Benefit Programs, which is the owner of Social Services’ case management system, continues to not perform the required annual access review. Social Services uses the case management system to determine applicant eligibility and authorize benefit payments for the Medicaid, SNAP, CCDF, LIHEAP, and TANF federal grant programs. Social Services authorized over $17 billion in public assistance payments to beneficiaries from these federal programs through its case management system during fiscal year 2024. The Security Standard requires the agency to review accounts for compliance with account management on an annual basis. Additionally, ISRM’s Procedures Manual for State and Local Security Officers requires system owners and security officers to review user access privileges annually. System owners and security officers must complete this review within 364 days from the completion date of the last security review. Benefit Programs last completed a security review over the case management system in June 2022. Benefit Programs is responsible for obtaining the case management system’s access listing from ISRM, coordinating the annual review with the security officers, and working with ISRM to modify user access privileges as necessary. However, Benefit Programs did not perform the required annual access review for the case management system because it did not initiate the process with ISRM, and ISRM did not include this finding in its POAM report, which is its internal corrective action plan that it shares with Social Services’ Executive Team. As a result, Social Services’ Executive Team was not aware that Social Services continues to be non-compliant with the Security Standard and its Procedures Manual for State and Local Security Officers. According to Social Services’ Organizational Structure Report, ISRM provides guidance to System Owners about security requirements and is ultimately responsible for protecting Social Services’ information systems by addressing security compliance and risk. Social Services increases the risk of improper or unnecessary access to sensitive systems by not reviewing access to the case management system annually, which could potentially result in a system breach or other malicious attack on Social Services’ data and adversely affect its reputation. Benefit Programs should perform the required annual security review for the case management system and collaborate with ISRM to ensure it completes this review in accordance with the Procedures Manual for State and Local Officers. Additionally, ISRM should monitor this finding’s progress through its POAM report and provide periodic updates to Social Services’ Executive Team. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-047: Continue Improving IT Change and Configuration Management Process Applicable to: Department of Social Services Prior Year Finding Number: 2023-049; 2022-052; 2021-049; 2020-044; 2019-038 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to improve its IT change and configuration management process to align with the Security Standard. Change management is a key control to evaluate, approve, and verify configuration changes to security components. Two weaknesses remain since our last review, which we communicated to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing description of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. Social Services’ Change Management Process Guide details the process Social Services follows to manage changes, but does not include all the required elements, which contributed to the weaknesses remaining. Additionally, Social Services migrated to a new change management system of record in October 2023, which also contributed to the delay in remediating the remaining issues due to Social Services prioritizing the migration project. Not prioritizing and aligning IT change management processes with the Security Standard increases the risk of a data breach or unauthorized access to confidential and mission-critical data, leading to data corruption, data loss, or system disruption if accessed by a malicious attacker, either internal or external. Social Services should resolve the remaining two weaknesses discussed in the communication marked FOIAE in accordance with the Security Standard. Continuing to improve Social Services’ IT change and configuration management process will decrease the risk of unauthorized modifications to sensitive systems and help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-053: Improve Vulnerability Remediation Efforts Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Risk Assessment ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services does not install security patches to mitigate vulnerabilities within its IT environment in accordance with its Vulnerability Scan Management procedure. Specifically, as of November 2024, Medical Assistance Services identified a significant number of vulnerabilities classified with a severity of critical and high and numerous vulnerabilities with a severity of medium or low in its IT environment that remained unmitigated beyond the time limits set in its procedure. Medical Assistance Services’ procedure requires the agency to mitigate and validate vulnerabilities within the following timeframes, depending on the vulnerability’s severity rating: High-severity flaws within 30 calendar days; Medium-severity flaws within 60 calendar days; and All others within 90 calendar days. Additionally, the Security Standard requires Medical Assistance Services to “monitor and scan for vulnerabilities in the system and hosted applications at least once every 30 days, and when new vulnerabilities potentially affecting the system are identified and reported.” The Security Standard also requires Medical Assistance Services to remediate legitimate vulnerabilities within 30 days unless otherwise specified by Commonwealth Security Risk Management (CSRM) in accordance with an organizational assessment of risk. The Commonwealth’s IT Risk Management Standard, SEC520 (Risk Management Standard) requires Medical Assistance Services to “fix vulnerabilities within 30 days of a fix becoming available that are either rated as critical or high according to the National Vulnerability Database or otherwise identified by CSRM.” Additionally, the Risk Management Standard requires Medical Assistance Services to remediate all other vulnerabilities within 90 days of a fix becoming available and acquire an approved security exception for the vulnerability should Medical Assistance Services not remediate it within the timeframes identified. Software vulnerabilities are publicly known flaws that bad actors may exploit and use to circumvent organizational information security controls to infiltrate a network or application. The longer these vulnerabilities exist in an environment, the higher the risk of a compromise and unauthorized access to sensitive and mission-critical systems and data. It is therefore imperative for organizations to respond quickly and mitigate these publicly known flaws as soon as possible. Without appropriate software patching and vulnerability management controls, Medical Assistance Services increases the risk of unauthorized access to sensitive and mission-critical systems. Medical Assistance Services lacks the staffing necessary to remediate the high number of vulnerabilities detected within the timeframes required by its Vulnerability Scan Management procedure. Medical Assistance Services should allocate the necessary resources to apply patches within the Vulnerability Scan Management procedure’s required timeframe to mitigate the vulnerabilities affecting its IT environment. If Medical Assistance Services is unable to mitigate vulnerabilities within the required timeframe, it should obtain an extension approval from CSRM that is based on an organizational assessment of risk. Timely remediation of significant vulnerabilities will help protect the confidentiality, integrity, and availability of Medical Assistance Services’ sensitive and mission-critical information. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-058: Conduct Information Technology Security Audits Applicable to: Department of Social Services Prior Year Finding Number: 2023-056 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Audit and Accountability ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services is making progress in conducting a comprehensive IT security audit on each sensitive system at least once every three years. While Social Services conducted an IT security audit over an additional 22 percent of its sensitive systems, 14 of the 79 sensitive systems (18%) due for an IT Security Audit remain unaudited. Social Services indicates it is on track to complete the remaining IT security audits by the end of calendar year 2025. The Security Standard requires that each IT system classified as sensitive undergo an IT security audit as required by and in accordance with the current version of the Commonwealth’s IT Security Audit Standard, SEC502 (IT Audit Standard). The IT Audit Standard requires that IT systems containing sensitive data, or systems with an assessed sensitivity of high on any of the criteria of confidentiality, integrity, or availability, shall receive an IT security audit at least once every three years. Without conducting full IT security audits for each sensitive system every three years, Social Services increases the risk that IT staff will not detect and mitigate existing weaknesses. Malicious parties taking advantage of continued weaknesses could compromise sensitive and confidential data. Further, such security incidents could lead to mission-critical systems being unavailable. During fiscal year 2024, Social Services’ Audit Services Manager collaborated with the business divisions, TSD, and ISRM to schedule and conduct audits. However, Social Services did not perform the remaining IT security audits due to the large number of sensitive systems requiring an audit. Lack of a documented procedure and process for conducting IT security audits also contributed to the lapse in IT security audits conducted over the last three years. Social Services should define and document a formal procedure and process for conducting IT security audits over each sensitive system at least once every three years that tests the effectiveness of the IT security controls and their compliance with Security Standard requirements. Social Services should then complete all outstanding IT security audits to ensure it meets the Security Standard requirements. Compliance with the IT Audit Standard will help to ensure the confidentiality, integrity, and availability of sensitive and mission critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-061: Develop and Provide Role-Based Security Awareness Training to System Administrators and Data Custodians Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Awareness and Training ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 ISRM does not provide applicable role-based training to system administrators or data custodians that have security roles and responsibilities with elevated privileges. Additionally, ISRM does not document a procedure that outlines the steps it follows to administer the role-based training. An established security awareness training program is essential to protecting agency IT systems and data by ensuring that employees understand their roles and responsibilities in securing sensitive information at the agency. Social Services’ Awareness and Training Policy requires that Social Services’ Information Security Officer or designee provide role-based security and privacy training to personnel with the roles and responsibilities of system administrator and data custodian. Social Services’ Security Awareness and Training Policy and the Security Standard also require that Social Services administer role-based training to personnel before authorizing access to the system, information, or performing assigned duties; and annually thereafter, as well as when required by system changes. Without providing role-based training to all personnel with security-related roles, including personnel with the roles and responsibilities of system administrator and data custodian, Social Services increases the risk of human error and negligence. Additionally, lack of adequate role-based training increases the risk that users will be unaware or lack pertinent skills and knowledge to perform their security-related functions, resulting in an increased security risk. ISRM did not provide role-based training to personnel with designated information security roles due to competing priorities. Additionally, although the Awareness and Training Policy requires role-based training, Social Services does not define and document their process to provide role-based training to personnel with security-related functions, such as the specific training that each role should take, the deadline for role-based training completion, and the enforcement measure resulting from not completing the role-based training timely. ISRM should develop procedures that detail the process to provide role-based training to personnel with designated security roles. ISRM should also develop and administer role-based training for systems administrators and data custodians. Improving the security awareness training program will help protect Social Services from malicious attempts to compromise the confidentiality, integrity, and availability of sensitive data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-064: Upgrade End-of-Life Technology Applicable to: Department of Social Services Prior Year Finding Number: 2023-058; 2022-060 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services uses end-of-life (EOL) technologies in its IT environment and maintains technologies that support mission-essential data on IT systems running software that its vendors no longer support. We communicated the control weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard prohibits agencies from using software that is EOL and which the vendor no longer supports to reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. In May 2024, Social Services established a Cybersecurity Team to track and manage technologies but has not yet completed their processes. Using EOL technologies increases the risk of successful cyberattack, exploit, and data breach by malicious parties. Further, vendors do not offer operational and technical support for EOL or end-of-support technology, which affects data availability by increasing the difficulty of restoring system functionality if a technical failure occurs. Social Services should dedicate the necessary resources to evaluate and implement the controls and recommendations discussed in the communication marked FOIAE in accordance with the Security Standard. By dedicating the necessary resources to evaluate and implement these controls and recommendations, Social Services will help to ensure that it adequately secures its IT environment and systems. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-067: Continue Developing Record Retention Requirements and Processes for Electronic Records Applicable to: Department of Social Services Prior Year Finding Number: 2023-066; 2022-064; 2021-047; 2020-041; 2019-049; 2018-054 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Contingency Planning ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to operate without an adequate data retention process that ensures consistent compliance with retention requirements for its case management system and adherence to federal regulations and state law. Social Services’ case management system stores several types of federal benefit program records with varying retention requirements supporting ten programs and services, such as the Medical Assistance (Medicaid), Supplemental Nutrition Assistance (SNAP), Child Care and Development Fund (CCDF), LIHEAP, and TANF federal grant programs. Social Services’ case management system authorized over $17 billion in public assistance payments to beneficiaries from these federal programs during fiscal year 2024. Since fiscal year 2019, Social Services gathered retention requirements from the business divisions that support the federal programs and services. In fiscal year 2022, Social Services finalized and documented policies with retention requirements for the data sets handled by each of the ten programs and services supported by its case management system. Social Services determined that due to the risk and complexity of the project, as well as changes to federal requirements since its first analysis, the retention requirements for all ten programs and services supported by its case management system were not feasible as a single release. Therefore, Social Services planned a phased delivery approach including multiple releases. In November 2023, Social Services defined and documented a purge and retention design document to implement Release 1 of the record purge and retention project for its case management system. Social Services subsequently implemented Release 1 of the record purge and retention project in February 2024. However, Social Services has not completed the process to implement the records retention policies for each of the programs and services to ensure consistent retention and destruction of records in compliance with regulations and laws. Title 45 CFR § 155.1210, governs record retention for Medicaid and requires state agencies to maintain records for ten years. Additionally, the Virginia Public Records Act outlined in § 42.1-91 of the Code of Virginia makes an agency responsible for ensuring that it preserves, maintains, and makes accessible public records throughout their lifecycle, including converting and migrating electronic records as often as necessary so that an agency does not lose information due to hardware, software, or media obsolescence or deterioration. Furthermore, the Virginia Public Records Act in § 42.1-86.1 of the Code of Virginia details requirements for the disposition of records. Section § 42.1-86.1 requires that records created after July 1, 2006, and authorized to be destroyed or discarded, must be discarded in a timely manner and in accordance with the provisions of Chapter 7 of the Virginia Public Records Act. Further, records that contain identifying information as defined by subsection C of § 18.2-186.3 of the Code of Virginia shall be destroyed within six months of the expiration of the records retention period. Finally, the Security Standard requires agencies to implement backup and restoration plans that address the retention of the data in accordance with the records retention policy for every IT system identified as sensitive relative to availability. Without implementing records retention requirements, Social Services increases the risk of a data or privacy breach. Additionally, destroying documents that should be available for business processes or audit, or keeping data longer than stated, could expose Social Services to fines, penalties, or other legal consequences. Further, Social Services may not be able to ensure that backup and restoration efforts will provide mission critical information according to recovery times. Finally, retaining records longer than necessary causes the Commonwealth to spend additional resources to maintain, back-up, and protect information that no longer serves a business purpose. The magnitude and complexity of effectively implementing a retention and purge process for an integrated eligibility system delayed completion of the record purge and retention project. Additionally, following Release 1 implementation, Social Services identified an additional required element of the purge and retention project. For these reasons, Social Services plans to update the purge and retention design document and implement Release 2 in February 2025. Further, Social Services plans to complete the purge and retention project with the final release, Release 3, by September 2025. Social Services should complete the record purge and retention project for its case management system and, thereafter, implement consistent records retention and destruction processes across business divisions to ensure compliance with laws and regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-068: Monitor Internal Controls to Ensure Timely Removal of System Access Applicable to: Department of Social Services Prior Year Finding Number: 2023-043; 2022-059; 2021-038;2021-027;2020-025;2019-027;2018-042 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Personnel Security ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to implement internal controls to monitor the timely removal of system access. The Security Standard requires the organization to disable information system access within 24 hours of employment termination. In response to the prior audit recommendations, ISRM developed an overarching policy governing system access that addresses the timely removal of system access and Social Services’ Division of Human Resources developed a policy to ensure supervisors follow the appropriate steps to offboard separated employees. Additionally, ISRM and the Division of Human Resources worked collaboratively to develop a process to identify individuals whose separation did not follow the offboarding policy and manually removed their access from Social Services’ access management system. However, because of the extent of its corrective actions, Social Services was not able to implement all of its planned corrective actions by the end of fiscal year 2024. Social Services administers numerous public assistance programs that collect personally identifiable information and other protected information from beneficiaries. Social Services could place its data and reputation at risk by not removing access timely. Additionally, Social Services could incur potential financial liabilities should its information become compromised. Therefore, Social Services should continue its corrective action efforts to implement internal controls to monitor the timely removal of system access. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-071: Continue to Ensure ITISP Suppliers Meet All Contractual Requirements Applicable to: Virginia Information Technologies Agency Prior Year Finding Number: 2023-072; 2022-100; 2021-023; 2020-070 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 VITA has made significant progress to monitor and enforce the contractual requirements for the Information Technology Infrastructure Services Program (ITISP) suppliers. During fiscal year 2024, VITA and the Multisource Service Integration (MSI) continued to evaluate the current service level measurements to ensure they align with the Commonwealth’s needs. VITA and the MSI monitored the service level related to security and vulnerability patching for the entire fiscal year. The requirements of this service level for fiscal year 2024 included a Common Vulnerabilities and Exposures (CVE) threshold, which required that ITISP suppliers install any patch with a CVE score above the threshold within 60 days. If the supplier did not meet the service level threshold, VITA enforced a credit for the Commonwealth. Although VITA monitored the service levels implemented in the prior year, not enough time has passed to prove the effects of the consequences enforced. Our audits at various agencies for fiscal year 2024 found critical and highly important security patches not installed within 30 days as required by the Commonwealth’s Information Security Standard, SEC530 (Security Standard). As a result, the systems missing critical security updates are at an increased risk of cyberattack, exploitation, and data breach by malicious parties. When ITISP suppliers do not meet all contractual requirements (e.g., Service Level Agreements, Critical Deliverables, etc.) it impacts the ability of Commonwealth agencies that rely on the ITISP services to comply with the Security Standard. The Security Standard is a baseline for information security and risk management activities for Commonwealth agencies. Many agencies rely on services provided through ITISP suppliers to ensure compliance with the Security Standard. For example, the Security Standard requires the installation of security-relevant software and firmware updates within at least 30 days of the update’s release or within a timeframe approved by Commonwealth Security and Risk Management (CSRM) . Commonwealth agencies rely on the ITISP suppliers for the installation of security patches in systems that support agencies’ operations. Additionally, during fiscal year 2024, VITA continued to work with the managed security supplier to address the inability of agencies to access the audit log information in the managed detection and response (MDR) platform. VITA implemented a separate security and event management (SIEM) tool at the end of October 2023 to expand agencies’ capabilities to monitor audit log information. While the supplier implemented the MDR platform, VITA and the supplier determined to replace the MDR platform with the VITA-managed SIEM tool as the permanent audit log monitoring tool. However, while the SIEM tool is in production, it also does not include all audit log information in a usable format to allow agencies to adequately monitor their IT environments. The Security Standard requires agencies to review and analyze audit records at least every 30 days for indications of inappropriate or unusual activity. Our audits of various agencies for fiscal year 2024 found that agencies rely on VITA and ITISP suppliers to provide access to a centralized monitoring tool that collects audit log information about activities in the IT environment. Although the supplier was performing audit logging and monitoring, most agencies were unable to obtain access to the audit log information during fiscal year 2024, and thus, were not able to comply with the Security Standard requirements related to audit log monitoring. An inability for all agencies to review and monitor their individual audit logs increases the risk associated with the Commonwealth’s data confidentiality, integrity, and availability. To ensure all agencies that rely on the ITISP’s services comply with the Security Standard, VITA should ensure suppliers meet all contractual requirements (e.g., Service Level Agreements, Critical Deliverables, etc.). If VITA determines suppliers are not meeting these requirements, VITA should implement escalation procedures to compel the ITISP services to comply with the contractual requirements. Additionally, VITA should communicate with the affected agencies and provide guidance on what the agencies can do to comply with the Security Standard while the suppliers work to meet the requirements of the contract. VITA should also continue working with the ITISP suppliers and agencies to import audit log information to the SIEM tool to ensure agencies can review the activities occurring in their IT environments in accordance with the Security Standard. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-082: Perform Responsibilities Outlined in the Agency Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-097; 2022-011; 2021-070; 2020-074; 2019-090; 2018-093 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.303(a); 2 CFR § 200.332 Known Questioned Costs: $0 Compliance continues to not adhere to its established approach to oversee the agency’s subrecipient monitoring activities, as outlined in its Agency Monitoring Plan. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps to ensure adherence to state and federal legal and regulatory standards, including subrecipient monitoring. During fiscal year 2024, Social Services disbursed approximately $660 million to 342 subrecipients from 30 federal grant programs. During the audit, we noted the following deviations from the Agency Monitoring Plan: Compliance continues to not review programmatic division annual subrecipient monitoring plans to ensure they implement a risk-based approach. The Agency Monitoring Plan states that Compliance will use a Monitoring Plan Checklist to evaluate and determine if all the required elements for subrecipient monitoring are present in each division’s plan. Compliance does not hold monthly meetings with Subrecipient Monitoring Coordinators, as required by the Agency Monitoring Plan, where divisions can share information concerning risks and federal and/or grant-specific requirements, approaches to assessing risk, and changes that could affect subrecipients and the monitoring processes. Compliance has not reviewed each division’s monitoring activities nor provided quarterly reports of variances and noncompliance from the Agency Monitoring Plan to Social Services’ executive team. As a result, Compliance did not identify that the Division of Benefit Programs (Benefit Programs) did not complete risk assessments for 50 of its 324 (15%) locality subrecipients, properly document considerations for localities with elevated risks, nor perform adequate risk assessments for their non-locality subrecipients. Since the prior audit, Compliance has communicated the Agency Monitoring Plan to the Subrecipient Monitoring Coordinators. Additionally, Compliance has worked with Social Services’ Executive Team to secure funding for a grants management system and additional subrecipient monitor positions. However, Compliance has yet to establish a timeline for when it intends for the system to be fully functional and has not explored alternate options to comply with its Agency Monitoring Plan. Further, Compliance has not collaborated with Subrecipient Monitoring Coordinators to determine how the agency collectively plans to accomplish the goals and objectives set forth within the Agency Monitoring Plan. Collaboration between Compliance and Subrecipient Monitoring Coordinators is imperative to ensuring that Social Services complies with the pass-through entity requirements in 2 CFR § 200.332. Title 2 CFR § 200.303(a) requires pass-through entities to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the non-Federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Without performing the responsibilities in the Agency Monitoring Plan, Compliance cannot assure that the agency’s subrecipient monitoring efforts are adequate to comply with the regulations at 2 CFR § 200.332. Additionally, Compliance places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards by not monitoring the agency’s subrecipient monitoring activities. Because of the scope of this matter and the magnitude of Social Services’ subrecipient monitoring responsibilities, we consider these weaknesses collectively to create a material weakness in internal controls over compliance. Compliance should work collaboratively with Social Services’ Executive Team and the subrecipient monitoring coordinators to fulfil the agency’s responsibilities in the Agency Monitoring Plan. Further, Compliance should explore alternative solutions to track and monitor each division’s subrecipient monitoring activities and report the results to the Executive Team until it develops and implements its grants management system. Evaluating alternative solutions will help Social Services mitigate the risk of incurring federal sanctions because of non-compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-010: Obtain, Review, and Document System and Organization Control Reports of Third-Party Service Providers Applicable to: Department of Social Services Prior Year Finding Number: 2023-085; 2022-089; 2021-019 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Pandemic EBT Food Benefits - 10.542 Federal Award Number and Year: Not Applicable - 2024 Name of Federal Agency: U.S. Department of Agriculture Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(a) Known Questioned Costs: $0 Social Services continues to not obtain, review, and document System and Organization Controls (SOC) reports, specifically SOC 1, Type 2 reports, to gain assurance over its third-party service providers’ internal controls relevant to financial reporting. SOC 1, Type 2 reports address the service organization’s internal controls and the effect those internal controls may have on the user entity’s financial statements. Social Services uses service organizations to perform functions that are significant to its financial operations such as administering the electronic benefit transfer (EBT) process for several of its public assistance programs. For instance, during fiscal year 2024, one of Social Services’ third-party service providers issued more than $2 billion in financial assistance to beneficiaries on EBT cards. Topic 10305 of the CAPP Manual requires agencies to have adequate interaction with service providers to appropriately understand the service provider’s internal control environment and maintain oversight over service providers to gain assurance over outsourced operations. Additionally, 2 CFR § 200.303(a) requires non-federal entities to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the non-federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Social Services’ tasks contract administrators with responsibility for obtaining, reviewing, and documenting SOC 1, Type 2 reports. However, contract administrators are often not familiar with the CAPP Manual requirements, and Social Services has not made them aware of the expectations for obtaining, reviewing, and documenting SOC 1, Type 2 reports through a documented policy and procedure. As a result, contract administrators have not been obtaining, reviewing, and documenting SOC 1, Type 2 reports. Without adopting a policy and procedure over SOC 1, Type 2 reports and communicating those expectations to contract administrators, Social Services is unable to ensure its complementary user entity controls are sufficient to support their reliance on the service providers’ control design, implementation, and operating effectiveness. Additionally, Social Services is unable to address any internal control deficiencies and/or exceptions identified in the SOC 1, Type 2 reports. In effect, Social Services is increasing the risk that it will not detect a weakness in a service provider’s environment by not obtaining the necessary SOC 1, Type 2 reports timely or properly documenting its review of the reports. Social Services should designate a resource within the agency, who is knowledgeable of the CAPP Manual and SOC 1, Type 2 report requirements, with responsibility for developing an office-wide policy and procedure that contract administrators can use for obtaining, reviewing, and documenting SOC 1, Type 2 reports. At a minimum, Social Services’ policy and procedure should include the timeframes for obtaining SOC 1, Type 2 reports from service providers, documentation requirements for user entity complementary controls, the steps needed to address internal control deficiencies and/or exceptions found in reviews, and the staff responsible for any corrective actions necessary to mitigate the risk to the Commonwealth until the service provider corrects the deficiency. Thereafter, Social Services should communicate the policy and procedure to all individuals responsible for overseeing service provider operations to ensure compliance with federal and state regulations. Finally, Social Services should retain this information as part of its annual Agency Risk Management and Internal Control Standard certification. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-032: Improve Database Security Applicable to: Department of Education - Direct Aid to Public Education Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management; Audit and Accountability ALPT or Cluster Name and ALN: Coronavirus State and Local Fiscal Recovery Funds (CSLFRF) - 21.027; Supporting Effective Instruction State Grants (formerly Improving Teacher Quality State Grants) - 84.367 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Treasury; U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Education does not implement some of the required controls to protect the database that supports Education’s system of record. The Commonwealth’s Information Security Standard, SEC530 (Security Standard), and industry best practices, such as the Center for Internet Security, prescribe certain required and recommended security controls to safeguard systems that contain or process sensitive data. The Security Standard requires and industry best practices recommend implementing specific controls to reduce unnecessary risk to data confidentiality, integrity, and availability. We communicated three control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. By not meeting the minimum requirements in the Security Standard and not aligning the database’s settings and configurations with industry best practices, Education cannot appropriately manage and maintain the database and ensure data integrity. Education should allocate the necessary resources to ensure database configurations, controls, and processes align with the requirements in the Security Standard and industry best practices. Implementing these controls will help maintain the confidentiality, integrity, and availability of the sensitive and mission critical data stored or processed in the database. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-032: Improve Database Security Applicable to: Department of Education - Direct Aid to Public Education Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management; Audit and Accountability ALPT or Cluster Name and ALN: Coronavirus State and Local Fiscal Recovery Funds (CSLFRF) - 21.027; Supporting Effective Instruction State Grants (formerly Improving Teacher Quality State Grants) - 84.367 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Treasury; U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Education does not implement some of the required controls to protect the database that supports Education’s system of record. The Commonwealth’s Information Security Standard, SEC530 (Security Standard), and industry best practices, such as the Center for Internet Security, prescribe certain required and recommended security controls to safeguard systems that contain or process sensitive data. The Security Standard requires and industry best practices recommend implementing specific controls to reduce unnecessary risk to data confidentiality, integrity, and availability. We communicated three control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. By not meeting the minimum requirements in the Security Standard and not aligning the database’s settings and configurations with industry best practices, Education cannot appropriately manage and maintain the database and ensure data integrity. Education should allocate the necessary resources to ensure database configurations, controls, and processes align with the requirements in the Security Standard and industry best practices. Implementing these controls will help maintain the confidentiality, integrity, and availability of the sensitive and mission critical data stored or processed in the database. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-032: Improve Database Security Applicable to: Department of Education - Direct Aid to Public Education Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management; Audit and Accountability ALPT or Cluster Name and ALN: Coronavirus State and Local Fiscal Recovery Funds (CSLFRF) - 21.027; Supporting Effective Instruction State Grants (formerly Improving Teacher Quality State Grants) - 84.367 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Treasury; U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Education does not implement some of the required controls to protect the database that supports Education’s system of record. The Commonwealth’s Information Security Standard, SEC530 (Security Standard), and industry best practices, such as the Center for Internet Security, prescribe certain required and recommended security controls to safeguard systems that contain or process sensitive data. The Security Standard requires and industry best practices recommend implementing specific controls to reduce unnecessary risk to data confidentiality, integrity, and availability. We communicated three control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. By not meeting the minimum requirements in the Security Standard and not aligning the database’s settings and configurations with industry best practices, Education cannot appropriately manage and maintain the database and ensure data integrity. Education should allocate the necessary resources to ensure database configurations, controls, and processes align with the requirements in the Security Standard and industry best practices. Implementing these controls will help maintain the confidentiality, integrity, and availability of the sensitive and mission critical data stored or processed in the database. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-032: Improve Database Security Applicable to: Department of Education - Direct Aid to Public Education Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management; Audit and Accountability ALPT or Cluster Name and ALN: Coronavirus State and Local Fiscal Recovery Funds (CSLFRF) - 21.027; Supporting Effective Instruction State Grants (formerly Improving Teacher Quality State Grants) - 84.367 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Treasury; U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Education does not implement some of the required controls to protect the database that supports Education’s system of record. The Commonwealth’s Information Security Standard, SEC530 (Security Standard), and industry best practices, such as the Center for Internet Security, prescribe certain required and recommended security controls to safeguard systems that contain or process sensitive data. The Security Standard requires and industry best practices recommend implementing specific controls to reduce unnecessary risk to data confidentiality, integrity, and availability. We communicated three control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. By not meeting the minimum requirements in the Security Standard and not aligning the database’s settings and configurations with industry best practices, Education cannot appropriately manage and maintain the database and ensure data integrity. Education should allocate the necessary resources to ensure database configurations, controls, and processes align with the requirements in the Security Standard and industry best practices. Implementing these controls will help maintain the confidentiality, integrity, and availability of the sensitive and mission critical data stored or processed in the database. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-032: Improve Database Security Applicable to: Department of Education - Direct Aid to Public Education Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management; Audit and Accountability ALPT or Cluster Name and ALN: Coronavirus State and Local Fiscal Recovery Funds (CSLFRF) - 21.027; Supporting Effective Instruction State Grants (formerly Improving Teacher Quality State Grants) - 84.367 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Treasury; U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Education does not implement some of the required controls to protect the database that supports Education’s system of record. The Commonwealth’s Information Security Standard, SEC530 (Security Standard), and industry best practices, such as the Center for Internet Security, prescribe certain required and recommended security controls to safeguard systems that contain or process sensitive data. The Security Standard requires and industry best practices recommend implementing specific controls to reduce unnecessary risk to data confidentiality, integrity, and availability. We communicated three control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. By not meeting the minimum requirements in the Security Standard and not aligning the database’s settings and configurations with industry best practices, Education cannot appropriately manage and maintain the database and ensure data integrity. Education should allocate the necessary resources to ensure database configurations, controls, and processes align with the requirements in the Security Standard and industry best practices. Implementing these controls will help maintain the confidentiality, integrity, and availability of the sensitive and mission critical data stored or processed in the database. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-090: Improve Reporting to the National Student Loan Data System Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College; Old Dominion University; Radford University; University of Virginia; Virginia State University Prior Year Finding Number: 2021-078; 2018-101 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 685.309 Known Questioned Costs: $0 The institutions noted below did not properly report accurate and/or timely enrollment data to the Department of Education (ED) using the National Student Loan Data System (NSLDS) in accordance with 34 CFR § 685.309 and the NSLDS Enrollment Guide, for students that had withdrawn, graduated or changed enrollment levels. The accuracy of Title IV enrollment data depends heavily on information reported by institutions. The institutions’ inaccurate and untimely enrollment data submissions to NSLDS can affect ED’s reliance on NSLDS for monitoring purposes and may interfere with establishing a student’s loan status, deferment privileges and grace periods. In addition, noncompliance may also impact an institution’s participation in Title IV programs. George Mason University GMU management determined the discrepancies in its enrollment reporting submissions were due to a lack of communication between the Office of the University Registrar and the Office of Student Financial Aid. From our sample of 40 students, we noted the following instances of noncompliance: GMU reported an inaccurate enrollment status for seven students (18%); GMU reported an inaccurate enrollment status effective date for nine students (23%); GMU did not report enrollment status changes timely for seven students (18%); GMU reported inaccurate information in at least one campus or program-level field deemed critical for nine students (23%); and GMU did not provide evidence supporting that it reported accurate physical addresses in NSLDS for eight students (20%). Norfolk State University NSU management indicated the errors in its enrollment reporting submissions were due to staff turnover in the Office of the Registrar and programming issues within the student information system. From our sample of 39 students, we noted the following instances of noncompliance: NSU reported an inaccurate enrollment status for six students (15%); NSU reported an inaccurate enrollment status effective date for 26 students (67%); NSU did not report enrollment status changes timely for one student (3%); and NSU reported inaccurate information in at least one campus or program-level field deemed critical for 17 students (44%). Northern Virginia Community College A lack of management oversight in NVCC’s Registrar’s Office led to the discrepancies in its enrollment reporting submissions. From our sample of 40 students, we noted the following instances of noncompliance: NVCC reported an inaccurate enrollment status for ten students (25%); NVCC reported an inaccurate enrollment status effective date for 12 students (30%); NVCC did not report enrollment status changes timely for eight students (20%); NVCC reported inaccurate information in at least one campus or program-level field deemed critical for 14 students (35%); and NVCC could not demonstrate proper approval for the academic program for one student (3%), since the academic program did not appear on the State Council of Higher Education for Virginia (SCHEV) degree inventory report. Old Dominion University ODU management indicated the errors in its enrollment reporting submission were due to staff turnover. From our sample of 50 students, we noted the following instances of noncompliance: ODU reported an inaccurate enrollment status for nine students (18%); ODU reported an inaccurate enrollment status effective date for 29 students (58%); ODU did not report enrollment status changes timely for 15 students (30%); and ODU reported inaccurate information in at least one campus or program-level field deemed critical for 29 students (58%). Radford University The primary cause of the discrepancies in RU’s enrollment reporting submissions was staff turnover and the time required for new staff to become proficient in their responsibilities. From our sample of 43 students, we noted the following instances of noncompliance: RU reported an inaccurate enrollment status for one student (2%); RU reported an inaccurate enrollment status effective date for three students (7%); RU did not report enrollment status changes timely for 10 students (23%); RU reported inaccurate information in at least one campus or program-level field deemed critical for three students (7%); and RU could not demonstrate proper approval for the academic program for one student (2%), since the academic program did not appear on the SCHEV degree inventory report. University of Virginia The underlying causes for the discrepancies in UVA’s enrollment reporting submissions were data entry errors and batch processing issues. Specifically, UVA recorded a student’s social security number inaccurately in its Student Information System. Additionally, batch enrollment updates caused new data submissions to overwrite previous data, which resulted in deactivated and inaccurate enrollment records. From our review of 40 students, we noted the following instances of noncompliance: UVA reported an inaccurate enrollment status effective date for four students (10%); UVA did not report enrollment status changes timely for five students (13%); and UVA reported inaccurate information in at least one campus or program-level field deemed critical for four students (10%). Virginia State University A lack of management oversight in VSU’s enrollment reporting process led to the discrepancies in its enrollment reporting submissions. From our sample of 49 students, we noted the following instances of noncompliance: VSU reported an inaccurate enrollment status for three students (6%); VSU reported an inaccurate enrollment status effective date for six students (12%); VSU did not report enrollment status changes timely for 21 students (43%); VSU reported inaccurate information in at least one campus or program-level field deemed critical for 10 students (20%); VSU could not demonstrate proper approval for the academic program for eight students (16%), since the academic program did not appear on the SCHEV degree inventory report; and The permanent address for two out of 39 applicable federal Direct Loan borrowers (5%) did not agree between the student information system and NSLDS. Recommendation Each institution should evaluate its current enrollment reporting procedures and implement corrective action to ensure it reports accurate and timely student enrollment data to NSLDS to prevent future noncompliance. Where applicable, institutions should also consider implementing a quality control review process to monitor the accuracy of campus and program-level batch submissions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-090: Improve Reporting to the National Student Loan Data System Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College; Old Dominion University; Radford University; University of Virginia; Virginia State University Prior Year Finding Number: 2021-078; 2018-101 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 685.309 Known Questioned Costs: $0 The institutions noted below did not properly report accurate and/or timely enrollment data to the Department of Education (ED) using the National Student Loan Data System (NSLDS) in accordance with 34 CFR § 685.309 and the NSLDS Enrollment Guide, for students that had withdrawn, graduated or changed enrollment levels. The accuracy of Title IV enrollment data depends heavily on information reported by institutions. The institutions’ inaccurate and untimely enrollment data submissions to NSLDS can affect ED’s reliance on NSLDS for monitoring purposes and may interfere with establishing a student’s loan status, deferment privileges and grace periods. In addition, noncompliance may also impact an institution’s participation in Title IV programs. George Mason University GMU management determined the discrepancies in its enrollment reporting submissions were due to a lack of communication between the Office of the University Registrar and the Office of Student Financial Aid. From our sample of 40 students, we noted the following instances of noncompliance: GMU reported an inaccurate enrollment status for seven students (18%); GMU reported an inaccurate enrollment status effective date for nine students (23%); GMU did not report enrollment status changes timely for seven students (18%); GMU reported inaccurate information in at least one campus or program-level field deemed critical for nine students (23%); and GMU did not provide evidence supporting that it reported accurate physical addresses in NSLDS for eight students (20%). Norfolk State University NSU management indicated the errors in its enrollment reporting submissions were due to staff turnover in the Office of the Registrar and programming issues within the student information system. From our sample of 39 students, we noted the following instances of noncompliance: NSU reported an inaccurate enrollment status for six students (15%); NSU reported an inaccurate enrollment status effective date for 26 students (67%); NSU did not report enrollment status changes timely for one student (3%); and NSU reported inaccurate information in at least one campus or program-level field deemed critical for 17 students (44%). Northern Virginia Community College A lack of management oversight in NVCC’s Registrar’s Office led to the discrepancies in its enrollment reporting submissions. From our sample of 40 students, we noted the following instances of noncompliance: NVCC reported an inaccurate enrollment status for ten students (25%); NVCC reported an inaccurate enrollment status effective date for 12 students (30%); NVCC did not report enrollment status changes timely for eight students (20%); NVCC reported inaccurate information in at least one campus or program-level field deemed critical for 14 students (35%); and NVCC could not demonstrate proper approval for the academic program for one student (3%), since the academic program did not appear on the State Council of Higher Education for Virginia (SCHEV) degree inventory report. Old Dominion University ODU management indicated the errors in its enrollment reporting submission were due to staff turnover. From our sample of 50 students, we noted the following instances of noncompliance: ODU reported an inaccurate enrollment status for nine students (18%); ODU reported an inaccurate enrollment status effective date for 29 students (58%); ODU did not report enrollment status changes timely for 15 students (30%); and ODU reported inaccurate information in at least one campus or program-level field deemed critical for 29 students (58%). Radford University The primary cause of the discrepancies in RU’s enrollment reporting submissions was staff turnover and the time required for new staff to become proficient in their responsibilities. From our sample of 43 students, we noted the following instances of noncompliance: RU reported an inaccurate enrollment status for one student (2%); RU reported an inaccurate enrollment status effective date for three students (7%); RU did not report enrollment status changes timely for 10 students (23%); RU reported inaccurate information in at least one campus or program-level field deemed critical for three students (7%); and RU could not demonstrate proper approval for the academic program for one student (2%), since the academic program did not appear on the SCHEV degree inventory report. University of Virginia The underlying causes for the discrepancies in UVA’s enrollment reporting submissions were data entry errors and batch processing issues. Specifically, UVA recorded a student’s social security number inaccurately in its Student Information System. Additionally, batch enrollment updates caused new data submissions to overwrite previous data, which resulted in deactivated and inaccurate enrollment records. From our review of 40 students, we noted the following instances of noncompliance: UVA reported an inaccurate enrollment status effective date for four students (10%); UVA did not report enrollment status changes timely for five students (13%); and UVA reported inaccurate information in at least one campus or program-level field deemed critical for four students (10%). Virginia State University A lack of management oversight in VSU’s enrollment reporting process led to the discrepancies in its enrollment reporting submissions. From our sample of 49 students, we noted the following instances of noncompliance: VSU reported an inaccurate enrollment status for three students (6%); VSU reported an inaccurate enrollment status effective date for six students (12%); VSU did not report enrollment status changes timely for 21 students (43%); VSU reported inaccurate information in at least one campus or program-level field deemed critical for 10 students (20%); VSU could not demonstrate proper approval for the academic program for eight students (16%), since the academic program did not appear on the SCHEV degree inventory report; and The permanent address for two out of 39 applicable federal Direct Loan borrowers (5%) did not agree between the student information system and NSLDS. Recommendation Each institution should evaluate its current enrollment reporting procedures and implement corrective action to ensure it reports accurate and timely student enrollment data to NSLDS to prevent future noncompliance. Where applicable, institutions should also consider implementing a quality control review process to monitor the accuracy of campus and program-level batch submissions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-097: Improve Notification Process for Federal Direct Loan Awards to Students Applicable to: Norfolk State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.165(a)(2) Known Questioned Costs: $0 NSU Financial Aid Office staff did not provide proper federal Direct Loan notification for one of 25 (4%) borrowers. The Financial Aid Office manually enters data into the student information system which transmits the required notifications to borrowers. However, a staff member assigned to send notifications was out of the office and the Financial Aid Office did not have a designated back-up. In accordance with 34 CFR § 668.165(a)(2), institutions should properly notify students receiving federal Direct Loans, in writing, of the date and amount of the disbursement, the student’s right to cancel all or a portion of a loan or loan disbursement, and the procedure and time by which the student must notify the institution that he or she wishes to cancel the loan. Additionally, 34 CFR § 668.165 (3) (i – ii) indicates that for Direct Loans, the institution must provide the notice in writing no earlier than 30 days before, and no later than 30 days after, crediting the student’s account at the institution if the institution obtains affirmative confirmation, and no later than seven days if the institution does not obtain an affirmative confirmation. Not properly notifying students in accordance with federal regulations may result in adverse actions and impact participation in Title IV programs. Additionally, improper notification could limit the amount of time a student or parent has to make an informed decision on whether to accept or reject a loan. The Financial Aid Office should revise its existing procedures to cross train staff, thus providing for proper back-up when staff are absent. NSU management should ensure each federal Direct Loan borrower receives the required notification. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-099: Reconcile Federal Assistance Programs Applicable to: Northern Virginia Community College Prior Year Finding Number: 2021-073 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Cash Management - 34 CFR § 676.19(b)(2) Known Questioned Costs: $0 NVCC Controller’s Office and Financial Aid Office staff did not adequately reconcile its federal Direct Loan program. For two out of two (100%) reconciliations sampled, each had a reconciling difference. The January 2024 ending cash balance had a reconciling difference of $144,734, and March 2024 had a reconciling difference of $7,692. NVCC management indicated management and staff turnover in the Controller’s Office, a lack of communication between the Controller’s Office and the Financial Aid Office, and the Controller’s Office not drawing down funds on a timely schedule contributed to the reconciling differences identified. In accordance with 34 CFR § 676.19(b)(2), institutions shall establish and maintain program and fiscal records that are reconciled at least monthly. By not reconciling federal student aid programs properly each month, NVCC increases its risk of not identifying issues and resolving them before they become a systemic problem. Systemic problems may result in potential adverse actions and impact participation in Title IV programs. The NVCC Financial Aid Office and Controller’s Office should review and enhance their current reconciliation process for federal assistance programs. Management should ensure that staff complete reconciliations properly and timely including addressing reconciling differences Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-032: Improve Database Security Applicable to: Department of Education - Direct Aid to Public Education Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management; Audit and Accountability ALPT or Cluster Name and ALN: Coronavirus State and Local Fiscal Recovery Funds (CSLFRF) - 21.027; Supporting Effective Instruction State Grants (formerly Improving Teacher Quality State Grants) - 84.367 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Treasury; U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Education does not implement some of the required controls to protect the database that supports Education’s system of record. The Commonwealth’s Information Security Standard, SEC530 (Security Standard), and industry best practices, such as the Center for Internet Security, prescribe certain required and recommended security controls to safeguard systems that contain or process sensitive data. The Security Standard requires and industry best practices recommend implementing specific controls to reduce unnecessary risk to data confidentiality, integrity, and availability. We communicated three control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. By not meeting the minimum requirements in the Security Standard and not aligning the database’s settings and configurations with industry best practices, Education cannot appropriately manage and maintain the database and ensure data integrity. Education should allocate the necessary resources to ensure database configurations, controls, and processes align with the requirements in the Security Standard and industry best practices. Implementing these controls will help maintain the confidentiality, integrity, and availability of the sensitive and mission critical data stored or processed in the database. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-088: Implement Information Security Program Requirements for the Gramm-Leach-Bliley Act Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 16 CFR § 314.3-4 Known Questioned Costs: $0 Northern Virginia Community College (NVCC) does not comply with certain elements of the Gramm-Leach Bliley Act (GLBA) related to its information security program. Public Law 106-102, known as GLBA, considers institutions of higher education to be financial institutions because of their engagement in financial assistance programs. Related regulations at Title 16 Code of Federal Regulations (CFR) § 314.3 and 16 CFR § 314.4 require organizations to develop, implement, and maintain the information security program to safeguard customer information. Specifically, NVCC does not comply with the following GLBA requirements: NVCC’s written information security program states the college will fully vet any third-party service provider who requires access to personal information and the college stated it uses an external vendor for the vetting process. However, NVCC does not have procedures for how it interacts with and uses the final reports from the external vendor to oversee its third-party service providers. GLBA requires organizations to oversee service providers by periodically assessing service providers based on the risk they present and the continued adequacy of their safeguards. Additionally, GLBA requires organizations to document procedures for evaluating, assessing, or testing the security of externally developed applications utilized for transmitting, accessing, or storing customer information. Not formally developing procedures to periodically assess its service providers could result in unaddressed vulnerabilities, which may result in the compromise of NVCC’s sensitive information and data. NVCC does not have a written procedure to conduct a periodic inventory of data. GLBA requires the college to include as part of its written information security program a requirement for identifying and managing data, staff, devices, systems, and facilities that enable it to achieve business purposes in accordance with their relative importance to business objectives and risk strategy. Without a written procedure to periodically conduct an inventory of data, NVCC increases the risk that it may misplace or improperly account for data within its systems, which could result in the lack of appropriate security controls and the compromise of NVCC’s confidential data. NVCC does not have a written policy and procedure for monitoring data retention periods. Without such a policy and procedure, NVCC may not consistently, timely, or securely dispose of customer data at the end of their retention periods. GLBA requires organizations to develop, implement, and maintain procedures for the secure disposal of customer information in any format no later than two years after the last date the information is used in connection to the customer, unless such information is necessary for business operations or for other legitimate business purposes. Without a written policy and procedure to monitor data retention periods and secure disposal methods, NVCC cannot verify that its staff is using appropriate methods to dispose of customer data in a timely manner. NVCC’s recent transition to new applications and external service providers contributed to the college not having current policies and procedures for the elements described above. NVCC should dedicate the necessary resources to develop the policies and procedures needed to support its information security program to ensure that it includes all elements required by GLBA. Completing the requirements outlined by GLBA will assist NVCC in evaluating its information security program and protecting the confidentiality, integrity, and availability of customer information within its environment. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-089: Perform an Evaluation of Student Information System Access Roles Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Other - 16 CFR § 200.303(e) Known Questioned Costs: $0 NVCC staff did not properly grant student information system roles and privileges. Specifically, we found seven of 45 (16%) employees have access to financial aid data beyond the requirements to complete their job responsibilities. The underlying cause of improper access is due to management not aligning the assignment of access roles with the concept of least privilege and not properly reviewing access levels of staff. By not properly assigning access based on job responsibilities, NVCC increases the risk it will have employees with improper access levels that do not align with concept of least privilege nor allow for segregation of duties. In accordance with 16 CFR § 200.303(e), the non-federal entity must take reasonable measures to safeguard protected personally identifiable information and other information the federal awarding agency or pass-through entity designates as sensitive, or the non-federal entity considers sensitive, consistent with applicable, federal, state, and local laws regarding privacy and responsibility over confidentiality. In addition, the International Organization for Standardization and International Electrotechnical Commission Standard (ISO Standard), states that care should be taken with role-based access control systems to ensure that employees are not granted conflicting roles. Roles should be carefully designed and provisioned to minimize access problems if a role is removed or reassigned. The ISO Standard further states that care should be taken when specifying access control rules to consider establishing rules based on the premise of least privilege. NVCC information security staff and management should perform a thorough evaluation of employees and grant student information system roles based upon the concept of least privilege and considering job responsibilities. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-091: Properly Identify Title IV Withdrawals Applicable to: George Mason University; Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22(j)(2) Known Questioned Costs: $0 The institutions noted below did not identify Title IV withdrawals timely. In accordance with 34 CFR § 668.22(j)(2) and Volume 5 of the federal Student Financial Aid Handbook, for institutions that are not required to take attendance, an institution must determine the withdrawal date for a student who withdraws without providing notification to the institution no later than 30 days after the end of the earlier of the (i) payment period or period of enrollment; (ii) academic year in which the student withdrew; or (iii) the educational program from which the student withdrew. By not identifying students who withdraw timely, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions impacting the institutions’ participation in Title IV programs. George Mason University For two of 25 students (8%), GMU did not timely identify the students requiring a return of Title IV calculation. GMU management indicated the delays in the fall 2023 and summer 2024 terms were due to a combination of issues including the timing constraints of waiting on the posting of grades following a scheduled holiday break and delays in submitting disbursement records through the federal Common Origination and Disbursement System (COD). Norfolk State University For six of 25 students (24%), NSU did not timely identify all students requiring a return of Title IV calculation timely. At the end of the spring 2024 term, a turnover in Registrar Office management contributed to the dissemination of inaccurate withdrawal information to the Financial Aid Office. As a result, the Financial Aid Office experienced delays in identifying students requiring a return of Title IV calculation due to the initial inaccuracies.   Northern Virginia Community College For three of 25 students (12%), Northern Virginia did not identify students requiring a return of Title IV calculation timely. NVCC management stated that the Financial Aid Office delays resulted from instructors waiting to confirm attendance after the spring 2024 term concluded. Recommendation Each institution should implement necessary corrective actions to timely identify students receiving Title IV aid that have withdrawn. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-092: Properly Perform Return of Title IV Calculations Applicable to: Norfolk State University; Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.22 Known Questioned Costs: $0 The institutions noted below did not perform the return of Title IV calculation in accordance with 34 CFR § 668.22 and Volume 5 of the federal Student Financial Aid Handbook. When a recipient of Title IV grant or loan assistance withdraws from an institution during a period of enrollment in which the recipient began attendance, the institution must determine the amount of Title IV grant or loan assistance that the student earned as of the student's withdrawal date. The total number of calendar days in a payment period includes all days within the period that the student completed, excluding scheduled breaks of at least five consecutive days. By not performing accurate return of Title IV calculations, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University NSU management indicated staff did not follow established written policies and procedures and did not properly set up the academic periods in the student information system. As a result, we noted the following instances of noncompliance: For one of 25 students (4%) tested, the Financial Aid Office staff incorrectly returned direct loans totaling $1,732 to ED after determining the student earned the funds. For two of 25 students (8%) tested, the Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded scheduled break days from the calculations resulting in underpayments of Pell grants to ED totaling $241. Northern Virginia Community College NVCC management indicated that the errors in the fall 2023 term resulted from staff not updating the system with the correct holiday information. In two of two students (100%), reviewed for the fall term, NVCC Financial Aid Office staff did not perform the return calculation in accordance with federal regulations because the staff inappropriately excluded break days from the calculations resulting in underpayments to ED totaling $41. Recommendation Each institution should properly train staff on the written policies and procedures for setting up term information in the student information system and performing the return of Title IV calculation accurately. Further, institution management should ensure staff correctly enter the scheduled breaks into the student information system to prevent future noncompliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-093: Promptly Return Unearned Title IV Funds to Department of Education Applicable to: Norfolk State University; Northern Virginia Community College; Old Dominion University Prior Year Finding Number: 2021-077 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.21(b) Known Questioned Costs: $0 The following institutions did not return Title IV unearned funds in accordance with required timeframe in 34 CFR § 668.21(b) and Volume 5 of the federal Student Financial Aid Handbook. Each institution must return unearned funds for which it is responsible as soon as possible, but no later than 45 days after the date that the institution becomes aware that a student has withdrawn. By not returning funds in a timely manner, the institutions are not in compliance with federal requirements and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. Norfolk State University For five of 18 students (28%), the date of return of unearned funds was greater than 45 days after the date of determination. Staff turnover in the Financial Aid Office was the primary cause of the delay in returning the funds. Northern Virginia Community College For one of 11 students (9%) tested, NVCC Financial Aid Office staff did not return unearned funds to ED for five months. A lack of communication between the Controller’s Office and the Financial Aid Office coupled with staff turnover in the Controller’s Office contributed to the delay in returning the funds. Old Dominion University ODU management indicated a lack of effective processes to ensure compliance with reporting requirements contributed to delays in returning the funds. For ten of 17 students (59%) tested, the net portion of the Direct Loan was not returned within the required timeframe resulting in $325 in unreturned federal aid.   Recommendation Each institution should implement necessary corrective actions to ensure that it returns unearned Title IV funds to ED within the required timeframe. In addition, the institutions should train staff on the federal requirements to ensure compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-094: Properly Complete Federal Verification Prior to Disbursing Title IV Aid Applicable to: George Mason University; Norfolk State University; Old Dominion University; Virginia Polytechnic Inst. and State University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.54-57 Known Questioned Costs: $0 The institutions noted below did not properly complete student verification prior to disbursing Title IV aid. In accordance with 34 CFR § 668.54 through 34 CFR § 668.57, an institution must require an applicant, whose Free Application for Federal Student Aid (FAFSA) information has been selected for verification, to verify the information selected by ED. Federal Register 87 F.R. 40826 outlines the 2023 - 2024 Award Year FAFSA information ED requires to be verified and the acceptable documentation by Verification Tracking Flag and Verification Tracking Group. Further, in accordance with ED Electronic Announcement GRANTS 24-04, published on April 12, 2024, institutions are required to verify all recipients selected for verification by ED’s Central Processing System (CPS) unless a recipient is exempt from verification in accordance with the exclusions from verification provided for in the regulations at 34 CFR § 668.54(b). By not performing or improperly performing the necessary verification, institutions may provide financial aid disbursements to students based upon inaccurate information and may be subject to potential adverse actions affecting the institutions’ participation in Title IV programs. George Mason University GMU management indicated staff did not follow written verification policies and procedures which resulted in the errors. We noted the following instances of noncompliance: For one of seven (14%) students flagged for verification, the GMU Office of Student Financial Aid staff did not match the income tax paid from the FAFSA to the student information system prior to awarding Title IV aid totaling $8,189. For one of 25 (4%) students tested for verification, the GMU Office of Student Financial Aid staff did not match the student’s adjusted gross income from the FAFSA to the student information system prior to awarding Title IV aid totaling $11,796. Norfolk State University NSU management indicated staff did not follow written verification policies and procedures, which resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the number of family members in the household resulting in the student not receiving a Pell grant of $4,245. For one of 25 students (4%) tested, the NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in the student receiving an over award of a Pell grant of $675. For one of 25 students (4%) tested, NSU Financial Aid Office staff inaccurately verified the adjusted gross income resulting in no impact to the student. Old Dominion University ODU management indicated staff turnover in the financial aid office resulted in the errors. We noted the following instances of noncompliance: For one of 25 students (4%) tested, ODU Financial Aid Office staff did not request or obtain appropriate documentation to verify the application data prior to awarding Title IV aid totaling $9,479. For one of 25 students tested (4%), ODU Financial Aid Office staff used incorrect documentation while completing the verification. The student received Title IV aid totaling $12,967. For one of two students tested (50%), ODU Financial Aid Office staff did not match the information on the FAFSA to the requested information prior to awarding the student Title IV aid totaling $6,234. Virginia Tech VT management indicated a combination of factors including an error by the third-party vendor and an internal error in the computer logic that assigns students to specific tracking groups for required follow-up contributed to the errors. We noted the following instances of noncompliance: For two out of 33 (6%) students flagged for verification, the VT Office of University Scholarship and Financial Aid staff did not request or obtain appropriate documentation to verify applications prior to awarding Title IV aid totaling $11,877. For one of twenty-five (4%) students tested, the third-party vendor verified an incorrect amount for the Education Tax Credit. Recommendation Each institution should ensure staff are knowledgeable of its written policies and procedures. Institution management should implement corrective action to prevent future noncompliance and should consider implementing a quality control review to ensure that staff obtain, review, and retain acceptable documentation for audit purposes. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-095: Promptly Return Unclaimed Aid to the Department of Education Applicable to: Northern Virginia Community College; Old Dominion University; Radford University Prior Year Finding Number: 2021-075 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(I) Known Questioned Costs: $0 The institutions noted below did not return unclaimed Title IV aid timely. In accordance with 34 CFR § 668.164(I), If an institution attempts to disburse funds by check and the recipient does not cash the check, the institution must return the funds no later than 240 days after the date it issued that check or no later than 45 days after a rejected electronic funds transfer (EFT). By not returning funds timely, the institutions may be subject to potential adverse actions affecting participation in Title IV aid programs. Northern Virginia Community College For 11 out of 87 (13%) sampled, NVCC Controller’s Office staff did not return a total of $3,296 timely. Incorrectly placed holds on Title IV credit balances and staff turnover in the NVCC Controller’s Office contributed to the untimely return of funds. Old Dominion University For four out of 17 (24%) students sampled, ODU Bursar’s Office staff did not return a total of $8,776 timely. A lack of effective processes to ensure compliance with the requirements contributed to the untimely return of funds. Radford University Upon review of the outstanding check list as of June 30, 2024, we noted one student refund totaling $1,486, which RU staff did not return timely. RU management indicated staff turnover contributed to the untimely return of funds. Recommendation Each institution should ensure staff responsible for tracking unclaimed student financial aid have a thorough understanding of the federal requirements. If the institution is unable to contact the federal aid recipient, and the check remains uncashed or the banking institution rejects the EFT, the institution should return the unclaimed funds to ED within the required timeframe. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-096: Improve Reporting to the Common Origination and Disbursement System Applicable to: James Madison University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 668.164(a) Known Questioned Costs: $0 JMU’s Office of Financial Aid and Scholarships staff did not report accurate and/or timely disbursements to COD. JMU management indicated the errors were due to a combination of factors including staff selecting an incorrect disbursement date in the student information system when sending disbursement information to COD for one batch in January 2024 and staff delaying the reporting of disbursement information to COD for another batch in January 2024. JMU indicated the new FAFSA form resulted in additional pressure on financial aid staff during this time. We noted the following instances of noncompliance: For three of 40 students (8%), staff did not report the correct disbursement dates in COD. In one of forty students (3%), staff did not report the disbursement timely. In accordance with 88 F.R. 41092, published on June 23, 2023, an institution must submit federal Pell Grant and Direct Loan disbursement records accurately and no later than 15 days after making the disbursement and no earlier than seven days prior to the disbursement date or becoming aware of the need to adjust a student’s previously reported disbursement. In accordance with 34 CFR § 668.164(a), Title IV funds are disbursed on the date that the institution (a)credits those funds to the student’s account in the institution’s general ledger or any subledger of the general ledger, or (b) pays those funds to the student directly. ED considers Title IV funds disbursed even if the institution uses its own funds in advance of receiving program funds from ED. If an institution does not submit accurate disbursement records within the required timeframe, it may result in ED rejecting all or part of the reported disbursement. Improper reporting may result in an audit or program review finding or the initiation of an adverse action, such as a fine or other penalty. JMU should review its current policies and procedures for submitting disbursement records and implement corrective action to ensure future compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-098: Promptly Disburse Credit Balances to Students Applicable to: Norfolk State University; Old Dominion University Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Special Tests and Provisions - 34 CFR § 668.164(d)(1)(i)(a)(ii)(a); 34 CFR § 668.164(h)(2)(i)(ii) Known Questioned Costs: $0 The institutions noted below did not provide timely refunds to students after posting disbursements. In accordance with 34 CFR § 668.164(d)(1)(i)(a)(ii)(a) and 34 CFR § 668.164(h)(2)(i)(ii), a school may pay a credit balance by initiating an EFT to a bank account the student or parent designates. A school that is paying a student his or her credit balance with a direct disbursement must pay the student within 14 days or be able to provide payment to the student upon demand within 14 days of crediting the student’s account. Regardless of the method used, a school must disburse the credit balance within the regulatory time frame. By not disbursing the funds timely, the institutions may be subject to potential adverse actions that may affect participation in Title IV aid programs. Norfolk State University For two of 17 (12%) students, NSU Bursar’s Office staff refunded credit balances up to 26 days after each student received credit on their student account. NSU management indicated staff shortages, training new staff, and processing a large volume of refunds at the beginning of a term contributed to the delay in refunding the students. Old Dominion University For two of 20 (10%) students, ODU Bursar’s Office staff refunded credit balances up to 51 days after each student received credit on their student account. ODU management indicated staff shortages and manual processing contributed to the delay in refunding the students.   Recommendation Each institution should take necessary corrective actions to disburse credit balances to students timely, thus ensuring disbursement of Title IV aid aligns with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-100: Ensure an Accurate Fiscal Operations Report and Application to Participate (FISAP) is Submitted to the Department of Education Applicable to: Northern Virginia Community College Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Student Financial Assistance Cluster Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Education Type of Compliance Requirement - Criteria: Reporting - 34 CFR § 675.19 (b)(3); 34 CFR § 676.19 (b)(3) Known Questioned Costs: $0 NVCC inaccurately reported two fields on the college’s FISAP. NVCC overstated its enrollment by 17,562 students in Field 7 and overstated tuition and fees by $6,799,023 in Section II, Field 22. A lack of management oversight and a misunderstanding of the Virginia Community College System report that includes tuition and fees and additional revenue sources contributed to the reporting errors. In accordance with 34 CFR § 675.19 (b)(3) and 34 CFR § 676.19(b)(3), each year, an institution shall submit a FISAP plus other information ED requires. The institution shall report accurate information on the form and submit it at the time ED specifies. The FISAP instructions provided by ED further inform institutions of what to report in Section II, Fields 7 and 22. Per this guidance, dual-enrolled high school students should be excluded from the enrollment total, and institutions should exclude tuition and fee revenue collected from individuals not meeting the description of an enrolled student. Inaccurately reporting FISAP information provides ED with inaccurate information from which to make funding decisions. NVCC management should enhance policies and procedures and train staff on the FISAP instructions to ensure the college reports the proper amounts on the FISAP. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-072: Strengthen Controls over Procurement Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Procurement and Suspension and Debarment - 2 CFR § 200.317 Known Questioned Costs: $0 Epidemiology is not compiling and retaining a comprehensive contract listing for all procured and active contracts funded by the ELC federal grant program. Management was unable to provide the comprehensive contract listing due to not properly maintaining the documentation. Title 2 CFR § 200.317 governs procurements by states and requires that “when procuring property and services under a Federal award, a State must follow the same policies and procedures it uses for procurements from its non-Federal funds.” Department of General Services Agency Procurement and Surplus Property Manual (APSPM) - Section 10.3 requires agencies to maintain a complete file in one place for each purchase transaction. It states that the file must contain, at a minimum, as applicable, the description of requirements, sources solicited, a copy of the Virginia Business Opportunities receipt, cancellation notices, the method of evaluation and award, a signed copy of the contract or purchase order, contractor performance report submitted by the administrator, modifications or change orders, vendor complaint forms, cure letters, usage data such as release or obligation registers, and any other actions relating to the procurement. In addition, APSPM Annex 10-A, which is a Post Award Administration Checklist, requires the agency to list the contract on the agency’s master contract list or schedule to include period of performance and any renewal option(s) to allow for the planning of renewal or rebidding actions. Health's individual offices or Local Health Districts (LHD) complete procurements for the ELC federal grant program up to $100,000, with procurements over $10,000 and up to $100,000 being solicited through a “quick quote.” Health’s Office of Procurement and General Services handles complex procurements. Since Health has 35 LHDs, the absence of a comprehensive contract listing increases the risk of a contract being established by an LHD that goes unnoticed by Epidemiology. Due to limited staff and the number of health offices and LHDs involved in the procurement process, Epidemiology was unable to provide a comprehensive contract listing. By not maintaining proper documentation and support, Health is unable to ensure the effectiveness of internal controls. Furthermore, it is difficult to substantiate the legitimacy of the procurement transaction, increasing the risk of unauthorized transactions, which also increases the potential for questioned costs. Health’s management should develop a policy requiring the compilation of comprehensive contract listings and communicate the policy to the applicable offices and districts. Health’s management should also ensure that the applicable offices and districts involved have adequate staffing and training on contract procurement and the need to maintain adequate documentation for all procurements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-087: Review Subrecipient Audit Reports Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.331(d) Known Questioned Costs: $0 Health does not monitor subrecipients in accordance with federal regulations for the Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) and Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises federal grant programs. During our audit, we found that Health’s Office of Epidemiology (Epidemiology) and the Office of Health Equity (OHE) did not obtain and review a Single Audit or program-specific audit report for subrecipients who received $750,000 or more in subawards from ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. According to Title 2 U.S. Code of Federal Regulations (CFR) § 200.332(f), all pass-through entities must verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year will equal or exceed $750,000. Additionally, in the case of any findings, 2 CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Federal Audit Clearinghouse (Clearinghouse). Due to significant turnover in contract administrators responsible for subrecipient monitoring, Epidemiology and OHE were unable to provide evidence that staff reviewed Single Audit or program-specific audit reports for all subrecipients expending $750,000 or more during fiscal year 2024. In addition, OFM did not have a current subrecipient monitoring policy and procedure in place to detect subrecipients that met the audit threshold. Health last updated its subrecipient monitoring policy in 2014. Without obtaining the appropriate reports, Health is unable to show it is meeting the requirements set forth in 2 CFR part 200, subpart F, which includes issuing a management decision on audit findings within six months after receipt of the subrecipient’s audit report and ensuring that the subrecipient takes timely and appropriate corrective action on all audit findings. OFM should update its subrecipient monitoring policy and communicate the policy to the applicable offices and districts. In addition, OFM should periodically review the Clearinghouse to determine whether subrecipients who meet the audit threshold obtain the required audits, and that the applicable offices or districts are reviewing the audit reports and considering the impact of any deficiencies identified in audit findings. Epidemiology and OHE should ensure staff review Single Audit or program-specific audit reports for subrecipients who meet the audit threshold and should adhere to all federal requirements when conducting monitoring over such subrecipients. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-107: Strengthen Controls over FFATA Reporting Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Health is not completing Federal Funding Accountability and Transparency Act (FFATA) reporting for the ELC and STLT federal grant programs. During our audit, we found that Epidemiology and OHE did not complete FFATA reporting submissions for subrecipients who received $30,000 or more in ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. Title 2 CFR Part 170 Appendix A, included in award documents signed by management, requires Health to report each obligating action, exceeding $30,000, to the FFATA Subaward Reporting System (FSRS). Health’s FFATA reporting policy, which Health last updated in 2014, states that all offices and districts that are recipients of federal grants and contracts shall adhere to all requirements of the FFATA and ensure timely and accurate reporting. Epidemiology and OHE have experienced turnover in key positions that were historically responsible for completing and submitting FFATA reports. In addition, OFM did not have a procedure in place to detect subawards that it should have reported to FSRS. Not reporting to FSRS could result in a citizen or federal official having a distorted view as to how Health is obligating federal funds. Epidemiology and OHE should ensure program personnel adhere to Health policies and procedures and fulfill FFATA reporting responsibilities by submitting required FFATA subaward reporting information by the due date and retaining documentation to support the submissions. Additionally, OFM should update and communicate the FFATA reporting policy to applicable offices and districts. Further, OFM should periodically analyze subaward records to determine if there are instances where program personnel are not submitting the required FFATA subaward reporting information. If so, OFM should collect this information from the applicable program personnel promptly to comply with the FFATA reporting requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-072: Strengthen Controls over Procurement Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Procurement and Suspension and Debarment - 2 CFR § 200.317 Known Questioned Costs: $0 Epidemiology is not compiling and retaining a comprehensive contract listing for all procured and active contracts funded by the ELC federal grant program. Management was unable to provide the comprehensive contract listing due to not properly maintaining the documentation. Title 2 CFR § 200.317 governs procurements by states and requires that “when procuring property and services under a Federal award, a State must follow the same policies and procedures it uses for procurements from its non-Federal funds.” Department of General Services Agency Procurement and Surplus Property Manual (APSPM) - Section 10.3 requires agencies to maintain a complete file in one place for each purchase transaction. It states that the file must contain, at a minimum, as applicable, the description of requirements, sources solicited, a copy of the Virginia Business Opportunities receipt, cancellation notices, the method of evaluation and award, a signed copy of the contract or purchase order, contractor performance report submitted by the administrator, modifications or change orders, vendor complaint forms, cure letters, usage data such as release or obligation registers, and any other actions relating to the procurement. In addition, APSPM Annex 10-A, which is a Post Award Administration Checklist, requires the agency to list the contract on the agency’s master contract list or schedule to include period of performance and any renewal option(s) to allow for the planning of renewal or rebidding actions. Health's individual offices or Local Health Districts (LHD) complete procurements for the ELC federal grant program up to $100,000, with procurements over $10,000 and up to $100,000 being solicited through a “quick quote.” Health’s Office of Procurement and General Services handles complex procurements. Since Health has 35 LHDs, the absence of a comprehensive contract listing increases the risk of a contract being established by an LHD that goes unnoticed by Epidemiology. Due to limited staff and the number of health offices and LHDs involved in the procurement process, Epidemiology was unable to provide a comprehensive contract listing. By not maintaining proper documentation and support, Health is unable to ensure the effectiveness of internal controls. Furthermore, it is difficult to substantiate the legitimacy of the procurement transaction, increasing the risk of unauthorized transactions, which also increases the potential for questioned costs. Health’s management should develop a policy requiring the compilation of comprehensive contract listings and communicate the policy to the applicable offices and districts. Health’s management should also ensure that the applicable offices and districts involved have adequate staffing and training on contract procurement and the need to maintain adequate documentation for all procurements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-087: Review Subrecipient Audit Reports Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.331(d) Known Questioned Costs: $0 Health does not monitor subrecipients in accordance with federal regulations for the Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) and Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises federal grant programs. During our audit, we found that Health’s Office of Epidemiology (Epidemiology) and the Office of Health Equity (OHE) did not obtain and review a Single Audit or program-specific audit report for subrecipients who received $750,000 or more in subawards from ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. According to Title 2 U.S. Code of Federal Regulations (CFR) § 200.332(f), all pass-through entities must verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year will equal or exceed $750,000. Additionally, in the case of any findings, 2 CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Federal Audit Clearinghouse (Clearinghouse). Due to significant turnover in contract administrators responsible for subrecipient monitoring, Epidemiology and OHE were unable to provide evidence that staff reviewed Single Audit or program-specific audit reports for all subrecipients expending $750,000 or more during fiscal year 2024. In addition, OFM did not have a current subrecipient monitoring policy and procedure in place to detect subrecipients that met the audit threshold. Health last updated its subrecipient monitoring policy in 2014. Without obtaining the appropriate reports, Health is unable to show it is meeting the requirements set forth in 2 CFR part 200, subpart F, which includes issuing a management decision on audit findings within six months after receipt of the subrecipient’s audit report and ensuring that the subrecipient takes timely and appropriate corrective action on all audit findings. OFM should update its subrecipient monitoring policy and communicate the policy to the applicable offices and districts. In addition, OFM should periodically review the Clearinghouse to determine whether subrecipients who meet the audit threshold obtain the required audits, and that the applicable offices or districts are reviewing the audit reports and considering the impact of any deficiencies identified in audit findings. Epidemiology and OHE should ensure staff review Single Audit or program-specific audit reports for subrecipients who meet the audit threshold and should adhere to all federal requirements when conducting monitoring over such subrecipients. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-107: Strengthen Controls over FFATA Reporting Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Health is not completing Federal Funding Accountability and Transparency Act (FFATA) reporting for the ELC and STLT federal grant programs. During our audit, we found that Epidemiology and OHE did not complete FFATA reporting submissions for subrecipients who received $30,000 or more in ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. Title 2 CFR Part 170 Appendix A, included in award documents signed by management, requires Health to report each obligating action, exceeding $30,000, to the FFATA Subaward Reporting System (FSRS). Health’s FFATA reporting policy, which Health last updated in 2014, states that all offices and districts that are recipients of federal grants and contracts shall adhere to all requirements of the FFATA and ensure timely and accurate reporting. Epidemiology and OHE have experienced turnover in key positions that were historically responsible for completing and submitting FFATA reports. In addition, OFM did not have a procedure in place to detect subawards that it should have reported to FSRS. Not reporting to FSRS could result in a citizen or federal official having a distorted view as to how Health is obligating federal funds. Epidemiology and OHE should ensure program personnel adhere to Health policies and procedures and fulfill FFATA reporting responsibilities by submitting required FFATA subaward reporting information by the due date and retaining documentation to support the submissions. Additionally, OFM should update and communicate the FFATA reporting policy to applicable offices and districts. Further, OFM should periodically analyze subaward records to determine if there are instances where program personnel are not submitting the required FFATA subaward reporting information. If so, OFM should collect this information from the applicable program personnel promptly to comply with the FFATA reporting requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-072: Strengthen Controls over Procurement Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Procurement and Suspension and Debarment - 2 CFR § 200.317 Known Questioned Costs: $0 Epidemiology is not compiling and retaining a comprehensive contract listing for all procured and active contracts funded by the ELC federal grant program. Management was unable to provide the comprehensive contract listing due to not properly maintaining the documentation. Title 2 CFR § 200.317 governs procurements by states and requires that “when procuring property and services under a Federal award, a State must follow the same policies and procedures it uses for procurements from its non-Federal funds.” Department of General Services Agency Procurement and Surplus Property Manual (APSPM) - Section 10.3 requires agencies to maintain a complete file in one place for each purchase transaction. It states that the file must contain, at a minimum, as applicable, the description of requirements, sources solicited, a copy of the Virginia Business Opportunities receipt, cancellation notices, the method of evaluation and award, a signed copy of the contract or purchase order, contractor performance report submitted by the administrator, modifications or change orders, vendor complaint forms, cure letters, usage data such as release or obligation registers, and any other actions relating to the procurement. In addition, APSPM Annex 10-A, which is a Post Award Administration Checklist, requires the agency to list the contract on the agency’s master contract list or schedule to include period of performance and any renewal option(s) to allow for the planning of renewal or rebidding actions. Health's individual offices or Local Health Districts (LHD) complete procurements for the ELC federal grant program up to $100,000, with procurements over $10,000 and up to $100,000 being solicited through a “quick quote.” Health’s Office of Procurement and General Services handles complex procurements. Since Health has 35 LHDs, the absence of a comprehensive contract listing increases the risk of a contract being established by an LHD that goes unnoticed by Epidemiology. Due to limited staff and the number of health offices and LHDs involved in the procurement process, Epidemiology was unable to provide a comprehensive contract listing. By not maintaining proper documentation and support, Health is unable to ensure the effectiveness of internal controls. Furthermore, it is difficult to substantiate the legitimacy of the procurement transaction, increasing the risk of unauthorized transactions, which also increases the potential for questioned costs. Health’s management should develop a policy requiring the compilation of comprehensive contract listings and communicate the policy to the applicable offices and districts. Health’s management should also ensure that the applicable offices and districts involved have adequate staffing and training on contract procurement and the need to maintain adequate documentation for all procurements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-087: Review Subrecipient Audit Reports Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.331(d) Known Questioned Costs: $0 Health does not monitor subrecipients in accordance with federal regulations for the Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) and Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises federal grant programs. During our audit, we found that Health’s Office of Epidemiology (Epidemiology) and the Office of Health Equity (OHE) did not obtain and review a Single Audit or program-specific audit report for subrecipients who received $750,000 or more in subawards from ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. According to Title 2 U.S. Code of Federal Regulations (CFR) § 200.332(f), all pass-through entities must verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year will equal or exceed $750,000. Additionally, in the case of any findings, 2 CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Federal Audit Clearinghouse (Clearinghouse). Due to significant turnover in contract administrators responsible for subrecipient monitoring, Epidemiology and OHE were unable to provide evidence that staff reviewed Single Audit or program-specific audit reports for all subrecipients expending $750,000 or more during fiscal year 2024. In addition, OFM did not have a current subrecipient monitoring policy and procedure in place to detect subrecipients that met the audit threshold. Health last updated its subrecipient monitoring policy in 2014. Without obtaining the appropriate reports, Health is unable to show it is meeting the requirements set forth in 2 CFR part 200, subpart F, which includes issuing a management decision on audit findings within six months after receipt of the subrecipient’s audit report and ensuring that the subrecipient takes timely and appropriate corrective action on all audit findings. OFM should update its subrecipient monitoring policy and communicate the policy to the applicable offices and districts. In addition, OFM should periodically review the Clearinghouse to determine whether subrecipients who meet the audit threshold obtain the required audits, and that the applicable offices or districts are reviewing the audit reports and considering the impact of any deficiencies identified in audit findings. Epidemiology and OHE should ensure staff review Single Audit or program-specific audit reports for subrecipients who meet the audit threshold and should adhere to all federal requirements when conducting monitoring over such subrecipients. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-107: Strengthen Controls over FFATA Reporting Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Health is not completing Federal Funding Accountability and Transparency Act (FFATA) reporting for the ELC and STLT federal grant programs. During our audit, we found that Epidemiology and OHE did not complete FFATA reporting submissions for subrecipients who received $30,000 or more in ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. Title 2 CFR Part 170 Appendix A, included in award documents signed by management, requires Health to report each obligating action, exceeding $30,000, to the FFATA Subaward Reporting System (FSRS). Health’s FFATA reporting policy, which Health last updated in 2014, states that all offices and districts that are recipients of federal grants and contracts shall adhere to all requirements of the FFATA and ensure timely and accurate reporting. Epidemiology and OHE have experienced turnover in key positions that were historically responsible for completing and submitting FFATA reports. In addition, OFM did not have a procedure in place to detect subawards that it should have reported to FSRS. Not reporting to FSRS could result in a citizen or federal official having a distorted view as to how Health is obligating federal funds. Epidemiology and OHE should ensure program personnel adhere to Health policies and procedures and fulfill FFATA reporting responsibilities by submitting required FFATA subaward reporting information by the due date and retaining documentation to support the submissions. Additionally, OFM should update and communicate the FFATA reporting policy to applicable offices and districts. Further, OFM should periodically analyze subaward records to determine if there are instances where program personnel are not submitting the required FFATA subaward reporting information. If so, OFM should collect this information from the applicable program personnel promptly to comply with the FFATA reporting requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-087: Review Subrecipient Audit Reports Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.331(d) Known Questioned Costs: $0 Health does not monitor subrecipients in accordance with federal regulations for the Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) and Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises federal grant programs. During our audit, we found that Health’s Office of Epidemiology (Epidemiology) and the Office of Health Equity (OHE) did not obtain and review a Single Audit or program-specific audit report for subrecipients who received $750,000 or more in subawards from ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. According to Title 2 U.S. Code of Federal Regulations (CFR) § 200.332(f), all pass-through entities must verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year will equal or exceed $750,000. Additionally, in the case of any findings, 2 CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Federal Audit Clearinghouse (Clearinghouse). Due to significant turnover in contract administrators responsible for subrecipient monitoring, Epidemiology and OHE were unable to provide evidence that staff reviewed Single Audit or program-specific audit reports for all subrecipients expending $750,000 or more during fiscal year 2024. In addition, OFM did not have a current subrecipient monitoring policy and procedure in place to detect subrecipients that met the audit threshold. Health last updated its subrecipient monitoring policy in 2014. Without obtaining the appropriate reports, Health is unable to show it is meeting the requirements set forth in 2 CFR part 200, subpart F, which includes issuing a management decision on audit findings within six months after receipt of the subrecipient’s audit report and ensuring that the subrecipient takes timely and appropriate corrective action on all audit findings. OFM should update its subrecipient monitoring policy and communicate the policy to the applicable offices and districts. In addition, OFM should periodically review the Clearinghouse to determine whether subrecipients who meet the audit threshold obtain the required audits, and that the applicable offices or districts are reviewing the audit reports and considering the impact of any deficiencies identified in audit findings. Epidemiology and OHE should ensure staff review Single Audit or program-specific audit reports for subrecipients who meet the audit threshold and should adhere to all federal requirements when conducting monitoring over such subrecipients. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-107: Strengthen Controls over FFATA Reporting Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Health is not completing Federal Funding Accountability and Transparency Act (FFATA) reporting for the ELC and STLT federal grant programs. During our audit, we found that Epidemiology and OHE did not complete FFATA reporting submissions for subrecipients who received $30,000 or more in ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. Title 2 CFR Part 170 Appendix A, included in award documents signed by management, requires Health to report each obligating action, exceeding $30,000, to the FFATA Subaward Reporting System (FSRS). Health’s FFATA reporting policy, which Health last updated in 2014, states that all offices and districts that are recipients of federal grants and contracts shall adhere to all requirements of the FFATA and ensure timely and accurate reporting. Epidemiology and OHE have experienced turnover in key positions that were historically responsible for completing and submitting FFATA reports. In addition, OFM did not have a procedure in place to detect subawards that it should have reported to FSRS. Not reporting to FSRS could result in a citizen or federal official having a distorted view as to how Health is obligating federal funds. Epidemiology and OHE should ensure program personnel adhere to Health policies and procedures and fulfill FFATA reporting responsibilities by submitting required FFATA subaward reporting information by the due date and retaining documentation to support the submissions. Additionally, OFM should update and communicate the FFATA reporting policy to applicable offices and districts. Further, OFM should periodically analyze subaward records to determine if there are instances where program personnel are not submitting the required FFATA subaward reporting information. If so, OFM should collect this information from the applicable program personnel promptly to comply with the FFATA reporting requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-087: Review Subrecipient Audit Reports Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.331(d) Known Questioned Costs: $0 Health does not monitor subrecipients in accordance with federal regulations for the Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) and Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises federal grant programs. During our audit, we found that Health’s Office of Epidemiology (Epidemiology) and the Office of Health Equity (OHE) did not obtain and review a Single Audit or program-specific audit report for subrecipients who received $750,000 or more in subawards from ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. According to Title 2 U.S. Code of Federal Regulations (CFR) § 200.332(f), all pass-through entities must verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year will equal or exceed $750,000. Additionally, in the case of any findings, 2 CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Federal Audit Clearinghouse (Clearinghouse). Due to significant turnover in contract administrators responsible for subrecipient monitoring, Epidemiology and OHE were unable to provide evidence that staff reviewed Single Audit or program-specific audit reports for all subrecipients expending $750,000 or more during fiscal year 2024. In addition, OFM did not have a current subrecipient monitoring policy and procedure in place to detect subrecipients that met the audit threshold. Health last updated its subrecipient monitoring policy in 2014. Without obtaining the appropriate reports, Health is unable to show it is meeting the requirements set forth in 2 CFR part 200, subpart F, which includes issuing a management decision on audit findings within six months after receipt of the subrecipient’s audit report and ensuring that the subrecipient takes timely and appropriate corrective action on all audit findings. OFM should update its subrecipient monitoring policy and communicate the policy to the applicable offices and districts. In addition, OFM should periodically review the Clearinghouse to determine whether subrecipients who meet the audit threshold obtain the required audits, and that the applicable offices or districts are reviewing the audit reports and considering the impact of any deficiencies identified in audit findings. Epidemiology and OHE should ensure staff review Single Audit or program-specific audit reports for subrecipients who meet the audit threshold and should adhere to all federal requirements when conducting monitoring over such subrecipients. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-107: Strengthen Controls over FFATA Reporting Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Health is not completing Federal Funding Accountability and Transparency Act (FFATA) reporting for the ELC and STLT federal grant programs. During our audit, we found that Epidemiology and OHE did not complete FFATA reporting submissions for subrecipients who received $30,000 or more in ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. Title 2 CFR Part 170 Appendix A, included in award documents signed by management, requires Health to report each obligating action, exceeding $30,000, to the FFATA Subaward Reporting System (FSRS). Health’s FFATA reporting policy, which Health last updated in 2014, states that all offices and districts that are recipients of federal grants and contracts shall adhere to all requirements of the FFATA and ensure timely and accurate reporting. Epidemiology and OHE have experienced turnover in key positions that were historically responsible for completing and submitting FFATA reports. In addition, OFM did not have a procedure in place to detect subawards that it should have reported to FSRS. Not reporting to FSRS could result in a citizen or federal official having a distorted view as to how Health is obligating federal funds. Epidemiology and OHE should ensure program personnel adhere to Health policies and procedures and fulfill FFATA reporting responsibilities by submitting required FFATA subaward reporting information by the due date and retaining documentation to support the submissions. Additionally, OFM should update and communicate the FFATA reporting policy to applicable offices and districts. Further, OFM should periodically analyze subaward records to determine if there are instances where program personnel are not submitting the required FFATA subaward reporting information. If so, OFM should collect this information from the applicable program personnel promptly to comply with the FFATA reporting requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-087: Review Subrecipient Audit Reports Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.331(d) Known Questioned Costs: $0 Health does not monitor subrecipients in accordance with federal regulations for the Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) and Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises federal grant programs. During our audit, we found that Health’s Office of Epidemiology (Epidemiology) and the Office of Health Equity (OHE) did not obtain and review a Single Audit or program-specific audit report for subrecipients who received $750,000 or more in subawards from ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. According to Title 2 U.S. Code of Federal Regulations (CFR) § 200.332(f), all pass-through entities must verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year will equal or exceed $750,000. Additionally, in the case of any findings, 2 CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Federal Audit Clearinghouse (Clearinghouse). Due to significant turnover in contract administrators responsible for subrecipient monitoring, Epidemiology and OHE were unable to provide evidence that staff reviewed Single Audit or program-specific audit reports for all subrecipients expending $750,000 or more during fiscal year 2024. In addition, OFM did not have a current subrecipient monitoring policy and procedure in place to detect subrecipients that met the audit threshold. Health last updated its subrecipient monitoring policy in 2014. Without obtaining the appropriate reports, Health is unable to show it is meeting the requirements set forth in 2 CFR part 200, subpart F, which includes issuing a management decision on audit findings within six months after receipt of the subrecipient’s audit report and ensuring that the subrecipient takes timely and appropriate corrective action on all audit findings. OFM should update its subrecipient monitoring policy and communicate the policy to the applicable offices and districts. In addition, OFM should periodically review the Clearinghouse to determine whether subrecipients who meet the audit threshold obtain the required audits, and that the applicable offices or districts are reviewing the audit reports and considering the impact of any deficiencies identified in audit findings. Epidemiology and OHE should ensure staff review Single Audit or program-specific audit reports for subrecipients who meet the audit threshold and should adhere to all federal requirements when conducting monitoring over such subrecipients. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-107: Strengthen Controls over FFATA Reporting Applicable to: Department of Health Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Epidemiology and Laboratory Capacity for Infectious Diseases (ELC) - 93.323; Activities to Support State, Tribal, Local and Territorial (STLT) Health Department Response to Public Health or Healthcare Crises - 93.391 Federal Award Number and Year: Various - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Health is not completing Federal Funding Accountability and Transparency Act (FFATA) reporting for the ELC and STLT federal grant programs. During our audit, we found that Epidemiology and OHE did not complete FFATA reporting submissions for subrecipients who received $30,000 or more in ELC and STLT funds. During fiscal year 2024, Health disbursed approximately $11 million in ELC funds and $5.8 million in STLT funds to subrecipients. Title 2 CFR Part 170 Appendix A, included in award documents signed by management, requires Health to report each obligating action, exceeding $30,000, to the FFATA Subaward Reporting System (FSRS). Health’s FFATA reporting policy, which Health last updated in 2014, states that all offices and districts that are recipients of federal grants and contracts shall adhere to all requirements of the FFATA and ensure timely and accurate reporting. Epidemiology and OHE have experienced turnover in key positions that were historically responsible for completing and submitting FFATA reports. In addition, OFM did not have a procedure in place to detect subawards that it should have reported to FSRS. Not reporting to FSRS could result in a citizen or federal official having a distorted view as to how Health is obligating federal funds. Epidemiology and OHE should ensure program personnel adhere to Health policies and procedures and fulfill FFATA reporting responsibilities by submitting required FFATA subaward reporting information by the due date and retaining documentation to support the submissions. Additionally, OFM should update and communicate the FFATA reporting policy to applicable offices and districts. Further, OFM should periodically analyze subaward records to determine if there are instances where program personnel are not submitting the required FFATA subaward reporting information. If so, OFM should collect this information from the applicable program personnel promptly to comply with the FFATA reporting requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-083: Ensure Subaward Agreements Meet Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(a)(1) Known Questioned Costs: $0 Social Services does not include all information required by federal regulations in its subaward renewal agreements. We tested 20 subaward renewal agreements and noted that all of them did not contain one or more of the elements required by 2 CFR § 200.332(a)(1). Specifically, we noted the following instances of non-compliance in these subaward renewal agreements: Social Services did not include the correct Federal Award Identification Number (FAIN) in 15 of the 20 (75%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iii). Social Services did not include the federal award date in eight of the 20 (40%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iv). Social Services did not update the federal award date in 12 of the 20 (60%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iv). Social Services did not include the FAIN in five of the 20 (25%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iii). Social Services did not include the amount of federal funds obligated in the subaward in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(vii). Social Services did not include the subrecipient’s unique entity identifier in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(ii). Social Services did not include the contact information for the awarding official of the pass-through entity in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xi). Social Services did not identify whether the federal award was for research and development in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xiii). Social Services did not include the federal award project description in two of the 20 (10%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(x). Social Services did not accurately report the name of the federal awarding agency in two of the 20 (10%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xi). Social Services did not include the Assistance Listing Number in one of the 20 (5%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xii). Social Services did not identify the indirect cost rate for the federal award in one of the 20 (5%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xiv). During fiscal year 2024, Social Services disbursed approximately $46 million in federal funds from the TANF federal grant program through 238 subawards. While Social Services communicates federal award information to subgrantees, it does not consistently communicate all of the federal grant award information required in its subaward renewal agreements. The Contract and Procurement team within Social Services’ Division of General Services works collaboratively with grants administrators when preparing subaward agreements. However, the Contract and Procurement team has experienced turnover over the last several years and has lost institutional knowledge in some of its key positions as it pertains to federal grant requirements. Additionally, the Contract and Procurement team does not consistently retain all incorporated attachments in the subaward agreement. Compliance is responsible for ensuring that the agency adheres to federal regulations in 2 CFR § 200.332 through its Agency Monitoring Plan; however, Compliance was not aware of these instances of non-compliance because it was not involved in the preparation of the subaward agreements. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps ensure adherence to state and federal legal and regulatory standards. Because of the lack of agency-wide collaboration, there were inconsistencies in the information included in the subaward agreements. Without communicating the required federal award information, Social Services increases the risk that subrecipients are unaware of the source of the funding and the applicable requirements, which increases the potential for unallowable costs and non-compliance with federal requirements. Compliance should work collaboratively with the Contract and Procurement team and grants administrators to ensure that subaward agreements include all information required by federal regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-084: Review Non-Locality Subrecipient Single Audit Reports Applicable to: Department of Social Services Prior Year Finding Number: 2023-098; 2022-013; 2021-072; 2020-075; 2019-091; 2018-092 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d)(3); 2 CFR § 200.332(f) Known Questioned Costs: $0 Compliance continues to not review non-locality subrecipient Single Audit reports as set forth within its Agency Monitoring Plan. Non-locality subrecipients are subrecipients who are not local governments and are mainly comprised of non-profit organizations. During fiscal year 2024, Social Services disbursed approximately $107 million in federal funds to 244 non-locality subrecipients. While reviewing the Single Audit reports submitted to the Federal Audit Clearinghouse (Clearinghouse) for the most recent audit period for the 27 non-locality subrecipients that received more than $750,000 in federal funds from Social Services during state fiscal year 2024, we noted the following: Six non-locality subrecipients (22%) did not have a Single Audit report available in the Clearinghouse for the most recent audit period. Of the six non-locality subrecipients, three appeared to have never submitted a Single Audit report to the Clearinghouse. Title 2 CFR § 200.332(f) requires pass-through entities to verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year equaled or exceeded $750,000. Three non-locality subrecipients (11%) had audit findings that affected at least one of Social Services’ federal grant programs. One of the non-locality subrecipient auditors identified $82,253 in known questioned costs as the non-locality subrecipient did not maintain proper documentation to support payroll charges to the TANF federal grant program. Title 2 U.S. CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Clearinghouse. A management decision is Social Services’ written determination, provided to its subrecipient, of the adequacy of the subrecipient’s proposed corrective actions to address the audit findings, based on Social Services’ evaluation of the audit findings, including determining if the questioned costs are disallowed and need to be repaid to the federal awarding agency, and proposed corrective actions. As part of its planned corrective action, Compliance stated that it intends to procure a grants management system with subrecipient monitoring capabilities necessary to comply with federal requirements and has worked with Social Services’ Executive Team to secure funding. However, Compliance has yet to establish a timeline for when it intends for the solution to be fully functional. Additionally, Compliance has not evaluated what alternative corrective actions are available to become compliant. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps ensure adherence to state and federal legal and regulatory standards. Additionally, Social Services’ Agency Monitoring Plan assigns the responsibility to Compliance for overseeing the agency’s subrecipient monitoring process. Without verifying whether non-locality subrecipients received a Single Audit, Compliance is unable to assure Social Services’ Executive Team that it is fulfilling the pass-through entity responsibilities in 2 CFR § 200.332. Not complying with federal regulations could result in federal awarding agencies temporarily withholding payments until it takes corrective action, disallowing costs for all or part of the activity associated with the noncompliance, suspending, or terminating the federal award in part or in its entirety, initiating initial suspension or debarment proceedings, and/or withholding further federal funds for the project or program. Further, Social Services may be unaware of a potential liability to the Commonwealth by not reviewing the non-locality Single Audit reports. Compliance should consider exploring alternative corrective actions as it continues to develop and implement its grants management system, such as obtaining a list of non-locality subrecipients from its internal accounting system and reviewing the Single Audit reports in the Clearinghouse. Evaluating alternative corrective actions to become compliant with federal regulations will help Social Services mitigate the risks of incurring federal sanctions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-101: Implement Internal Controls over TANF Federal Performance Reporting Applicable to: Department of Social Services Prior Year Finding Number: 2023-105; 2022-103 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 45 CFR § 265.7(b) Known Questioned Costs: $0 Benefit Programs does not have adequate internal controls in place to ensure accurate reporting in the ACF-199 and ACF-209 performance reports. The ACF requires Social Services to submit this data to ACF quarterly, and ACF uses the data to determine whether the Commonwealth met the minimum work participation requirements for the TANF federal grant program. Benefit Programs uses a third-party service provider to produce the ACF-199 and ACF-209 reports and relies solely on their internal controls during the data extraction and data reporting process. Since the prior audit, Benefit Programs has worked with its service provider to analyze the reporting errors to determine the cause and appropriate actions to resolve these errors. However, because of the extent of its corrective actions, Benefit Programs has not fully implemented all of its corrective actions and continues to rely on ACF’s error correction controls, performed after report submission, to obtain assurance over the accuracy of the data included in its submissions. We audited 60 cases and identified 19 instances (32%) where the third-party service provider did not report key line-item information accurately based on the data Social Services maintains in its case management system or other supporting data and Benefit Programs did not detect or correct these errors before the third-party service provider submitted the data to ACF. Specifically, we noted that Benefit Programs did not accurately report on the following key line items: Benefit Programs did not accurately report on the “Work Participation Status” key line item for 13 out of 60 (22%) cases tested during the audit. Benefit Programs did not accurately report on the “Receives Subsidized Child Care” key line item for four out of 31 (13%) cases tested during the audit. Benefit Programs did not accurately report on the “Hours of Participation” key line item for four out of 60 (7%) cases tested during the audit. Benefit Programs did not accurately report on the “Work Eligibility Individual Indicator” key line item for two out of 60 (3%) cases tested during the audit. Benefit Programs did not accurately report on the “Number of Months Countable Toward Federal Time Clock” key line item for two out of 56 (4%) cases tested during the audit. Benefit Programs did not accurately report on the “Type of Family for Work Participation” key line item for two out of 60 (3%) cases tested during the audit. Benefit Programs did not accurately report on the “Parent with Minor Child” key line item for one out of 56 (2%) cases tested during the audit. Benefit Programs did not accurately report on the “Unsubsidized Employment” key line item for one out of 60 (2%) cases tested during the audit. Additionally, because of the lack of internal control over the ACF-199 and ACF-209 federal reports, Benefit Programs did not identify that the ACF revised the reporting specifications in November 2023 for certain key line items. Although ACF provided administering agencies with nearly a year to implement the new reporting specifications, Benefit Programs has not yet initiated discussions with its service provider to bring its current reporting model in line with the new reporting specifications. Therefore, there is risk that Social Services will continue to report inaccurate information to ACF going forward without working with its service provider to implement the new reporting specifications. Title 45 CFR § 265.7(b) requires States to have complete and accurate reports, which means that the reported data accurately reflects information available in case records, are free of computational errors, and are internally consistent. Additionally, 2 CFR § 303(a) requires that Social Services establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the recipient or subrecipient is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Reporting potentially inaccurate or incomplete information prevents the ACF from adequately monitoring Social Services’ work participation rates and the overall performance for the TANF federal grant program. Further, ACF can impose a penalty if it finds Social Services did not meet statutory required work participation rates. Because of the scope of this matter and errors noted above, we consider it to be a material weakness in internal control. Additionally, we believe this matter represents material noncompliance since Social Services did not comply with the provisions at 45 CFR § 265.7(b). Benefit Programs should implement internal controls over the TANF federal performance reporting process and include a documented secondary review process of the service providers’ data for which it should complete prior to the report submission. Additionally, Benefit Programs should develop a process to track changes to the reporting specifications and communicate the changes to the service provider in advance of the applicable implementation date. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-102: Implement Internal Controls over TANF Federal Special Reporting Applicable to: Department of Social Services Prior Year Finding Number: 2023-106 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR § 200.303(a) Known Questioned Costs: $0 Benefit Programs has not documented its process for preparing the ACF’s Annual Report on State MOE Programs (ACF-204) for the TANF federal grant program. ACF requires Social Services submit this data annually and uses the information in reports to Congress about how TANF programs are evolving, in assessing State and Territory MOE expenditures, and in assessing the need for legislative changes. Title 2 CFR § 200.303(a) requires the non-federal entity to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the recipient is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. During fiscal year 2024, Benefit Programs performed an analysis of ACF-204 reporting errors identified during the prior audit to determine causality and has taken actions to resolve those errors. Additionally, Benefit Programs created a systems modification request to correct errors that it identified as occurring due to inaccurate programming in the data modification phase of the federal report creation. However, Benefit Programs has not yet documented its processes for preparing the ACF-204 report through a written policy and procedure. Documented policies and procedures will help Social Services maintain continuity with its processes to comply with laws and regulations. Without documented policies and procedures, there is a risk that Social Services could report inaccurate information to the federal government that could lead to Social Services incurring fines and/or penalties. Benefit Programs should dedicate the necessary resources to document its processes for preparing the ACF-204 report to ensure reasonably accurate reporting of TANF MOE Programs to ACF in accordance with the ACF-204 reporting instructions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-103: Monitor Case Management System Records to Ensure Compliance with TANF Eligibility Requirements Applicable to: Department of Social Services Prior Year Finding Number: 2023-103 Type of Finding: Compliance Severity of Deficiency: N/A Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Eligibility - 8 USC § 1611; 42 USC § 604(a)(1); 42 USC § 608(a)(3); 42 USC § 608(a)(10); 45 CFR § 261.13; 45 CFR § 263.2(b)(2) Known Questioned Costs: $6,968 Social Services did not comply with certain federal eligibility requirements for the TANF federal grant program, resulting in known questioned costs of $6,968. The TANF federal grant program provided over $89 million in assistance to approximately 26,000 needy families during fiscal year 2024. During the audit, we reperformed the eligibility determinations for all needy families that received assistance during the fiscal year and identified 24 instances (<1%) where the facts in the recipient's case record did not support the eligibility determination. Specifically: For 14 payments, Social Services did not properly evaluate whether individuals were already counted as eligible for TANF benefits under an existing case which allowed these individuals to receive multiple benefit payments in excess of its Standards of Assistance and maximum program benefit amounts. Title 42 United States Code (USC) § 604(a)(1) mandates that a state may use the grant in any manner that is reasonably calculated to accomplish the purpose of TANF where Social Services’ reasonable calculation is defined by its Standard of Assistance and maximum program benefit amounts within its TANF Program Manual. For five payments, Social Services did not properly assign to the state the rights that the family member may have for child support in which recipients were underpaid in their benefit amount. Title 42 USC § 608(a)(3) mandates that the state shall require that, as a condition of providing assistance, a member of the family assigned to the state the rights the family member may have for support from any other person and this assignment may not exceed the amount of assistance provided by the state. For one payment, Social Services did not properly evaluate the income eligibility of the case. Title 45 CFR § 263.2(b)(2) defines financially “needy” as financially eligible according to the state’s quantified income and resource criteria, which Social Services quantifies through its TANF Manual as maximum income charts in Section 305, Appendix 1. For one payment, Social Services did not properly evaluate the extended absence of a child or adult to the case. Title 42 USC § 608(a)(10) mandates that a state shall not use any part of the grant to provide assistance to a minor child who has been absent from the home for a period of 45 consecutive days. For two payments, Social Services did not properly reduce or terminate assistance for individuals not complying with the Commonwealth’s work requirements for the TANF program. Title 45 CFR § 261.13 mandates that if an individual in a family receiving assistance refuses to engage in required work without good cause, a state must reduce assistance to the family, at least pro rata, with respect to any period during the month in which the individual refuses or may terminate assistance. For one payment, Social Services did not properly evaluate the qualified alien status of the case as required by 8 USC § 1611. Social Services relies on its case management system to properly determine eligibility, correctly calculate benefit payments, and achieve the federal requirements of the TANF federal grant program. Of the exceptions noted above, five of the 24 (21%) were the result of local Social Services eligibility workers mistakenly reporting child support payments as unearned revenue beyond the acceptable timeframe instead of assigning these payments to the Commonwealth for referral to the Division of Child Support Enforcement, as required by the USC. The remaining 19 exceptions (79%) resulted from local Social Services eligibility workers not including sufficient documentation to justify the rationale for their eligibility determinations. Social Services did not identify these exceptions because it did not have a mechanism to identify risky transactions in its case management system that deviate from its normal practices and require further follow-up. Non-compliance with these provisions increases Social Services’ risk of incurring disallowed costs and having to repay grant funds to the federal government. Social Services should continue to provide additional training to local Social Services eligibility workers on how to properly determine and document eligibility determinations in its case management system. Additionally, Social Services should consider implementing a data-driven approach to monitor and analyze data from its case management system to identify risky transactions that deviate from its normal practices. By providing additional training and implementing additional risk-based data analytics, Social Services will be able to ensure that the facts in the applicant’s or recipient’s case record supports each decision in its case management system regarding eligibility and complies with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-106: Strengthen Internal Controls over FFATA Reporting Applicable to: Department of Social Services Prior Year Finding Number: 2023-107; 2022-106 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Finance is not maintaining adequate internal control over Federal Funding Accountability and Transparency Act (FFATA) reporting. FFATA reporting is intended to provide full disclosure of how entities and organizations are obligating federal funds. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds from roughly 5,300 subawards. While auditing FFATA reporting for the TANF federal grant program, we noted that Finance did not file any FFATA reports for its subrecipients. Social Services awarded over $72 million in nearly 300 new TANF subawards during fiscal year 2024. Title 2 CFR Part 170 Appendix A requires the non-federal entity to report each obligating action that equals or exceeds $30,000 to the FFATA Subaward Reporting System (FSRS) by the end of the month following the obligating action. This also applies to any subaward modifications that increase the amount to equal or exceed $30,000. Finally, 2 CFR § 200.303(a) states that the non-federal entity must establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the non-federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Finance uses a decentralized approach to fulfil its FFATA reporting responsibilities since it does not determine which subrecipients will receive federal funding. Since there is an elevated risk that Finance will not report all subaward information to FSRS, it has obtained a report of subrecipients from its financial reporting system and identified those who spent $30,000 or more in TANF funds during fiscal year 2024. However, Finance management did not compare this report to its FSRS submissions to verify that the agency submitted the submissions accurately and timely. As a result, Finance management did not recognize that it did not comply with the FFATA reporting requirements. When Social Services does not upload all obligating actions meeting the reporting threshold to FSRS as required, a citizen or federal official may have a distorted view as to how Social Services is obligating federal funds. Finance management should provide sufficient oversight to confirm that the agency is submitting FFATA reporting submissions timely. Specifically, Finance management should periodically compare the report of subrecipients from its financial reporting system to FSRS to ensure it is reporting all subawards to FSRS and escalate any concerns that hinder its ability to comply with federal regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-083: Ensure Subaward Agreements Meet Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(a)(1) Known Questioned Costs: $0 Social Services does not include all information required by federal regulations in its subaward renewal agreements. We tested 20 subaward renewal agreements and noted that all of them did not contain one or more of the elements required by 2 CFR § 200.332(a)(1). Specifically, we noted the following instances of non-compliance in these subaward renewal agreements: Social Services did not include the correct Federal Award Identification Number (FAIN) in 15 of the 20 (75%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iii). Social Services did not include the federal award date in eight of the 20 (40%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iv). Social Services did not update the federal award date in 12 of the 20 (60%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iv). Social Services did not include the FAIN in five of the 20 (25%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(iii). Social Services did not include the amount of federal funds obligated in the subaward in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(vii). Social Services did not include the subrecipient’s unique entity identifier in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(ii). Social Services did not include the contact information for the awarding official of the pass-through entity in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xi). Social Services did not identify whether the federal award was for research and development in four of the 20 (20%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xiii). Social Services did not include the federal award project description in two of the 20 (10%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(x). Social Services did not accurately report the name of the federal awarding agency in two of the 20 (10%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xi). Social Services did not include the Assistance Listing Number in one of the 20 (5%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xii). Social Services did not identify the indirect cost rate for the federal award in one of the 20 (5%) subaward renewal agreements, as required by 2 CFR § 200.332(a)(1)(xiv). During fiscal year 2024, Social Services disbursed approximately $46 million in federal funds from the TANF federal grant program through 238 subawards. While Social Services communicates federal award information to subgrantees, it does not consistently communicate all of the federal grant award information required in its subaward renewal agreements. The Contract and Procurement team within Social Services’ Division of General Services works collaboratively with grants administrators when preparing subaward agreements. However, the Contract and Procurement team has experienced turnover over the last several years and has lost institutional knowledge in some of its key positions as it pertains to federal grant requirements. Additionally, the Contract and Procurement team does not consistently retain all incorporated attachments in the subaward agreement. Compliance is responsible for ensuring that the agency adheres to federal regulations in 2 CFR § 200.332 through its Agency Monitoring Plan; however, Compliance was not aware of these instances of non-compliance because it was not involved in the preparation of the subaward agreements. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps ensure adherence to state and federal legal and regulatory standards. Because of the lack of agency-wide collaboration, there were inconsistencies in the information included in the subaward agreements. Without communicating the required federal award information, Social Services increases the risk that subrecipients are unaware of the source of the funding and the applicable requirements, which increases the potential for unallowable costs and non-compliance with federal requirements. Compliance should work collaboratively with the Contract and Procurement team and grants administrators to ensure that subaward agreements include all information required by federal regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-084: Review Non-Locality Subrecipient Single Audit Reports Applicable to: Department of Social Services Prior Year Finding Number: 2023-098; 2022-013; 2021-072; 2020-075; 2019-091; 2018-092 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d)(3); 2 CFR § 200.332(f) Known Questioned Costs: $0 Compliance continues to not review non-locality subrecipient Single Audit reports as set forth within its Agency Monitoring Plan. Non-locality subrecipients are subrecipients who are not local governments and are mainly comprised of non-profit organizations. During fiscal year 2024, Social Services disbursed approximately $107 million in federal funds to 244 non-locality subrecipients. While reviewing the Single Audit reports submitted to the Federal Audit Clearinghouse (Clearinghouse) for the most recent audit period for the 27 non-locality subrecipients that received more than $750,000 in federal funds from Social Services during state fiscal year 2024, we noted the following: Six non-locality subrecipients (22%) did not have a Single Audit report available in the Clearinghouse for the most recent audit period. Of the six non-locality subrecipients, three appeared to have never submitted a Single Audit report to the Clearinghouse. Title 2 CFR § 200.332(f) requires pass-through entities to verify their subrecipients are audited if it is expected that the subrecipient’s federal awards expended during the respective fiscal year equaled or exceeded $750,000. Three non-locality subrecipients (11%) had audit findings that affected at least one of Social Services’ federal grant programs. One of the non-locality subrecipient auditors identified $82,253 in known questioned costs as the non-locality subrecipient did not maintain proper documentation to support payroll charges to the TANF federal grant program. Title 2 U.S. CFR § 200.332(d)(3) requires pass-through entities to issue a management decision within six months of acceptance of the audit report by the Clearinghouse. A management decision is Social Services’ written determination, provided to its subrecipient, of the adequacy of the subrecipient’s proposed corrective actions to address the audit findings, based on Social Services’ evaluation of the audit findings, including determining if the questioned costs are disallowed and need to be repaid to the federal awarding agency, and proposed corrective actions. As part of its planned corrective action, Compliance stated that it intends to procure a grants management system with subrecipient monitoring capabilities necessary to comply with federal requirements and has worked with Social Services’ Executive Team to secure funding. However, Compliance has yet to establish a timeline for when it intends for the solution to be fully functional. Additionally, Compliance has not evaluated what alternative corrective actions are available to become compliant. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps ensure adherence to state and federal legal and regulatory standards. Additionally, Social Services’ Agency Monitoring Plan assigns the responsibility to Compliance for overseeing the agency’s subrecipient monitoring process. Without verifying whether non-locality subrecipients received a Single Audit, Compliance is unable to assure Social Services’ Executive Team that it is fulfilling the pass-through entity responsibilities in 2 CFR § 200.332. Not complying with federal regulations could result in federal awarding agencies temporarily withholding payments until it takes corrective action, disallowing costs for all or part of the activity associated with the noncompliance, suspending, or terminating the federal award in part or in its entirety, initiating initial suspension or debarment proceedings, and/or withholding further federal funds for the project or program. Further, Social Services may be unaware of a potential liability to the Commonwealth by not reviewing the non-locality Single Audit reports. Compliance should consider exploring alternative corrective actions as it continues to develop and implement its grants management system, such as obtaining a list of non-locality subrecipients from its internal accounting system and reviewing the Single Audit reports in the Clearinghouse. Evaluating alternative corrective actions to become compliant with federal regulations will help Social Services mitigate the risks of incurring federal sanctions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-101: Implement Internal Controls over TANF Federal Performance Reporting Applicable to: Department of Social Services Prior Year Finding Number: 2023-105; 2022-103 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 45 CFR § 265.7(b) Known Questioned Costs: $0 Benefit Programs does not have adequate internal controls in place to ensure accurate reporting in the ACF-199 and ACF-209 performance reports. The ACF requires Social Services to submit this data to ACF quarterly, and ACF uses the data to determine whether the Commonwealth met the minimum work participation requirements for the TANF federal grant program. Benefit Programs uses a third-party service provider to produce the ACF-199 and ACF-209 reports and relies solely on their internal controls during the data extraction and data reporting process. Since the prior audit, Benefit Programs has worked with its service provider to analyze the reporting errors to determine the cause and appropriate actions to resolve these errors. However, because of the extent of its corrective actions, Benefit Programs has not fully implemented all of its corrective actions and continues to rely on ACF’s error correction controls, performed after report submission, to obtain assurance over the accuracy of the data included in its submissions. We audited 60 cases and identified 19 instances (32%) where the third-party service provider did not report key line-item information accurately based on the data Social Services maintains in its case management system or other supporting data and Benefit Programs did not detect or correct these errors before the third-party service provider submitted the data to ACF. Specifically, we noted that Benefit Programs did not accurately report on the following key line items: Benefit Programs did not accurately report on the “Work Participation Status” key line item for 13 out of 60 (22%) cases tested during the audit. Benefit Programs did not accurately report on the “Receives Subsidized Child Care” key line item for four out of 31 (13%) cases tested during the audit. Benefit Programs did not accurately report on the “Hours of Participation” key line item for four out of 60 (7%) cases tested during the audit. Benefit Programs did not accurately report on the “Work Eligibility Individual Indicator” key line item for two out of 60 (3%) cases tested during the audit. Benefit Programs did not accurately report on the “Number of Months Countable Toward Federal Time Clock” key line item for two out of 56 (4%) cases tested during the audit. Benefit Programs did not accurately report on the “Type of Family for Work Participation” key line item for two out of 60 (3%) cases tested during the audit. Benefit Programs did not accurately report on the “Parent with Minor Child” key line item for one out of 56 (2%) cases tested during the audit. Benefit Programs did not accurately report on the “Unsubsidized Employment” key line item for one out of 60 (2%) cases tested during the audit. Additionally, because of the lack of internal control over the ACF-199 and ACF-209 federal reports, Benefit Programs did not identify that the ACF revised the reporting specifications in November 2023 for certain key line items. Although ACF provided administering agencies with nearly a year to implement the new reporting specifications, Benefit Programs has not yet initiated discussions with its service provider to bring its current reporting model in line with the new reporting specifications. Therefore, there is risk that Social Services will continue to report inaccurate information to ACF going forward without working with its service provider to implement the new reporting specifications. Title 45 CFR § 265.7(b) requires States to have complete and accurate reports, which means that the reported data accurately reflects information available in case records, are free of computational errors, and are internally consistent. Additionally, 2 CFR § 303(a) requires that Social Services establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the recipient or subrecipient is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Reporting potentially inaccurate or incomplete information prevents the ACF from adequately monitoring Social Services’ work participation rates and the overall performance for the TANF federal grant program. Further, ACF can impose a penalty if it finds Social Services did not meet statutory required work participation rates. Because of the scope of this matter and errors noted above, we consider it to be a material weakness in internal control. Additionally, we believe this matter represents material noncompliance since Social Services did not comply with the provisions at 45 CFR § 265.7(b). Benefit Programs should implement internal controls over the TANF federal performance reporting process and include a documented secondary review process of the service providers’ data for which it should complete prior to the report submission. Additionally, Benefit Programs should develop a process to track changes to the reporting specifications and communicate the changes to the service provider in advance of the applicable implementation date. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-102: Implement Internal Controls over TANF Federal Special Reporting Applicable to: Department of Social Services Prior Year Finding Number: 2023-106 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR § 200.303(a) Known Questioned Costs: $0 Benefit Programs has not documented its process for preparing the ACF’s Annual Report on State MOE Programs (ACF-204) for the TANF federal grant program. ACF requires Social Services submit this data annually and uses the information in reports to Congress about how TANF programs are evolving, in assessing State and Territory MOE expenditures, and in assessing the need for legislative changes. Title 2 CFR § 200.303(a) requires the non-federal entity to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the recipient is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. During fiscal year 2024, Benefit Programs performed an analysis of ACF-204 reporting errors identified during the prior audit to determine causality and has taken actions to resolve those errors. Additionally, Benefit Programs created a systems modification request to correct errors that it identified as occurring due to inaccurate programming in the data modification phase of the federal report creation. However, Benefit Programs has not yet documented its processes for preparing the ACF-204 report through a written policy and procedure. Documented policies and procedures will help Social Services maintain continuity with its processes to comply with laws and regulations. Without documented policies and procedures, there is a risk that Social Services could report inaccurate information to the federal government that could lead to Social Services incurring fines and/or penalties. Benefit Programs should dedicate the necessary resources to document its processes for preparing the ACF-204 report to ensure reasonably accurate reporting of TANF MOE Programs to ACF in accordance with the ACF-204 reporting instructions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-103: Monitor Case Management System Records to Ensure Compliance with TANF Eligibility Requirements Applicable to: Department of Social Services Prior Year Finding Number: 2023-103 Type of Finding: Compliance Severity of Deficiency: N/A Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Eligibility - 8 USC § 1611; 42 USC § 604(a)(1); 42 USC § 608(a)(3); 42 USC § 608(a)(10); 45 CFR § 261.13; 45 CFR § 263.2(b)(2) Known Questioned Costs: $6,968 Social Services did not comply with certain federal eligibility requirements for the TANF federal grant program, resulting in known questioned costs of $6,968. The TANF federal grant program provided over $89 million in assistance to approximately 26,000 needy families during fiscal year 2024. During the audit, we reperformed the eligibility determinations for all needy families that received assistance during the fiscal year and identified 24 instances (<1%) where the facts in the recipient's case record did not support the eligibility determination. Specifically: For 14 payments, Social Services did not properly evaluate whether individuals were already counted as eligible for TANF benefits under an existing case which allowed these individuals to receive multiple benefit payments in excess of its Standards of Assistance and maximum program benefit amounts. Title 42 United States Code (USC) § 604(a)(1) mandates that a state may use the grant in any manner that is reasonably calculated to accomplish the purpose of TANF where Social Services’ reasonable calculation is defined by its Standard of Assistance and maximum program benefit amounts within its TANF Program Manual. For five payments, Social Services did not properly assign to the state the rights that the family member may have for child support in which recipients were underpaid in their benefit amount. Title 42 USC § 608(a)(3) mandates that the state shall require that, as a condition of providing assistance, a member of the family assigned to the state the rights the family member may have for support from any other person and this assignment may not exceed the amount of assistance provided by the state. For one payment, Social Services did not properly evaluate the income eligibility of the case. Title 45 CFR § 263.2(b)(2) defines financially “needy” as financially eligible according to the state’s quantified income and resource criteria, which Social Services quantifies through its TANF Manual as maximum income charts in Section 305, Appendix 1. For one payment, Social Services did not properly evaluate the extended absence of a child or adult to the case. Title 42 USC § 608(a)(10) mandates that a state shall not use any part of the grant to provide assistance to a minor child who has been absent from the home for a period of 45 consecutive days. For two payments, Social Services did not properly reduce or terminate assistance for individuals not complying with the Commonwealth’s work requirements for the TANF program. Title 45 CFR § 261.13 mandates that if an individual in a family receiving assistance refuses to engage in required work without good cause, a state must reduce assistance to the family, at least pro rata, with respect to any period during the month in which the individual refuses or may terminate assistance. For one payment, Social Services did not properly evaluate the qualified alien status of the case as required by 8 USC § 1611. Social Services relies on its case management system to properly determine eligibility, correctly calculate benefit payments, and achieve the federal requirements of the TANF federal grant program. Of the exceptions noted above, five of the 24 (21%) were the result of local Social Services eligibility workers mistakenly reporting child support payments as unearned revenue beyond the acceptable timeframe instead of assigning these payments to the Commonwealth for referral to the Division of Child Support Enforcement, as required by the USC. The remaining 19 exceptions (79%) resulted from local Social Services eligibility workers not including sufficient documentation to justify the rationale for their eligibility determinations. Social Services did not identify these exceptions because it did not have a mechanism to identify risky transactions in its case management system that deviate from its normal practices and require further follow-up. Non-compliance with these provisions increases Social Services’ risk of incurring disallowed costs and having to repay grant funds to the federal government. Social Services should continue to provide additional training to local Social Services eligibility workers on how to properly determine and document eligibility determinations in its case management system. Additionally, Social Services should consider implementing a data-driven approach to monitor and analyze data from its case management system to identify risky transactions that deviate from its normal practices. By providing additional training and implementing additional risk-based data analytics, Social Services will be able to ensure that the facts in the applicant’s or recipient’s case record supports each decision in its case management system regarding eligibility and complies with federal requirements. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-106: Strengthen Internal Controls over FFATA Reporting Applicable to: Department of Social Services Prior Year Finding Number: 2023-107; 2022-106 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Temporary Assistance for Needy Families (TANF) - 93.558 Federal Award Number and Year: 2401VATANF - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR Part 170 Appendix A Known Questioned Costs: $0 Finance is not maintaining adequate internal control over Federal Funding Accountability and Transparency Act (FFATA) reporting. FFATA reporting is intended to provide full disclosure of how entities and organizations are obligating federal funds. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds from roughly 5,300 subawards. While auditing FFATA reporting for the TANF federal grant program, we noted that Finance did not file any FFATA reports for its subrecipients. Social Services awarded over $72 million in nearly 300 new TANF subawards during fiscal year 2024. Title 2 CFR Part 170 Appendix A requires the non-federal entity to report each obligating action that equals or exceeds $30,000 to the FFATA Subaward Reporting System (FSRS) by the end of the month following the obligating action. This also applies to any subaward modifications that increase the amount to equal or exceed $30,000. Finally, 2 CFR § 200.303(a) states that the non-federal entity must establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the non-federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Finance uses a decentralized approach to fulfil its FFATA reporting responsibilities since it does not determine which subrecipients will receive federal funding. Since there is an elevated risk that Finance will not report all subaward information to FSRS, it has obtained a report of subrecipients from its financial reporting system and identified those who spent $30,000 or more in TANF funds during fiscal year 2024. However, Finance management did not compare this report to its FSRS submissions to verify that the agency submitted the submissions accurately and timely. As a result, Finance management did not recognize that it did not comply with the FFATA reporting requirements. When Social Services does not upload all obligating actions meeting the reporting threshold to FSRS as required, a citizen or federal official may have a distorted view as to how Social Services is obligating federal funds. Finance management should provide sufficient oversight to confirm that the agency is submitting FFATA reporting submissions timely. Specifically, Finance management should periodically compare the report of subrecipients from its financial reporting system to FSRS to ensure it is reporting all subawards to FSRS and escalate any concerns that hinder its ability to comply with federal regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-104: Implement Internal Controls over LIHEAP Federal Special Reporting Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VALIEA - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR § 200.303(a); 45 CFR § 96.82(a) Known Questioned Costs: $0 Benefit Programs has not documented its processes for preparing and verifying the information reported in the LIHEAP federal grant program’s Annual Household Report. The federal government requires Social Services to annually submit this data and uses this information to provide reports to Congress for assessing the uses of funds for the assistance of households in need. Benefit Programs uses a third-party service provider to produce data reports from its case management system that program staff use to populate the LIHEAP Annual Household Report and Benefit Programs relies on the third-party service provider’s internal controls during the data extraction process. Benefit Programs could not substantiate the information reported for four out of seven (57%) of the line items in Section I - Number of assisted households of the most recent LIHEAP Annual Household Report. Specifically, we noted the following inconsistencies: Benefit Programs reported 2,571 households assisted on the Emergency Furnace Repair and Replacement line, which is 12 percent higher than the information in the case management system. Benefit Programs reported 118,347 households assisted on the Any Type of LIHEAP Assistance line, which is 21 percent lower than the information in the case management system. Benefit Programs reported 117,274 households assisted on the Bill Payment Assistance line, which is 20 percent higher than the information in the case management system. Benefit Programs could not provide support to substantiate the Weatherization line. Title 2 CFR § 200.303(a) requires the non-federal entity to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the recipient is managing the federal award in compliance with federal statutes, regulations, and its terms and conditions. Further, 45 CFR § 96.82(a) requires each grantee, whether a State or an insular area, that receives an annual allotment of at least $200,000 to submit this data for the 12-month period preceding the federal fiscal year in which the grantee requests the funds. The grantee must report the data separately for LIHEAP heating, cooling, crisis, and weatherization assistance. If Social Services does not submit this report properly, ACF may not grant them their LIHEAP grant allotment as per 45 CFR § 96.82(c). Benefit Programs has not dedicated the necessary resources to document its processes for preparing the LIHEAP Annual Household Report. Documented policies and procedures will help Social Services maintain continuity with its processes to comply with laws and regulations. Without documented policies and procedures, there is a risk that Social Services could report inaccurate information to the federal government that could lead to Social Services incurring fines and/or penalties. Additionally, reporting potentially inaccurate information prevents the federal government from adequately monitoring Social Services’ overall performance for the LIHEAP federal grant program. Therefore, Benefit Programs should dedicate the necessary resources to document its processes for preparing the LIHEAP Annual Household Report, including the processes used to verify the data provided by its third-party service provider. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-105: Monitor Case Management System Records to Ensure Compliance with LIHEAP Eligibility Requirements Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Compliance Severity of Deficiency: N/A Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VALIEA - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Eligibility - 42 USC § 8624(b)(10) Known Questioned Costs: $6,569 Social Services did not comply with certain federal eligibility requirements for the LIHEAP federal grant program, resulting in known questioned costs of $6,569. Social Services provided over $114 million in assistance to approximately 215,000 needy families during fiscal year 2024 through the LIHEAP federal grant program. During the audit, we reperformed the eligibility determinations for all needy families that received assistance during the fiscal year and identified 12 instances (<1%) where individuals applied for benefits more than once and received benefit payments in excess of Social Services’ maximum benefit amounts. Social Services relies on its case management system to ensure it determines eligibility properly, calculates benefit payments correctly, and complies with the federal and state laws and regulations. However, Social Services’ case management system does not prevent eligibility workers from authorizing individuals on multiple cases but instead provides a warning message for which they could choose to ignore. Additionally, Social Services does not have a mechanism to detect when an individual has received benefits from multiple cases and/or received benefit payments in excess of its maximum benefit amount. Title 42 USC § 8624(b)(10) mandates that the State shall provide fiscal control to assure the proper disbursal of and accounting for Federal funds, including procedures for monitoring the assistance provided. Further, Social Services’ Energy Assistance Program Manual, which it developed to comply with 42 USC § 8624(b)(10), stipulates that the eligibility worker will determine whether each adult household member is associated with an existing case number when they apply or reapply for benefits. Non-compliance with these provisions increases Social Services’ risk of incurring disallowed costs and having to repay grant funds to the federal government. Social Services should provide additional training to eligibility workers to properly identify individuals who have already applied for and received LIHEAP benefits. Additionally, Social Services should review the case management system’s current warning messages to determine how it can strengthen internal controls so that eligibility workers will not be able to approve cases which could result in this type of error. Finally, Social Services should consider implementing a detective control, such as reviewing payment reports, to identify potential disallowed payments resulting from an individual appearing on multiple case records. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-104: Implement Internal Controls over LIHEAP Federal Special Reporting Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VALIEA - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Reporting - 2 CFR § 200.303(a); 45 CFR § 96.82(a) Known Questioned Costs: $0 Benefit Programs has not documented its processes for preparing and verifying the information reported in the LIHEAP federal grant program’s Annual Household Report. The federal government requires Social Services to annually submit this data and uses this information to provide reports to Congress for assessing the uses of funds for the assistance of households in need. Benefit Programs uses a third-party service provider to produce data reports from its case management system that program staff use to populate the LIHEAP Annual Household Report and Benefit Programs relies on the third-party service provider’s internal controls during the data extraction process. Benefit Programs could not substantiate the information reported for four out of seven (57%) of the line items in Section I - Number of assisted households of the most recent LIHEAP Annual Household Report. Specifically, we noted the following inconsistencies: Benefit Programs reported 2,571 households assisted on the Emergency Furnace Repair and Replacement line, which is 12 percent higher than the information in the case management system. Benefit Programs reported 118,347 households assisted on the Any Type of LIHEAP Assistance line, which is 21 percent lower than the information in the case management system. Benefit Programs reported 117,274 households assisted on the Bill Payment Assistance line, which is 20 percent higher than the information in the case management system. Benefit Programs could not provide support to substantiate the Weatherization line. Title 2 CFR § 200.303(a) requires the non-federal entity to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the recipient is managing the federal award in compliance with federal statutes, regulations, and its terms and conditions. Further, 45 CFR § 96.82(a) requires each grantee, whether a State or an insular area, that receives an annual allotment of at least $200,000 to submit this data for the 12-month period preceding the federal fiscal year in which the grantee requests the funds. The grantee must report the data separately for LIHEAP heating, cooling, crisis, and weatherization assistance. If Social Services does not submit this report properly, ACF may not grant them their LIHEAP grant allotment as per 45 CFR § 96.82(c). Benefit Programs has not dedicated the necessary resources to document its processes for preparing the LIHEAP Annual Household Report. Documented policies and procedures will help Social Services maintain continuity with its processes to comply with laws and regulations. Without documented policies and procedures, there is a risk that Social Services could report inaccurate information to the federal government that could lead to Social Services incurring fines and/or penalties. Additionally, reporting potentially inaccurate information prevents the federal government from adequately monitoring Social Services’ overall performance for the LIHEAP federal grant program. Therefore, Benefit Programs should dedicate the necessary resources to document its processes for preparing the LIHEAP Annual Household Report, including the processes used to verify the data provided by its third-party service provider. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-105: Monitor Case Management System Records to Ensure Compliance with LIHEAP Eligibility Requirements Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Compliance Severity of Deficiency: N/A Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VALIEA - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Eligibility - 42 USC § 8624(b)(10) Known Questioned Costs: $6,569 Social Services did not comply with certain federal eligibility requirements for the LIHEAP federal grant program, resulting in known questioned costs of $6,569. Social Services provided over $114 million in assistance to approximately 215,000 needy families during fiscal year 2024 through the LIHEAP federal grant program. During the audit, we reperformed the eligibility determinations for all needy families that received assistance during the fiscal year and identified 12 instances (<1%) where individuals applied for benefits more than once and received benefit payments in excess of Social Services’ maximum benefit amounts. Social Services relies on its case management system to ensure it determines eligibility properly, calculates benefit payments correctly, and complies with the federal and state laws and regulations. However, Social Services’ case management system does not prevent eligibility workers from authorizing individuals on multiple cases but instead provides a warning message for which they could choose to ignore. Additionally, Social Services does not have a mechanism to detect when an individual has received benefits from multiple cases and/or received benefit payments in excess of its maximum benefit amount. Title 42 USC § 8624(b)(10) mandates that the State shall provide fiscal control to assure the proper disbursal of and accounting for Federal funds, including procedures for monitoring the assistance provided. Further, Social Services’ Energy Assistance Program Manual, which it developed to comply with 42 USC § 8624(b)(10), stipulates that the eligibility worker will determine whether each adult household member is associated with an existing case number when they apply or reapply for benefits. Non-compliance with these provisions increases Social Services’ risk of incurring disallowed costs and having to repay grant funds to the federal government. Social Services should provide additional training to eligibility workers to properly identify individuals who have already applied for and received LIHEAP benefits. Additionally, Social Services should review the case management system’s current warning messages to determine how it can strengthen internal controls so that eligibility workers will not be able to approve cases which could result in this type of error. Finally, Social Services should consider implementing a detective control, such as reviewing payment reports, to identify potential disallowed payments resulting from an individual appearing on multiple case records. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-011: Improve Fiscal Agent Oversight Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(a) Known Questioned Costs: $0 Medical Assistance Services did not obtain and review a System and Organization Controls (SOC) report, specifically a SOC I, Type 2 report, to gain assurance over its fiscal agent’s internal controls relevant to financial reporting. In addition to services related to information systems management and security, Medical Assistance Services contracts with the fiscal agent to perform accurate and timely payments of Medicaid claims to providers and maintain an accounts receivable ledger for the collection of provider funds owed to Medical Assistance Services. The fiscal agent processed over $22 billion in Medicaid-related payments during fiscal year 2024. Medical Assistance Services obtained a SOC 2, Type 2 report related to the fiscal agent’s controls over information systems management and security, however, this report did not provide an opinion over internal controls relevant to Medical Assistance Services’ significant fiscal activity and financial reporting. The Commonwealth’s Accounting Policies and Procedures Manual Topic 10305 requires agencies to have adequate interaction with service providers to appropriately understand the service provider’s internal control environment. It also states that agencies must also maintain oversight over service providers to gain assurance over outsourced operations. Additionally, Title 2 U.S. Code of Federal Regulations (CFR) § 200.303(a) requires non-federal entities to establish and maintain effective internal control over the federal award that provides reasonable assurance that the non-federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. The existing contract between Medical Assistance Services and the fiscal agent does not require the fiscal agent to obtain an independent review opining to the effectiveness of internal controls related to Medical Assistance Services’ significant fiscal activities and financial reporting. Management asserted that they are currently working to modify the contract with the provider to add this requirement. Although management maintains a high degree of interaction with its fiscal agent, they cannot adequately ensure the fiscal agent has designed and implemented sufficient controls, and whether the controls are operating effectively without obtaining and reviewing a SOC I, Type 2 report. This issue increases the risk that management will not detect a weakness in the fiscal agent’s environment, which could negatively impact the Commonwealth. Medical Assistance Services should continue to work with the fiscal agent to add language to the contract that would require the fiscal agent to obtain an appropriate independent audit of its internal controls relevant to Medical Assistance Services’ financial activities and reporting. Once the new contract language is in effect, Medical Assistance Services’ management should obtain and review the SOC I, Type 2 report annually to ensure the fiscal agent is meeting contractual obligations and has proper internal controls over Medical Assistance Services’ significant fiscal activities and financial reporting. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-017: Improve IT Third-Party Oversight Process Applicable to: Department of Medical Assistance Services Prior Year Finding Number: 2023-086; 2022-090 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Third-Party Service Providers (Information Systems) ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services has made progress to document and implement a formal process for maintaining oversight for three of its IT third-party service providers that manage and support its Medicaid management system. The Medicaid management system encompasses different functions, such as member and provider reporting, financial reporting, and federal reporting. Since the prior year audit, Medical Assistance Services developed its Information Technology (IT) Third Party Risk Management Procedure, which was effective on February 1, 2024, to facilitate the implementation of its IT System and Services Acquisition Policy. However, Medical Assistance Services is still working to implement the new procedure, which has resulted in the agency not yet verifying the following required controls and processes for one of the Medicaid management system IT service providers that is not covered by the Virginia Information Technologies Agency (VITA) Commonwealth of Virginia Risk and Authority Management Program. Medical Assistance Services does not confirm the geographic location of sensitive data monthly for IT service providers. Without confirming the geographic location of sensitive data, Medical Assistance Services may be unable to enforce contract requirements, laws, and standards due to the data falling outside of the United States’ jurisdiction. Medical Assistance Services does not confirm whether IT service providers perform vulnerability scans every 90 days. By not obtaining and analyzing the vulnerability scan results from the IT service provider, Medical Assistance Services increases the risk that the IT service providers are not remediating legitimate vulnerabilities in a timely manner. Medical Assistance Services experienced delays in implementing its new procedure due to limited staffing to properly communicate and train those responsible for monitoring IT service providers. Medical Assistance Services expects to complete its implementation by October 2024. Medical Assistance Services should dedicate the resources necessary to finish implementing its Third-Party Risk Management Procedure. Additionally, Medical Assistance Services should ensure that those tasked with monitoring IT service providers are confirming the geographic location of sensitive data and the provider’s performance of vulnerability scanning and remediation efforts per the Security Standard. Medical Assistance Services should also ensure the individuals responsible for monitoring consistently perform formal oversight processes in a timely manner, which will help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-022: Improve Information Security Program and Controls Applicable to: Department of Medical Assistance Services Prior Year Finding Number: 2023-010; 2022-024; 2021-024; 2020-024 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: Access Control; Awareness and Training; Incident Response; Information Security Roles and Responsibilities; Planning; Risk Assessment; Security Assessment and Authorization; System and Services Acquisition ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services continues to address weaknesses in its information technology (IT) general controls originally identified in a 2020 audit and confirmed in a 2023 audit covering the same IT general controls conducted by Medical Assistance Services’ Internal Audit division. During the 2023 audit, Internal Audit tested 105 controls required by the Commonwealth’s previous version of the Information Security Standard, SEC501, and identified 61 individual control weaknesses, a 58% non-compliance rate, that Internal Audit grouped into eight findings. Medical Assistance Services addressed four of the eight findings during fiscal year 2024. Noncompliance with required security controls increases the risk for unauthorized access to mission-critical systems and data in addition to weakening Medical Assistance Services ability to respond to malicious attacks to its IT environment. Medical Assistance Services has experienced delays in addressing these findings due to the number of findings and resources required to remediate the weaknesses. Medical Assistance Services updated its corrective action plan for the four remaining findings in June 2024, stating corrective actions are still ongoing with an estimated completion date of September 2024. Medical Assistance Services should prioritize and dedicate the necessary resources to ensure timely completion of its corrective action plans and to become compliant with the current version of the Commonwealth’s Information Security Standard, SEC530 (Security Standard). These actions will help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-023: Improve Database Security Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control; Audit and Accountability; Configuration Management; Contingency Planning; Identification and Authentication; System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services does not have formal policies, procedures, and a baseline configuration that outlines requirements and justifications for securing and maintaining the database supporting its primary system for financial accounting and reporting operations in accordance with the Security Standard, and industry best practices, such as the Center for Internet Security Benchmarks (CIS Benchmark). As a result, Medical Assistance Services has not implemented some required controls over the database. We communicated the weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. The Security Standard requires Medical Assistance Services to develop, document, and disseminate information security policies and procedures that align with the control requirements in the Security Standard. Additionally, the Security Standard requires Medical Assistance Services to develop, document, and maintain a current baseline configuration of the system and apply more restrictive security configurations for sensitive systems. The Security Standard also requires Medical Assistance Services to review and update the policies, procedures, and baseline configuration on an annual basis and following an environmental change. Without detailed policies, procedures, and a baseline configuration that outlines requirements and justifications for securing and maintaining its database, Medical Assistance Services increases the risk that the system will not meet the minimum security requirements and recommendations to protect its sensitive data from malicious parties. Medical Assistance Services has experienced a lack of resources which has contributed to the absence of documentation outlining control requirements and procedures needed to properly secure the database. The absence of this documentation contributed to the deficiencies communicated in the FOIAE document and as a result, Medical Assistance Services has not consistently evaluated and applied security controls. Medical Assistance Services should dedicate the resources necessary to develop and implement formal policies and procedures to support its database based on the Security Standard requirements and settings recommended by industry best practices, such as the CIS Benchmark. Medical Assistance Services should develop a formal baseline configuration for the database that defines required security controls outlined in industry best practices, such as the CIS Benchmark. The baseline configuration should define deviations from recommended and expected security configurations as well as business justification and approval for any deviations. Additionally, Medical Assistance Services should develop a process to review the database’s configuration against its established baseline configuration on a scheduled basis and after major changes occur to help detect and address potential misconfigurations timely. Furthermore, Medical Assistance Services should implement the security controls and processes communicated in the FOIAE document to address risks present in the database to ensure the configuration aligns with the Security Standard and CIS Benchmark. These actions will help maintain the confidentiality, availability, and integrity of Medical Assistance Services’ sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-024: Continue Improving IT Risk Management Program Applicable to: Department of Social Services Prior Year Finding Number: 2023-014; 2022-030; 2021-026; 2020-027; 2019-063; 2018-025 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Planning; Risk Assessment ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to not have a formal and effective IT risk management program that aligns with the requirements in the Security Standard. Since we first issued this finding in 2018, Social Services remediated some risk management and contingency planning issues. However, Social Services continues not to: accurately verify and validate data and system sensitivity ratings; create risk assessments for 90 percent of its sensitive systems; create system security plans for the 55 current systems identified as sensitive; review risk assessments for 100 percent of its existing documentation; and implement corrective actions identified in risk assessments. We communicated the details of these weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. ISRM and TSD defined and documented a new risk assessment policy and procedure in April 2024. Social Services also established a new risk assessment process that engages system administrators and system owners to complete a risk assessment worksheet to submit to ISRM for evaluation. ISRM meets with system administrators, system owners, and the Agency Head, to review the resulting risk assessment report and establish a risk mitigation plan. However, Social Services has not yet matured the new risk assessment process due to recently formalizing the process. Social Services established the Cybersecurity Team as part of TSD in fiscal year 2024; therefore, the Cybersecurity Team and ISRM have not yet assessed and integrated the various risk management processes. Additionally, the new risk assessment procedure does not define and document the requirements and processes Social Services must follow to implement the corrective action responsibilities. ISRM should work with TSD, the Cybersecurity Team, and business units to ensure Social Services establishes and maintains an up-to-date sensitive systems list. The Information Security Officer, in conjunction with system and data owners, should classify agency IT systems and data based on sensitivity. Following its new risk assessment procedure and process, ISRM and the Cybersecurity Team should prioritize completing risk assessments and system security plans for its sensitive systems and review those documents annually to validate that the information reflects the current environment. Additionally, TSD should implement security controls to mitigate the risks and vulnerabilities identified in its risk assessments. Improving the IT risk management program will help to ensure the confidentiality, integrity, and availability of the agency’s sensitive systems and mission-essential functions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-025: Improve Web Application Security Applicable to: Department of Social Services Prior Year Finding Number: 2023-015; 2022-029; 2021-025; 2020-026; 2019-037 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Audit and Accountability; Configuration Management; Risk Assessment; System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to not configure a sensitive web application in accordance with the Security Standard. During fiscal year 2024, Social Services remediated two of the five previously identified weaknesses; however, these two weaknesses existed during the fiscal year under review. Additionally, Social Services has not remediated three of the previously identified weaknesses. We communicated the weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. Lacking and insufficient procedures and processes to manage the web application contributed to the five weaknesses outlined in the separate FOIAE document. Social Services prioritizing other projects also contributed to the weaknesses persisting. TSD, ISRM, and business owners should work together to remediate the remaining weaknesses to secure the web application and meet the minimum requirements in its internal policies and the Security Standard. Addressing these weaknesses will help to ensure the confidentiality, integrity, and availability of sensitive and mission-critical data and achieve compliance with both internal policies and the Security Standard. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-035: Improve Information Security Program and IT Governance Applicable to: Department of Social Services Prior Year Finding Number: 2023-027; 2022-022 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: Information Security Roles and Responsibilities ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to have an insufficient governance structure to manage and maintain its information security program in accordance with the Security Standard. Specifically, Social Services does not assess information security requirements for its information technology (IT) projects and prioritize information security and IT resources to ensure its information security program effectively protects sensitive Commonwealth data in accordance with the Security Standard. We communicated the control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to its sensitivity and description of security controls. The Security Standard requires the agency head to maintain an information security program that is sufficient to protect the agency’s IT systems and to ensure the agency documents and effectively communicates the information security program. Not prioritizing IT resources to properly manage its information security program can result in a data breach or unauthorized access to confidential and mission-critical data, leading to data corruption, data loss, or system disruption if accessed by a malicious attacker, either internal or external. The control weaknesses described in the communication marked FOIAE are the result of Social Services not assessing information security requirements prior to project implementation, in addition to Social Services not prioritizing information security within the IT environment. Social Services has hindered its ability to consistently and timely remediate findings from management recommendations issued during prior year audits and bring the information security program in compliance with the Security Standard by not dedicating the necessary IT resources to information security. During fiscal year 2024, Social Services created a cybersecurity team under the Technology Services Division (TSD) to liaison between TSD and the Division of Information Security and Risk Management (ISRM) to help bring the information security program in compliance with the Security Standard. However, due to the magnitude of the project, TSD, the cybersecurity team, ISRM, and the executive team have not yet completed efforts to remediate this finding. TSD, ISRM, and Social Services’ Cybersecurity and Executive teams should continue to work together to bring the IT security program in compliance with the Security Standard. TSD and ISRM should continue to evaluate IT resource levels to ensure sufficient resources are available and dedicated to prioritizing and implementing IT governance changes and address the control deficiencies discussed in the communication marked FOIAE. Additionally, Social Services should evaluate the organizational placement of the Information Security Officer (ISO) to ensure effective implementation of the information security program and controls. Implementing these recommendations will help to ensure Social Services protects the confidentiality, integrity, and availability of its sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-041: Evaluate Separation of Duty Conflicts within the Case Management System Applicable to: Department of Social Services Prior Year Finding Number: 2023-034 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Benefit Programs, which is the owner of Social Services’ case management system, has not performed nor documented a conflicting access review to identify the combination of roles that could pose a separation of duties conflict or to ensure compensating controls are in place to mitigate risks arising from those conflicts. Social Services uses the case management system to determine applicant eligibility and authorize benefit payments for the Medicaid, SNAP, CCDF, LIHEAP, and TANF federal grant programs. Social Services authorized over $17 billion in public assistance payments to beneficiaries from these federal programs through its case management system during fiscal year 2024. The Security Standard requires the agency to separate duties of individuals as necessary, document separation of duties of individuals, and define information system access authorizations to support the separation of duties. Further, Social Services’ Information Security Policy states that the system owner is responsible for identifying and documenting separation of duties of individuals and defining system access authorizations to support separation of duties. Without performing and documenting a conflicting access review, Social Services does not know which combination of roles may pose a separation of duties conflict and is unable to implement compensating controls. In effect, this increases the possibility of a system breach or other malicious attack on Social Services’ data and places Social Services’ reputation at risk. Benefit Programs has not yet begun their corrective action efforts and ISRM has not included this finding in its Plan of Actions and Milestones (POAM) report, which is its internal corrective action plan that it shares with Social Services’ Executive Team. As a result, Social Services’ Executive Team was not aware that Social Services continues to be non-compliant with the Security Standard and its Information Security Policy. According to Social Services’ Organizational Structure Report, ISRM provides guidance to system owners about security requirements and is ultimately responsible for protecting Social Services’ information systems by addressing security compliance and risk. Benefit Programs should conduct a conflicting access review for the case management system and collaborate with ISRM to ensure it performs and documents this review in accordance with Social Services’ Information Security Policy. Additionally, ISRM should monitor this finding’s progress through its POAM report and provide periodic updates to Social Services’ Executive Team. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-042: Perform Annual Review of Case Management System Access Applicable to: Department of Social Services Prior Year Finding Number: 2023-035 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Benefit Programs, which is the owner of Social Services’ case management system, continues to not perform the required annual access review. Social Services uses the case management system to determine applicant eligibility and authorize benefit payments for the Medicaid, SNAP, CCDF, LIHEAP, and TANF federal grant programs. Social Services authorized over $17 billion in public assistance payments to beneficiaries from these federal programs through its case management system during fiscal year 2024. The Security Standard requires the agency to review accounts for compliance with account management on an annual basis. Additionally, ISRM’s Procedures Manual for State and Local Security Officers requires system owners and security officers to review user access privileges annually. System owners and security officers must complete this review within 364 days from the completion date of the last security review. Benefit Programs last completed a security review over the case management system in June 2022. Benefit Programs is responsible for obtaining the case management system’s access listing from ISRM, coordinating the annual review with the security officers, and working with ISRM to modify user access privileges as necessary. However, Benefit Programs did not perform the required annual access review for the case management system because it did not initiate the process with ISRM, and ISRM did not include this finding in its POAM report, which is its internal corrective action plan that it shares with Social Services’ Executive Team. As a result, Social Services’ Executive Team was not aware that Social Services continues to be non-compliant with the Security Standard and its Procedures Manual for State and Local Security Officers. According to Social Services’ Organizational Structure Report, ISRM provides guidance to System Owners about security requirements and is ultimately responsible for protecting Social Services’ information systems by addressing security compliance and risk. Social Services increases the risk of improper or unnecessary access to sensitive systems by not reviewing access to the case management system annually, which could potentially result in a system breach or other malicious attack on Social Services’ data and adversely affect its reputation. Benefit Programs should perform the required annual security review for the case management system and collaborate with ISRM to ensure it completes this review in accordance with the Procedures Manual for State and Local Officers. Additionally, ISRM should monitor this finding’s progress through its POAM report and provide periodic updates to Social Services’ Executive Team. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-047: Continue Improving IT Change and Configuration Management Process Applicable to: Department of Social Services Prior Year Finding Number: 2023-049; 2022-052; 2021-049; 2020-044; 2019-038 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to improve its IT change and configuration management process to align with the Security Standard. Change management is a key control to evaluate, approve, and verify configuration changes to security components. Two weaknesses remain since our last review, which we communicated to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing description of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. Social Services’ Change Management Process Guide details the process Social Services follows to manage changes, but does not include all the required elements, which contributed to the weaknesses remaining. Additionally, Social Services migrated to a new change management system of record in October 2023, which also contributed to the delay in remediating the remaining issues due to Social Services prioritizing the migration project. Not prioritizing and aligning IT change management processes with the Security Standard increases the risk of a data breach or unauthorized access to confidential and mission-critical data, leading to data corruption, data loss, or system disruption if accessed by a malicious attacker, either internal or external. Social Services should resolve the remaining two weaknesses discussed in the communication marked FOIAE in accordance with the Security Standard. Continuing to improve Social Services’ IT change and configuration management process will decrease the risk of unauthorized modifications to sensitive systems and help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-053: Improve Vulnerability Remediation Efforts Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Risk Assessment ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services does not install security patches to mitigate vulnerabilities within its IT environment in accordance with its Vulnerability Scan Management procedure. Specifically, as of November 2024, Medical Assistance Services identified a significant number of vulnerabilities classified with a severity of critical and high and numerous vulnerabilities with a severity of medium or low in its IT environment that remained unmitigated beyond the time limits set in its procedure. Medical Assistance Services’ procedure requires the agency to mitigate and validate vulnerabilities within the following timeframes, depending on the vulnerability’s severity rating: High-severity flaws within 30 calendar days; Medium-severity flaws within 60 calendar days; and All others within 90 calendar days. Additionally, the Security Standard requires Medical Assistance Services to “monitor and scan for vulnerabilities in the system and hosted applications at least once every 30 days, and when new vulnerabilities potentially affecting the system are identified and reported.” The Security Standard also requires Medical Assistance Services to remediate legitimate vulnerabilities within 30 days unless otherwise specified by Commonwealth Security Risk Management (CSRM) in accordance with an organizational assessment of risk. The Commonwealth’s IT Risk Management Standard, SEC520 (Risk Management Standard) requires Medical Assistance Services to “fix vulnerabilities within 30 days of a fix becoming available that are either rated as critical or high according to the National Vulnerability Database or otherwise identified by CSRM.” Additionally, the Risk Management Standard requires Medical Assistance Services to remediate all other vulnerabilities within 90 days of a fix becoming available and acquire an approved security exception for the vulnerability should Medical Assistance Services not remediate it within the timeframes identified. Software vulnerabilities are publicly known flaws that bad actors may exploit and use to circumvent organizational information security controls to infiltrate a network or application. The longer these vulnerabilities exist in an environment, the higher the risk of a compromise and unauthorized access to sensitive and mission-critical systems and data. It is therefore imperative for organizations to respond quickly and mitigate these publicly known flaws as soon as possible. Without appropriate software patching and vulnerability management controls, Medical Assistance Services increases the risk of unauthorized access to sensitive and mission-critical systems. Medical Assistance Services lacks the staffing necessary to remediate the high number of vulnerabilities detected within the timeframes required by its Vulnerability Scan Management procedure. Medical Assistance Services should allocate the necessary resources to apply patches within the Vulnerability Scan Management procedure’s required timeframe to mitigate the vulnerabilities affecting its IT environment. If Medical Assistance Services is unable to mitigate vulnerabilities within the required timeframe, it should obtain an extension approval from CSRM that is based on an organizational assessment of risk. Timely remediation of significant vulnerabilities will help protect the confidentiality, integrity, and availability of Medical Assistance Services’ sensitive and mission-critical information. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-058: Conduct Information Technology Security Audits Applicable to: Department of Social Services Prior Year Finding Number: 2023-056 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Audit and Accountability ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services is making progress in conducting a comprehensive IT security audit on each sensitive system at least once every three years. While Social Services conducted an IT security audit over an additional 22 percent of its sensitive systems, 14 of the 79 sensitive systems (18%) due for an IT Security Audit remain unaudited. Social Services indicates it is on track to complete the remaining IT security audits by the end of calendar year 2025. The Security Standard requires that each IT system classified as sensitive undergo an IT security audit as required by and in accordance with the current version of the Commonwealth’s IT Security Audit Standard, SEC502 (IT Audit Standard). The IT Audit Standard requires that IT systems containing sensitive data, or systems with an assessed sensitivity of high on any of the criteria of confidentiality, integrity, or availability, shall receive an IT security audit at least once every three years. Without conducting full IT security audits for each sensitive system every three years, Social Services increases the risk that IT staff will not detect and mitigate existing weaknesses. Malicious parties taking advantage of continued weaknesses could compromise sensitive and confidential data. Further, such security incidents could lead to mission-critical systems being unavailable. During fiscal year 2024, Social Services’ Audit Services Manager collaborated with the business divisions, TSD, and ISRM to schedule and conduct audits. However, Social Services did not perform the remaining IT security audits due to the large number of sensitive systems requiring an audit. Lack of a documented procedure and process for conducting IT security audits also contributed to the lapse in IT security audits conducted over the last three years. Social Services should define and document a formal procedure and process for conducting IT security audits over each sensitive system at least once every three years that tests the effectiveness of the IT security controls and their compliance with Security Standard requirements. Social Services should then complete all outstanding IT security audits to ensure it meets the Security Standard requirements. Compliance with the IT Audit Standard will help to ensure the confidentiality, integrity, and availability of sensitive and mission critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-061: Develop and Provide Role-Based Security Awareness Training to System Administrators and Data Custodians Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Awareness and Training ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 ISRM does not provide applicable role-based training to system administrators or data custodians that have security roles and responsibilities with elevated privileges. Additionally, ISRM does not document a procedure that outlines the steps it follows to administer the role-based training. An established security awareness training program is essential to protecting agency IT systems and data by ensuring that employees understand their roles and responsibilities in securing sensitive information at the agency. Social Services’ Awareness and Training Policy requires that Social Services’ Information Security Officer or designee provide role-based security and privacy training to personnel with the roles and responsibilities of system administrator and data custodian. Social Services’ Security Awareness and Training Policy and the Security Standard also require that Social Services administer role-based training to personnel before authorizing access to the system, information, or performing assigned duties; and annually thereafter, as well as when required by system changes. Without providing role-based training to all personnel with security-related roles, including personnel with the roles and responsibilities of system administrator and data custodian, Social Services increases the risk of human error and negligence. Additionally, lack of adequate role-based training increases the risk that users will be unaware or lack pertinent skills and knowledge to perform their security-related functions, resulting in an increased security risk. ISRM did not provide role-based training to personnel with designated information security roles due to competing priorities. Additionally, although the Awareness and Training Policy requires role-based training, Social Services does not define and document their process to provide role-based training to personnel with security-related functions, such as the specific training that each role should take, the deadline for role-based training completion, and the enforcement measure resulting from not completing the role-based training timely. ISRM should develop procedures that detail the process to provide role-based training to personnel with designated security roles. ISRM should also develop and administer role-based training for systems administrators and data custodians. Improving the security awareness training program will help protect Social Services from malicious attempts to compromise the confidentiality, integrity, and availability of sensitive data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-064: Upgrade End-of-Life Technology Applicable to: Department of Social Services Prior Year Finding Number: 2023-058; 2022-060 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services uses end-of-life (EOL) technologies in its IT environment and maintains technologies that support mission-essential data on IT systems running software that its vendors no longer support. We communicated the control weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard prohibits agencies from using software that is EOL and which the vendor no longer supports to reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. In May 2024, Social Services established a Cybersecurity Team to track and manage technologies but has not yet completed their processes. Using EOL technologies increases the risk of successful cyberattack, exploit, and data breach by malicious parties. Further, vendors do not offer operational and technical support for EOL or end-of-support technology, which affects data availability by increasing the difficulty of restoring system functionality if a technical failure occurs. Social Services should dedicate the necessary resources to evaluate and implement the controls and recommendations discussed in the communication marked FOIAE in accordance with the Security Standard. By dedicating the necessary resources to evaluate and implement these controls and recommendations, Social Services will help to ensure that it adequately secures its IT environment and systems. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-067: Continue Developing Record Retention Requirements and Processes for Electronic Records Applicable to: Department of Social Services Prior Year Finding Number: 2023-066; 2022-064; 2021-047; 2020-041; 2019-049; 2018-054 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Contingency Planning ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to operate without an adequate data retention process that ensures consistent compliance with retention requirements for its case management system and adherence to federal regulations and state law. Social Services’ case management system stores several types of federal benefit program records with varying retention requirements supporting ten programs and services, such as the Medical Assistance (Medicaid), Supplemental Nutrition Assistance (SNAP), Child Care and Development Fund (CCDF), LIHEAP, and TANF federal grant programs. Social Services’ case management system authorized over $17 billion in public assistance payments to beneficiaries from these federal programs during fiscal year 2024. Since fiscal year 2019, Social Services gathered retention requirements from the business divisions that support the federal programs and services. In fiscal year 2022, Social Services finalized and documented policies with retention requirements for the data sets handled by each of the ten programs and services supported by its case management system. Social Services determined that due to the risk and complexity of the project, as well as changes to federal requirements since its first analysis, the retention requirements for all ten programs and services supported by its case management system were not feasible as a single release. Therefore, Social Services planned a phased delivery approach including multiple releases. In November 2023, Social Services defined and documented a purge and retention design document to implement Release 1 of the record purge and retention project for its case management system. Social Services subsequently implemented Release 1 of the record purge and retention project in February 2024. However, Social Services has not completed the process to implement the records retention policies for each of the programs and services to ensure consistent retention and destruction of records in compliance with regulations and laws. Title 45 CFR § 155.1210, governs record retention for Medicaid and requires state agencies to maintain records for ten years. Additionally, the Virginia Public Records Act outlined in § 42.1-91 of the Code of Virginia makes an agency responsible for ensuring that it preserves, maintains, and makes accessible public records throughout their lifecycle, including converting and migrating electronic records as often as necessary so that an agency does not lose information due to hardware, software, or media obsolescence or deterioration. Furthermore, the Virginia Public Records Act in § 42.1-86.1 of the Code of Virginia details requirements for the disposition of records. Section § 42.1-86.1 requires that records created after July 1, 2006, and authorized to be destroyed or discarded, must be discarded in a timely manner and in accordance with the provisions of Chapter 7 of the Virginia Public Records Act. Further, records that contain identifying information as defined by subsection C of § 18.2-186.3 of the Code of Virginia shall be destroyed within six months of the expiration of the records retention period. Finally, the Security Standard requires agencies to implement backup and restoration plans that address the retention of the data in accordance with the records retention policy for every IT system identified as sensitive relative to availability. Without implementing records retention requirements, Social Services increases the risk of a data or privacy breach. Additionally, destroying documents that should be available for business processes or audit, or keeping data longer than stated, could expose Social Services to fines, penalties, or other legal consequences. Further, Social Services may not be able to ensure that backup and restoration efforts will provide mission critical information according to recovery times. Finally, retaining records longer than necessary causes the Commonwealth to spend additional resources to maintain, back-up, and protect information that no longer serves a business purpose. The magnitude and complexity of effectively implementing a retention and purge process for an integrated eligibility system delayed completion of the record purge and retention project. Additionally, following Release 1 implementation, Social Services identified an additional required element of the purge and retention project. For these reasons, Social Services plans to update the purge and retention design document and implement Release 2 in February 2025. Further, Social Services plans to complete the purge and retention project with the final release, Release 3, by September 2025. Social Services should complete the record purge and retention project for its case management system and, thereafter, implement consistent records retention and destruction processes across business divisions to ensure compliance with laws and regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-068: Monitor Internal Controls to Ensure Timely Removal of System Access Applicable to: Department of Social Services Prior Year Finding Number: 2023-043; 2022-059; 2021-038;2021-027;2020-025;2019-027;2018-042 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Personnel Security ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to implement internal controls to monitor the timely removal of system access. The Security Standard requires the organization to disable information system access within 24 hours of employment termination. In response to the prior audit recommendations, ISRM developed an overarching policy governing system access that addresses the timely removal of system access and Social Services’ Division of Human Resources developed a policy to ensure supervisors follow the appropriate steps to offboard separated employees. Additionally, ISRM and the Division of Human Resources worked collaboratively to develop a process to identify individuals whose separation did not follow the offboarding policy and manually removed their access from Social Services’ access management system. However, because of the extent of its corrective actions, Social Services was not able to implement all of its planned corrective actions by the end of fiscal year 2024. Social Services administers numerous public assistance programs that collect personally identifiable information and other protected information from beneficiaries. Social Services could place its data and reputation at risk by not removing access timely. Additionally, Social Services could incur potential financial liabilities should its information become compromised. Therefore, Social Services should continue its corrective action efforts to implement internal controls to monitor the timely removal of system access. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-071: Continue to Ensure ITISP Suppliers Meet All Contractual Requirements Applicable to: Virginia Information Technologies Agency Prior Year Finding Number: 2023-072; 2022-100; 2021-023; 2020-070 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 VITA has made significant progress to monitor and enforce the contractual requirements for the Information Technology Infrastructure Services Program (ITISP) suppliers. During fiscal year 2024, VITA and the Multisource Service Integration (MSI) continued to evaluate the current service level measurements to ensure they align with the Commonwealth’s needs. VITA and the MSI monitored the service level related to security and vulnerability patching for the entire fiscal year. The requirements of this service level for fiscal year 2024 included a Common Vulnerabilities and Exposures (CVE) threshold, which required that ITISP suppliers install any patch with a CVE score above the threshold within 60 days. If the supplier did not meet the service level threshold, VITA enforced a credit for the Commonwealth. Although VITA monitored the service levels implemented in the prior year, not enough time has passed to prove the effects of the consequences enforced. Our audits at various agencies for fiscal year 2024 found critical and highly important security patches not installed within 30 days as required by the Commonwealth’s Information Security Standard, SEC530 (Security Standard). As a result, the systems missing critical security updates are at an increased risk of cyberattack, exploitation, and data breach by malicious parties. When ITISP suppliers do not meet all contractual requirements (e.g., Service Level Agreements, Critical Deliverables, etc.) it impacts the ability of Commonwealth agencies that rely on the ITISP services to comply with the Security Standard. The Security Standard is a baseline for information security and risk management activities for Commonwealth agencies. Many agencies rely on services provided through ITISP suppliers to ensure compliance with the Security Standard. For example, the Security Standard requires the installation of security-relevant software and firmware updates within at least 30 days of the update’s release or within a timeframe approved by Commonwealth Security and Risk Management (CSRM) . Commonwealth agencies rely on the ITISP suppliers for the installation of security patches in systems that support agencies’ operations. Additionally, during fiscal year 2024, VITA continued to work with the managed security supplier to address the inability of agencies to access the audit log information in the managed detection and response (MDR) platform. VITA implemented a separate security and event management (SIEM) tool at the end of October 2023 to expand agencies’ capabilities to monitor audit log information. While the supplier implemented the MDR platform, VITA and the supplier determined to replace the MDR platform with the VITA-managed SIEM tool as the permanent audit log monitoring tool. However, while the SIEM tool is in production, it also does not include all audit log information in a usable format to allow agencies to adequately monitor their IT environments. The Security Standard requires agencies to review and analyze audit records at least every 30 days for indications of inappropriate or unusual activity. Our audits of various agencies for fiscal year 2024 found that agencies rely on VITA and ITISP suppliers to provide access to a centralized monitoring tool that collects audit log information about activities in the IT environment. Although the supplier was performing audit logging and monitoring, most agencies were unable to obtain access to the audit log information during fiscal year 2024, and thus, were not able to comply with the Security Standard requirements related to audit log monitoring. An inability for all agencies to review and monitor their individual audit logs increases the risk associated with the Commonwealth’s data confidentiality, integrity, and availability. To ensure all agencies that rely on the ITISP’s services comply with the Security Standard, VITA should ensure suppliers meet all contractual requirements (e.g., Service Level Agreements, Critical Deliverables, etc.). If VITA determines suppliers are not meeting these requirements, VITA should implement escalation procedures to compel the ITISP services to comply with the contractual requirements. Additionally, VITA should communicate with the affected agencies and provide guidance on what the agencies can do to comply with the Security Standard while the suppliers work to meet the requirements of the contract. VITA should also continue working with the ITISP suppliers and agencies to import audit log information to the SIEM tool to ensure agencies can review the activities occurring in their IT environments in accordance with the Security Standard. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-082: Perform Responsibilities Outlined in the Agency Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-097; 2022-011; 2021-070; 2020-074; 2019-090; 2018-093 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.303(a); 2 CFR § 200.332 Known Questioned Costs: $0 Compliance continues to not adhere to its established approach to oversee the agency’s subrecipient monitoring activities, as outlined in its Agency Monitoring Plan. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps to ensure adherence to state and federal legal and regulatory standards, including subrecipient monitoring. During fiscal year 2024, Social Services disbursed approximately $660 million to 342 subrecipients from 30 federal grant programs. During the audit, we noted the following deviations from the Agency Monitoring Plan: Compliance continues to not review programmatic division annual subrecipient monitoring plans to ensure they implement a risk-based approach. The Agency Monitoring Plan states that Compliance will use a Monitoring Plan Checklist to evaluate and determine if all the required elements for subrecipient monitoring are present in each division’s plan. Compliance does not hold monthly meetings with Subrecipient Monitoring Coordinators, as required by the Agency Monitoring Plan, where divisions can share information concerning risks and federal and/or grant-specific requirements, approaches to assessing risk, and changes that could affect subrecipients and the monitoring processes. Compliance has not reviewed each division’s monitoring activities nor provided quarterly reports of variances and noncompliance from the Agency Monitoring Plan to Social Services’ executive team. As a result, Compliance did not identify that the Division of Benefit Programs (Benefit Programs) did not complete risk assessments for 50 of its 324 (15%) locality subrecipients, properly document considerations for localities with elevated risks, nor perform adequate risk assessments for their non-locality subrecipients. Since the prior audit, Compliance has communicated the Agency Monitoring Plan to the Subrecipient Monitoring Coordinators. Additionally, Compliance has worked with Social Services’ Executive Team to secure funding for a grants management system and additional subrecipient monitor positions. However, Compliance has yet to establish a timeline for when it intends for the system to be fully functional and has not explored alternate options to comply with its Agency Monitoring Plan. Further, Compliance has not collaborated with Subrecipient Monitoring Coordinators to determine how the agency collectively plans to accomplish the goals and objectives set forth within the Agency Monitoring Plan. Collaboration between Compliance and Subrecipient Monitoring Coordinators is imperative to ensuring that Social Services complies with the pass-through entity requirements in 2 CFR § 200.332. Title 2 CFR § 200.303(a) requires pass-through entities to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the non-Federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Without performing the responsibilities in the Agency Monitoring Plan, Compliance cannot assure that the agency’s subrecipient monitoring efforts are adequate to comply with the regulations at 2 CFR § 200.332. Additionally, Compliance places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards by not monitoring the agency’s subrecipient monitoring activities. Because of the scope of this matter and the magnitude of Social Services’ subrecipient monitoring responsibilities, we consider these weaknesses collectively to create a material weakness in internal controls over compliance. Compliance should work collaboratively with Social Services’ Executive Team and the subrecipient monitoring coordinators to fulfil the agency’s responsibilities in the Agency Monitoring Plan. Further, Compliance should explore alternative solutions to track and monitor each division’s subrecipient monitoring activities and report the results to the Executive Team until it develops and implements its grants management system. Evaluating alternative solutions will help Social Services mitigate the risk of incurring federal sanctions because of non-compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-011: Improve Fiscal Agent Oversight Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(a) Known Questioned Costs: $0 Medical Assistance Services did not obtain and review a System and Organization Controls (SOC) report, specifically a SOC I, Type 2 report, to gain assurance over its fiscal agent’s internal controls relevant to financial reporting. In addition to services related to information systems management and security, Medical Assistance Services contracts with the fiscal agent to perform accurate and timely payments of Medicaid claims to providers and maintain an accounts receivable ledger for the collection of provider funds owed to Medical Assistance Services. The fiscal agent processed over $22 billion in Medicaid-related payments during fiscal year 2024. Medical Assistance Services obtained a SOC 2, Type 2 report related to the fiscal agent’s controls over information systems management and security, however, this report did not provide an opinion over internal controls relevant to Medical Assistance Services’ significant fiscal activity and financial reporting. The Commonwealth’s Accounting Policies and Procedures Manual Topic 10305 requires agencies to have adequate interaction with service providers to appropriately understand the service provider’s internal control environment. It also states that agencies must also maintain oversight over service providers to gain assurance over outsourced operations. Additionally, Title 2 U.S. Code of Federal Regulations (CFR) § 200.303(a) requires non-federal entities to establish and maintain effective internal control over the federal award that provides reasonable assurance that the non-federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. The existing contract between Medical Assistance Services and the fiscal agent does not require the fiscal agent to obtain an independent review opining to the effectiveness of internal controls related to Medical Assistance Services’ significant fiscal activities and financial reporting. Management asserted that they are currently working to modify the contract with the provider to add this requirement. Although management maintains a high degree of interaction with its fiscal agent, they cannot adequately ensure the fiscal agent has designed and implemented sufficient controls, and whether the controls are operating effectively without obtaining and reviewing a SOC I, Type 2 report. This issue increases the risk that management will not detect a weakness in the fiscal agent’s environment, which could negatively impact the Commonwealth. Medical Assistance Services should continue to work with the fiscal agent to add language to the contract that would require the fiscal agent to obtain an appropriate independent audit of its internal controls relevant to Medical Assistance Services’ financial activities and reporting. Once the new contract language is in effect, Medical Assistance Services’ management should obtain and review the SOC I, Type 2 report annually to ensure the fiscal agent is meeting contractual obligations and has proper internal controls over Medical Assistance Services’ significant fiscal activities and financial reporting. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-017: Improve IT Third-Party Oversight Process Applicable to: Department of Medical Assistance Services Prior Year Finding Number: 2023-086; 2022-090 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Third-Party Service Providers (Information Systems) ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services has made progress to document and implement a formal process for maintaining oversight for three of its IT third-party service providers that manage and support its Medicaid management system. The Medicaid management system encompasses different functions, such as member and provider reporting, financial reporting, and federal reporting. Since the prior year audit, Medical Assistance Services developed its Information Technology (IT) Third Party Risk Management Procedure, which was effective on February 1, 2024, to facilitate the implementation of its IT System and Services Acquisition Policy. However, Medical Assistance Services is still working to implement the new procedure, which has resulted in the agency not yet verifying the following required controls and processes for one of the Medicaid management system IT service providers that is not covered by the Virginia Information Technologies Agency (VITA) Commonwealth of Virginia Risk and Authority Management Program. Medical Assistance Services does not confirm the geographic location of sensitive data monthly for IT service providers. Without confirming the geographic location of sensitive data, Medical Assistance Services may be unable to enforce contract requirements, laws, and standards due to the data falling outside of the United States’ jurisdiction. Medical Assistance Services does not confirm whether IT service providers perform vulnerability scans every 90 days. By not obtaining and analyzing the vulnerability scan results from the IT service provider, Medical Assistance Services increases the risk that the IT service providers are not remediating legitimate vulnerabilities in a timely manner. Medical Assistance Services experienced delays in implementing its new procedure due to limited staffing to properly communicate and train those responsible for monitoring IT service providers. Medical Assistance Services expects to complete its implementation by October 2024. Medical Assistance Services should dedicate the resources necessary to finish implementing its Third-Party Risk Management Procedure. Additionally, Medical Assistance Services should ensure that those tasked with monitoring IT service providers are confirming the geographic location of sensitive data and the provider’s performance of vulnerability scanning and remediation efforts per the Security Standard. Medical Assistance Services should also ensure the individuals responsible for monitoring consistently perform formal oversight processes in a timely manner, which will help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-022: Improve Information Security Program and Controls Applicable to: Department of Medical Assistance Services Prior Year Finding Number: 2023-010; 2022-024; 2021-024; 2020-024 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: Access Control; Awareness and Training; Incident Response; Information Security Roles and Responsibilities; Planning; Risk Assessment; Security Assessment and Authorization; System and Services Acquisition ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services continues to address weaknesses in its information technology (IT) general controls originally identified in a 2020 audit and confirmed in a 2023 audit covering the same IT general controls conducted by Medical Assistance Services’ Internal Audit division. During the 2023 audit, Internal Audit tested 105 controls required by the Commonwealth’s previous version of the Information Security Standard, SEC501, and identified 61 individual control weaknesses, a 58% non-compliance rate, that Internal Audit grouped into eight findings. Medical Assistance Services addressed four of the eight findings during fiscal year 2024. Noncompliance with required security controls increases the risk for unauthorized access to mission-critical systems and data in addition to weakening Medical Assistance Services ability to respond to malicious attacks to its IT environment. Medical Assistance Services has experienced delays in addressing these findings due to the number of findings and resources required to remediate the weaknesses. Medical Assistance Services updated its corrective action plan for the four remaining findings in June 2024, stating corrective actions are still ongoing with an estimated completion date of September 2024. Medical Assistance Services should prioritize and dedicate the necessary resources to ensure timely completion of its corrective action plans and to become compliant with the current version of the Commonwealth’s Information Security Standard, SEC530 (Security Standard). These actions will help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-023: Improve Database Security Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control; Audit and Accountability; Configuration Management; Contingency Planning; Identification and Authentication; System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services does not have formal policies, procedures, and a baseline configuration that outlines requirements and justifications for securing and maintaining the database supporting its primary system for financial accounting and reporting operations in accordance with the Security Standard, and industry best practices, such as the Center for Internet Security Benchmarks (CIS Benchmark). As a result, Medical Assistance Services has not implemented some required controls over the database. We communicated the weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. The Security Standard requires Medical Assistance Services to develop, document, and disseminate information security policies and procedures that align with the control requirements in the Security Standard. Additionally, the Security Standard requires Medical Assistance Services to develop, document, and maintain a current baseline configuration of the system and apply more restrictive security configurations for sensitive systems. The Security Standard also requires Medical Assistance Services to review and update the policies, procedures, and baseline configuration on an annual basis and following an environmental change. Without detailed policies, procedures, and a baseline configuration that outlines requirements and justifications for securing and maintaining its database, Medical Assistance Services increases the risk that the system will not meet the minimum security requirements and recommendations to protect its sensitive data from malicious parties. Medical Assistance Services has experienced a lack of resources which has contributed to the absence of documentation outlining control requirements and procedures needed to properly secure the database. The absence of this documentation contributed to the deficiencies communicated in the FOIAE document and as a result, Medical Assistance Services has not consistently evaluated and applied security controls. Medical Assistance Services should dedicate the resources necessary to develop and implement formal policies and procedures to support its database based on the Security Standard requirements and settings recommended by industry best practices, such as the CIS Benchmark. Medical Assistance Services should develop a formal baseline configuration for the database that defines required security controls outlined in industry best practices, such as the CIS Benchmark. The baseline configuration should define deviations from recommended and expected security configurations as well as business justification and approval for any deviations. Additionally, Medical Assistance Services should develop a process to review the database’s configuration against its established baseline configuration on a scheduled basis and after major changes occur to help detect and address potential misconfigurations timely. Furthermore, Medical Assistance Services should implement the security controls and processes communicated in the FOIAE document to address risks present in the database to ensure the configuration aligns with the Security Standard and CIS Benchmark. These actions will help maintain the confidentiality, availability, and integrity of Medical Assistance Services’ sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-024: Continue Improving IT Risk Management Program Applicable to: Department of Social Services Prior Year Finding Number: 2023-014; 2022-030; 2021-026; 2020-027; 2019-063; 2018-025 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Planning; Risk Assessment ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to not have a formal and effective IT risk management program that aligns with the requirements in the Security Standard. Since we first issued this finding in 2018, Social Services remediated some risk management and contingency planning issues. However, Social Services continues not to: accurately verify and validate data and system sensitivity ratings; create risk assessments for 90 percent of its sensitive systems; create system security plans for the 55 current systems identified as sensitive; review risk assessments for 100 percent of its existing documentation; and implement corrective actions identified in risk assessments. We communicated the details of these weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. ISRM and TSD defined and documented a new risk assessment policy and procedure in April 2024. Social Services also established a new risk assessment process that engages system administrators and system owners to complete a risk assessment worksheet to submit to ISRM for evaluation. ISRM meets with system administrators, system owners, and the Agency Head, to review the resulting risk assessment report and establish a risk mitigation plan. However, Social Services has not yet matured the new risk assessment process due to recently formalizing the process. Social Services established the Cybersecurity Team as part of TSD in fiscal year 2024; therefore, the Cybersecurity Team and ISRM have not yet assessed and integrated the various risk management processes. Additionally, the new risk assessment procedure does not define and document the requirements and processes Social Services must follow to implement the corrective action responsibilities. ISRM should work with TSD, the Cybersecurity Team, and business units to ensure Social Services establishes and maintains an up-to-date sensitive systems list. The Information Security Officer, in conjunction with system and data owners, should classify agency IT systems and data based on sensitivity. Following its new risk assessment procedure and process, ISRM and the Cybersecurity Team should prioritize completing risk assessments and system security plans for its sensitive systems and review those documents annually to validate that the information reflects the current environment. Additionally, TSD should implement security controls to mitigate the risks and vulnerabilities identified in its risk assessments. Improving the IT risk management program will help to ensure the confidentiality, integrity, and availability of the agency’s sensitive systems and mission-essential functions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-025: Improve Web Application Security Applicable to: Department of Social Services Prior Year Finding Number: 2023-015; 2022-029; 2021-025; 2020-026; 2019-037 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Audit and Accountability; Configuration Management; Risk Assessment; System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to not configure a sensitive web application in accordance with the Security Standard. During fiscal year 2024, Social Services remediated two of the five previously identified weaknesses; however, these two weaknesses existed during the fiscal year under review. Additionally, Social Services has not remediated three of the previously identified weaknesses. We communicated the weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. Lacking and insufficient procedures and processes to manage the web application contributed to the five weaknesses outlined in the separate FOIAE document. Social Services prioritizing other projects also contributed to the weaknesses persisting. TSD, ISRM, and business owners should work together to remediate the remaining weaknesses to secure the web application and meet the minimum requirements in its internal policies and the Security Standard. Addressing these weaknesses will help to ensure the confidentiality, integrity, and availability of sensitive and mission-critical data and achieve compliance with both internal policies and the Security Standard. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-035: Improve Information Security Program and IT Governance Applicable to: Department of Social Services Prior Year Finding Number: 2023-027; 2022-022 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: Information Security Roles and Responsibilities ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to have an insufficient governance structure to manage and maintain its information security program in accordance with the Security Standard. Specifically, Social Services does not assess information security requirements for its information technology (IT) projects and prioritize information security and IT resources to ensure its information security program effectively protects sensitive Commonwealth data in accordance with the Security Standard. We communicated the control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to its sensitivity and description of security controls. The Security Standard requires the agency head to maintain an information security program that is sufficient to protect the agency’s IT systems and to ensure the agency documents and effectively communicates the information security program. Not prioritizing IT resources to properly manage its information security program can result in a data breach or unauthorized access to confidential and mission-critical data, leading to data corruption, data loss, or system disruption if accessed by a malicious attacker, either internal or external. The control weaknesses described in the communication marked FOIAE are the result of Social Services not assessing information security requirements prior to project implementation, in addition to Social Services not prioritizing information security within the IT environment. Social Services has hindered its ability to consistently and timely remediate findings from management recommendations issued during prior year audits and bring the information security program in compliance with the Security Standard by not dedicating the necessary IT resources to information security. During fiscal year 2024, Social Services created a cybersecurity team under the Technology Services Division (TSD) to liaison between TSD and the Division of Information Security and Risk Management (ISRM) to help bring the information security program in compliance with the Security Standard. However, due to the magnitude of the project, TSD, the cybersecurity team, ISRM, and the executive team have not yet completed efforts to remediate this finding. TSD, ISRM, and Social Services’ Cybersecurity and Executive teams should continue to work together to bring the IT security program in compliance with the Security Standard. TSD and ISRM should continue to evaluate IT resource levels to ensure sufficient resources are available and dedicated to prioritizing and implementing IT governance changes and address the control deficiencies discussed in the communication marked FOIAE. Additionally, Social Services should evaluate the organizational placement of the Information Security Officer (ISO) to ensure effective implementation of the information security program and controls. Implementing these recommendations will help to ensure Social Services protects the confidentiality, integrity, and availability of its sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-041: Evaluate Separation of Duty Conflicts within the Case Management System Applicable to: Department of Social Services Prior Year Finding Number: 2023-034 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Benefit Programs, which is the owner of Social Services’ case management system, has not performed nor documented a conflicting access review to identify the combination of roles that could pose a separation of duties conflict or to ensure compensating controls are in place to mitigate risks arising from those conflicts. Social Services uses the case management system to determine applicant eligibility and authorize benefit payments for the Medicaid, SNAP, CCDF, LIHEAP, and TANF federal grant programs. Social Services authorized over $17 billion in public assistance payments to beneficiaries from these federal programs through its case management system during fiscal year 2024. The Security Standard requires the agency to separate duties of individuals as necessary, document separation of duties of individuals, and define information system access authorizations to support the separation of duties. Further, Social Services’ Information Security Policy states that the system owner is responsible for identifying and documenting separation of duties of individuals and defining system access authorizations to support separation of duties. Without performing and documenting a conflicting access review, Social Services does not know which combination of roles may pose a separation of duties conflict and is unable to implement compensating controls. In effect, this increases the possibility of a system breach or other malicious attack on Social Services’ data and places Social Services’ reputation at risk. Benefit Programs has not yet begun their corrective action efforts and ISRM has not included this finding in its Plan of Actions and Milestones (POAM) report, which is its internal corrective action plan that it shares with Social Services’ Executive Team. As a result, Social Services’ Executive Team was not aware that Social Services continues to be non-compliant with the Security Standard and its Information Security Policy. According to Social Services’ Organizational Structure Report, ISRM provides guidance to system owners about security requirements and is ultimately responsible for protecting Social Services’ information systems by addressing security compliance and risk. Benefit Programs should conduct a conflicting access review for the case management system and collaborate with ISRM to ensure it performs and documents this review in accordance with Social Services’ Information Security Policy. Additionally, ISRM should monitor this finding’s progress through its POAM report and provide periodic updates to Social Services’ Executive Team. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-042: Perform Annual Review of Case Management System Access Applicable to: Department of Social Services Prior Year Finding Number: 2023-035 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Benefit Programs, which is the owner of Social Services’ case management system, continues to not perform the required annual access review. Social Services uses the case management system to determine applicant eligibility and authorize benefit payments for the Medicaid, SNAP, CCDF, LIHEAP, and TANF federal grant programs. Social Services authorized over $17 billion in public assistance payments to beneficiaries from these federal programs through its case management system during fiscal year 2024. The Security Standard requires the agency to review accounts for compliance with account management on an annual basis. Additionally, ISRM’s Procedures Manual for State and Local Security Officers requires system owners and security officers to review user access privileges annually. System owners and security officers must complete this review within 364 days from the completion date of the last security review. Benefit Programs last completed a security review over the case management system in June 2022. Benefit Programs is responsible for obtaining the case management system’s access listing from ISRM, coordinating the annual review with the security officers, and working with ISRM to modify user access privileges as necessary. However, Benefit Programs did not perform the required annual access review for the case management system because it did not initiate the process with ISRM, and ISRM did not include this finding in its POAM report, which is its internal corrective action plan that it shares with Social Services’ Executive Team. As a result, Social Services’ Executive Team was not aware that Social Services continues to be non-compliant with the Security Standard and its Procedures Manual for State and Local Security Officers. According to Social Services’ Organizational Structure Report, ISRM provides guidance to System Owners about security requirements and is ultimately responsible for protecting Social Services’ information systems by addressing security compliance and risk. Social Services increases the risk of improper or unnecessary access to sensitive systems by not reviewing access to the case management system annually, which could potentially result in a system breach or other malicious attack on Social Services’ data and adversely affect its reputation. Benefit Programs should perform the required annual security review for the case management system and collaborate with ISRM to ensure it completes this review in accordance with the Procedures Manual for State and Local Officers. Additionally, ISRM should monitor this finding’s progress through its POAM report and provide periodic updates to Social Services’ Executive Team. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-047: Continue Improving IT Change and Configuration Management Process Applicable to: Department of Social Services Prior Year Finding Number: 2023-049; 2022-052; 2021-049; 2020-044; 2019-038 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to improve its IT change and configuration management process to align with the Security Standard. Change management is a key control to evaluate, approve, and verify configuration changes to security components. Two weaknesses remain since our last review, which we communicated to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing description of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. Social Services’ Change Management Process Guide details the process Social Services follows to manage changes, but does not include all the required elements, which contributed to the weaknesses remaining. Additionally, Social Services migrated to a new change management system of record in October 2023, which also contributed to the delay in remediating the remaining issues due to Social Services prioritizing the migration project. Not prioritizing and aligning IT change management processes with the Security Standard increases the risk of a data breach or unauthorized access to confidential and mission-critical data, leading to data corruption, data loss, or system disruption if accessed by a malicious attacker, either internal or external. Social Services should resolve the remaining two weaknesses discussed in the communication marked FOIAE in accordance with the Security Standard. Continuing to improve Social Services’ IT change and configuration management process will decrease the risk of unauthorized modifications to sensitive systems and help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-053: Improve Vulnerability Remediation Efforts Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Risk Assessment ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services does not install security patches to mitigate vulnerabilities within its IT environment in accordance with its Vulnerability Scan Management procedure. Specifically, as of November 2024, Medical Assistance Services identified a significant number of vulnerabilities classified with a severity of critical and high and numerous vulnerabilities with a severity of medium or low in its IT environment that remained unmitigated beyond the time limits set in its procedure. Medical Assistance Services’ procedure requires the agency to mitigate and validate vulnerabilities within the following timeframes, depending on the vulnerability’s severity rating: High-severity flaws within 30 calendar days; Medium-severity flaws within 60 calendar days; and All others within 90 calendar days. Additionally, the Security Standard requires Medical Assistance Services to “monitor and scan for vulnerabilities in the system and hosted applications at least once every 30 days, and when new vulnerabilities potentially affecting the system are identified and reported.” The Security Standard also requires Medical Assistance Services to remediate legitimate vulnerabilities within 30 days unless otherwise specified by Commonwealth Security Risk Management (CSRM) in accordance with an organizational assessment of risk. The Commonwealth’s IT Risk Management Standard, SEC520 (Risk Management Standard) requires Medical Assistance Services to “fix vulnerabilities within 30 days of a fix becoming available that are either rated as critical or high according to the National Vulnerability Database or otherwise identified by CSRM.” Additionally, the Risk Management Standard requires Medical Assistance Services to remediate all other vulnerabilities within 90 days of a fix becoming available and acquire an approved security exception for the vulnerability should Medical Assistance Services not remediate it within the timeframes identified. Software vulnerabilities are publicly known flaws that bad actors may exploit and use to circumvent organizational information security controls to infiltrate a network or application. The longer these vulnerabilities exist in an environment, the higher the risk of a compromise and unauthorized access to sensitive and mission-critical systems and data. It is therefore imperative for organizations to respond quickly and mitigate these publicly known flaws as soon as possible. Without appropriate software patching and vulnerability management controls, Medical Assistance Services increases the risk of unauthorized access to sensitive and mission-critical systems. Medical Assistance Services lacks the staffing necessary to remediate the high number of vulnerabilities detected within the timeframes required by its Vulnerability Scan Management procedure. Medical Assistance Services should allocate the necessary resources to apply patches within the Vulnerability Scan Management procedure’s required timeframe to mitigate the vulnerabilities affecting its IT environment. If Medical Assistance Services is unable to mitigate vulnerabilities within the required timeframe, it should obtain an extension approval from CSRM that is based on an organizational assessment of risk. Timely remediation of significant vulnerabilities will help protect the confidentiality, integrity, and availability of Medical Assistance Services’ sensitive and mission-critical information. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-058: Conduct Information Technology Security Audits Applicable to: Department of Social Services Prior Year Finding Number: 2023-056 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Audit and Accountability ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services is making progress in conducting a comprehensive IT security audit on each sensitive system at least once every three years. While Social Services conducted an IT security audit over an additional 22 percent of its sensitive systems, 14 of the 79 sensitive systems (18%) due for an IT Security Audit remain unaudited. Social Services indicates it is on track to complete the remaining IT security audits by the end of calendar year 2025. The Security Standard requires that each IT system classified as sensitive undergo an IT security audit as required by and in accordance with the current version of the Commonwealth’s IT Security Audit Standard, SEC502 (IT Audit Standard). The IT Audit Standard requires that IT systems containing sensitive data, or systems with an assessed sensitivity of high on any of the criteria of confidentiality, integrity, or availability, shall receive an IT security audit at least once every three years. Without conducting full IT security audits for each sensitive system every three years, Social Services increases the risk that IT staff will not detect and mitigate existing weaknesses. Malicious parties taking advantage of continued weaknesses could compromise sensitive and confidential data. Further, such security incidents could lead to mission-critical systems being unavailable. During fiscal year 2024, Social Services’ Audit Services Manager collaborated with the business divisions, TSD, and ISRM to schedule and conduct audits. However, Social Services did not perform the remaining IT security audits due to the large number of sensitive systems requiring an audit. Lack of a documented procedure and process for conducting IT security audits also contributed to the lapse in IT security audits conducted over the last three years. Social Services should define and document a formal procedure and process for conducting IT security audits over each sensitive system at least once every three years that tests the effectiveness of the IT security controls and their compliance with Security Standard requirements. Social Services should then complete all outstanding IT security audits to ensure it meets the Security Standard requirements. Compliance with the IT Audit Standard will help to ensure the confidentiality, integrity, and availability of sensitive and mission critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-061: Develop and Provide Role-Based Security Awareness Training to System Administrators and Data Custodians Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Awareness and Training ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 ISRM does not provide applicable role-based training to system administrators or data custodians that have security roles and responsibilities with elevated privileges. Additionally, ISRM does not document a procedure that outlines the steps it follows to administer the role-based training. An established security awareness training program is essential to protecting agency IT systems and data by ensuring that employees understand their roles and responsibilities in securing sensitive information at the agency. Social Services’ Awareness and Training Policy requires that Social Services’ Information Security Officer or designee provide role-based security and privacy training to personnel with the roles and responsibilities of system administrator and data custodian. Social Services’ Security Awareness and Training Policy and the Security Standard also require that Social Services administer role-based training to personnel before authorizing access to the system, information, or performing assigned duties; and annually thereafter, as well as when required by system changes. Without providing role-based training to all personnel with security-related roles, including personnel with the roles and responsibilities of system administrator and data custodian, Social Services increases the risk of human error and negligence. Additionally, lack of adequate role-based training increases the risk that users will be unaware or lack pertinent skills and knowledge to perform their security-related functions, resulting in an increased security risk. ISRM did not provide role-based training to personnel with designated information security roles due to competing priorities. Additionally, although the Awareness and Training Policy requires role-based training, Social Services does not define and document their process to provide role-based training to personnel with security-related functions, such as the specific training that each role should take, the deadline for role-based training completion, and the enforcement measure resulting from not completing the role-based training timely. ISRM should develop procedures that detail the process to provide role-based training to personnel with designated security roles. ISRM should also develop and administer role-based training for systems administrators and data custodians. Improving the security awareness training program will help protect Social Services from malicious attempts to compromise the confidentiality, integrity, and availability of sensitive data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-064: Upgrade End-of-Life Technology Applicable to: Department of Social Services Prior Year Finding Number: 2023-058; 2022-060 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services uses end-of-life (EOL) technologies in its IT environment and maintains technologies that support mission-essential data on IT systems running software that its vendors no longer support. We communicated the control weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard prohibits agencies from using software that is EOL and which the vendor no longer supports to reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. In May 2024, Social Services established a Cybersecurity Team to track and manage technologies but has not yet completed their processes. Using EOL technologies increases the risk of successful cyberattack, exploit, and data breach by malicious parties. Further, vendors do not offer operational and technical support for EOL or end-of-support technology, which affects data availability by increasing the difficulty of restoring system functionality if a technical failure occurs. Social Services should dedicate the necessary resources to evaluate and implement the controls and recommendations discussed in the communication marked FOIAE in accordance with the Security Standard. By dedicating the necessary resources to evaluate and implement these controls and recommendations, Social Services will help to ensure that it adequately secures its IT environment and systems. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-067: Continue Developing Record Retention Requirements and Processes for Electronic Records Applicable to: Department of Social Services Prior Year Finding Number: 2023-066; 2022-064; 2021-047; 2020-041; 2019-049; 2018-054 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Contingency Planning ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to operate without an adequate data retention process that ensures consistent compliance with retention requirements for its case management system and adherence to federal regulations and state law. Social Services’ case management system stores several types of federal benefit program records with varying retention requirements supporting ten programs and services, such as the Medical Assistance (Medicaid), Supplemental Nutrition Assistance (SNAP), Child Care and Development Fund (CCDF), LIHEAP, and TANF federal grant programs. Social Services’ case management system authorized over $17 billion in public assistance payments to beneficiaries from these federal programs during fiscal year 2024. Since fiscal year 2019, Social Services gathered retention requirements from the business divisions that support the federal programs and services. In fiscal year 2022, Social Services finalized and documented policies with retention requirements for the data sets handled by each of the ten programs and services supported by its case management system. Social Services determined that due to the risk and complexity of the project, as well as changes to federal requirements since its first analysis, the retention requirements for all ten programs and services supported by its case management system were not feasible as a single release. Therefore, Social Services planned a phased delivery approach including multiple releases. In November 2023, Social Services defined and documented a purge and retention design document to implement Release 1 of the record purge and retention project for its case management system. Social Services subsequently implemented Release 1 of the record purge and retention project in February 2024. However, Social Services has not completed the process to implement the records retention policies for each of the programs and services to ensure consistent retention and destruction of records in compliance with regulations and laws. Title 45 CFR § 155.1210, governs record retention for Medicaid and requires state agencies to maintain records for ten years. Additionally, the Virginia Public Records Act outlined in § 42.1-91 of the Code of Virginia makes an agency responsible for ensuring that it preserves, maintains, and makes accessible public records throughout their lifecycle, including converting and migrating electronic records as often as necessary so that an agency does not lose information due to hardware, software, or media obsolescence or deterioration. Furthermore, the Virginia Public Records Act in § 42.1-86.1 of the Code of Virginia details requirements for the disposition of records. Section § 42.1-86.1 requires that records created after July 1, 2006, and authorized to be destroyed or discarded, must be discarded in a timely manner and in accordance with the provisions of Chapter 7 of the Virginia Public Records Act. Further, records that contain identifying information as defined by subsection C of § 18.2-186.3 of the Code of Virginia shall be destroyed within six months of the expiration of the records retention period. Finally, the Security Standard requires agencies to implement backup and restoration plans that address the retention of the data in accordance with the records retention policy for every IT system identified as sensitive relative to availability. Without implementing records retention requirements, Social Services increases the risk of a data or privacy breach. Additionally, destroying documents that should be available for business processes or audit, or keeping data longer than stated, could expose Social Services to fines, penalties, or other legal consequences. Further, Social Services may not be able to ensure that backup and restoration efforts will provide mission critical information according to recovery times. Finally, retaining records longer than necessary causes the Commonwealth to spend additional resources to maintain, back-up, and protect information that no longer serves a business purpose. The magnitude and complexity of effectively implementing a retention and purge process for an integrated eligibility system delayed completion of the record purge and retention project. Additionally, following Release 1 implementation, Social Services identified an additional required element of the purge and retention project. For these reasons, Social Services plans to update the purge and retention design document and implement Release 2 in February 2025. Further, Social Services plans to complete the purge and retention project with the final release, Release 3, by September 2025. Social Services should complete the record purge and retention project for its case management system and, thereafter, implement consistent records retention and destruction processes across business divisions to ensure compliance with laws and regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-068: Monitor Internal Controls to Ensure Timely Removal of System Access Applicable to: Department of Social Services Prior Year Finding Number: 2023-043; 2022-059; 2021-038;2021-027;2020-025;2019-027;2018-042 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Personnel Security ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to implement internal controls to monitor the timely removal of system access. The Security Standard requires the organization to disable information system access within 24 hours of employment termination. In response to the prior audit recommendations, ISRM developed an overarching policy governing system access that addresses the timely removal of system access and Social Services’ Division of Human Resources developed a policy to ensure supervisors follow the appropriate steps to offboard separated employees. Additionally, ISRM and the Division of Human Resources worked collaboratively to develop a process to identify individuals whose separation did not follow the offboarding policy and manually removed their access from Social Services’ access management system. However, because of the extent of its corrective actions, Social Services was not able to implement all of its planned corrective actions by the end of fiscal year 2024. Social Services administers numerous public assistance programs that collect personally identifiable information and other protected information from beneficiaries. Social Services could place its data and reputation at risk by not removing access timely. Additionally, Social Services could incur potential financial liabilities should its information become compromised. Therefore, Social Services should continue its corrective action efforts to implement internal controls to monitor the timely removal of system access. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-071: Continue to Ensure ITISP Suppliers Meet All Contractual Requirements Applicable to: Virginia Information Technologies Agency Prior Year Finding Number: 2023-072; 2022-100; 2021-023; 2020-070 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 VITA has made significant progress to monitor and enforce the contractual requirements for the Information Technology Infrastructure Services Program (ITISP) suppliers. During fiscal year 2024, VITA and the Multisource Service Integration (MSI) continued to evaluate the current service level measurements to ensure they align with the Commonwealth’s needs. VITA and the MSI monitored the service level related to security and vulnerability patching for the entire fiscal year. The requirements of this service level for fiscal year 2024 included a Common Vulnerabilities and Exposures (CVE) threshold, which required that ITISP suppliers install any patch with a CVE score above the threshold within 60 days. If the supplier did not meet the service level threshold, VITA enforced a credit for the Commonwealth. Although VITA monitored the service levels implemented in the prior year, not enough time has passed to prove the effects of the consequences enforced. Our audits at various agencies for fiscal year 2024 found critical and highly important security patches not installed within 30 days as required by the Commonwealth’s Information Security Standard, SEC530 (Security Standard). As a result, the systems missing critical security updates are at an increased risk of cyberattack, exploitation, and data breach by malicious parties. When ITISP suppliers do not meet all contractual requirements (e.g., Service Level Agreements, Critical Deliverables, etc.) it impacts the ability of Commonwealth agencies that rely on the ITISP services to comply with the Security Standard. The Security Standard is a baseline for information security and risk management activities for Commonwealth agencies. Many agencies rely on services provided through ITISP suppliers to ensure compliance with the Security Standard. For example, the Security Standard requires the installation of security-relevant software and firmware updates within at least 30 days of the update’s release or within a timeframe approved by Commonwealth Security and Risk Management (CSRM) . Commonwealth agencies rely on the ITISP suppliers for the installation of security patches in systems that support agencies’ operations. Additionally, during fiscal year 2024, VITA continued to work with the managed security supplier to address the inability of agencies to access the audit log information in the managed detection and response (MDR) platform. VITA implemented a separate security and event management (SIEM) tool at the end of October 2023 to expand agencies’ capabilities to monitor audit log information. While the supplier implemented the MDR platform, VITA and the supplier determined to replace the MDR platform with the VITA-managed SIEM tool as the permanent audit log monitoring tool. However, while the SIEM tool is in production, it also does not include all audit log information in a usable format to allow agencies to adequately monitor their IT environments. The Security Standard requires agencies to review and analyze audit records at least every 30 days for indications of inappropriate or unusual activity. Our audits of various agencies for fiscal year 2024 found that agencies rely on VITA and ITISP suppliers to provide access to a centralized monitoring tool that collects audit log information about activities in the IT environment. Although the supplier was performing audit logging and monitoring, most agencies were unable to obtain access to the audit log information during fiscal year 2024, and thus, were not able to comply with the Security Standard requirements related to audit log monitoring. An inability for all agencies to review and monitor their individual audit logs increases the risk associated with the Commonwealth’s data confidentiality, integrity, and availability. To ensure all agencies that rely on the ITISP’s services comply with the Security Standard, VITA should ensure suppliers meet all contractual requirements (e.g., Service Level Agreements, Critical Deliverables, etc.). If VITA determines suppliers are not meeting these requirements, VITA should implement escalation procedures to compel the ITISP services to comply with the contractual requirements. Additionally, VITA should communicate with the affected agencies and provide guidance on what the agencies can do to comply with the Security Standard while the suppliers work to meet the requirements of the contract. VITA should also continue working with the ITISP suppliers and agencies to import audit log information to the SIEM tool to ensure agencies can review the activities occurring in their IT environments in accordance with the Security Standard. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-082: Perform Responsibilities Outlined in the Agency Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-097; 2022-011; 2021-070; 2020-074; 2019-090; 2018-093 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.303(a); 2 CFR § 200.332 Known Questioned Costs: $0 Compliance continues to not adhere to its established approach to oversee the agency’s subrecipient monitoring activities, as outlined in its Agency Monitoring Plan. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps to ensure adherence to state and federal legal and regulatory standards, including subrecipient monitoring. During fiscal year 2024, Social Services disbursed approximately $660 million to 342 subrecipients from 30 federal grant programs. During the audit, we noted the following deviations from the Agency Monitoring Plan: Compliance continues to not review programmatic division annual subrecipient monitoring plans to ensure they implement a risk-based approach. The Agency Monitoring Plan states that Compliance will use a Monitoring Plan Checklist to evaluate and determine if all the required elements for subrecipient monitoring are present in each division’s plan. Compliance does not hold monthly meetings with Subrecipient Monitoring Coordinators, as required by the Agency Monitoring Plan, where divisions can share information concerning risks and federal and/or grant-specific requirements, approaches to assessing risk, and changes that could affect subrecipients and the monitoring processes. Compliance has not reviewed each division’s monitoring activities nor provided quarterly reports of variances and noncompliance from the Agency Monitoring Plan to Social Services’ executive team. As a result, Compliance did not identify that the Division of Benefit Programs (Benefit Programs) did not complete risk assessments for 50 of its 324 (15%) locality subrecipients, properly document considerations for localities with elevated risks, nor perform adequate risk assessments for their non-locality subrecipients. Since the prior audit, Compliance has communicated the Agency Monitoring Plan to the Subrecipient Monitoring Coordinators. Additionally, Compliance has worked with Social Services’ Executive Team to secure funding for a grants management system and additional subrecipient monitor positions. However, Compliance has yet to establish a timeline for when it intends for the system to be fully functional and has not explored alternate options to comply with its Agency Monitoring Plan. Further, Compliance has not collaborated with Subrecipient Monitoring Coordinators to determine how the agency collectively plans to accomplish the goals and objectives set forth within the Agency Monitoring Plan. Collaboration between Compliance and Subrecipient Monitoring Coordinators is imperative to ensuring that Social Services complies with the pass-through entity requirements in 2 CFR § 200.332. Title 2 CFR § 200.303(a) requires pass-through entities to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the non-Federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Without performing the responsibilities in the Agency Monitoring Plan, Compliance cannot assure that the agency’s subrecipient monitoring efforts are adequate to comply with the regulations at 2 CFR § 200.332. Additionally, Compliance places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards by not monitoring the agency’s subrecipient monitoring activities. Because of the scope of this matter and the magnitude of Social Services’ subrecipient monitoring responsibilities, we consider these weaknesses collectively to create a material weakness in internal controls over compliance. Compliance should work collaboratively with Social Services’ Executive Team and the subrecipient monitoring coordinators to fulfil the agency’s responsibilities in the Agency Monitoring Plan. Further, Compliance should explore alternative solutions to track and monitor each division’s subrecipient monitoring activities and report the results to the Executive Team until it develops and implements its grants management system. Evaluating alternative solutions will help Social Services mitigate the risk of incurring federal sanctions because of non-compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-011: Improve Fiscal Agent Oversight Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(a) Known Questioned Costs: $0 Medical Assistance Services did not obtain and review a System and Organization Controls (SOC) report, specifically a SOC I, Type 2 report, to gain assurance over its fiscal agent’s internal controls relevant to financial reporting. In addition to services related to information systems management and security, Medical Assistance Services contracts with the fiscal agent to perform accurate and timely payments of Medicaid claims to providers and maintain an accounts receivable ledger for the collection of provider funds owed to Medical Assistance Services. The fiscal agent processed over $22 billion in Medicaid-related payments during fiscal year 2024. Medical Assistance Services obtained a SOC 2, Type 2 report related to the fiscal agent’s controls over information systems management and security, however, this report did not provide an opinion over internal controls relevant to Medical Assistance Services’ significant fiscal activity and financial reporting. The Commonwealth’s Accounting Policies and Procedures Manual Topic 10305 requires agencies to have adequate interaction with service providers to appropriately understand the service provider’s internal control environment. It also states that agencies must also maintain oversight over service providers to gain assurance over outsourced operations. Additionally, Title 2 U.S. Code of Federal Regulations (CFR) § 200.303(a) requires non-federal entities to establish and maintain effective internal control over the federal award that provides reasonable assurance that the non-federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. The existing contract between Medical Assistance Services and the fiscal agent does not require the fiscal agent to obtain an independent review opining to the effectiveness of internal controls related to Medical Assistance Services’ significant fiscal activities and financial reporting. Management asserted that they are currently working to modify the contract with the provider to add this requirement. Although management maintains a high degree of interaction with its fiscal agent, they cannot adequately ensure the fiscal agent has designed and implemented sufficient controls, and whether the controls are operating effectively without obtaining and reviewing a SOC I, Type 2 report. This issue increases the risk that management will not detect a weakness in the fiscal agent’s environment, which could negatively impact the Commonwealth. Medical Assistance Services should continue to work with the fiscal agent to add language to the contract that would require the fiscal agent to obtain an appropriate independent audit of its internal controls relevant to Medical Assistance Services’ financial activities and reporting. Once the new contract language is in effect, Medical Assistance Services’ management should obtain and review the SOC I, Type 2 report annually to ensure the fiscal agent is meeting contractual obligations and has proper internal controls over Medical Assistance Services’ significant fiscal activities and financial reporting. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-017: Improve IT Third-Party Oversight Process Applicable to: Department of Medical Assistance Services Prior Year Finding Number: 2023-086; 2022-090 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Third-Party Service Providers (Information Systems) ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services has made progress to document and implement a formal process for maintaining oversight for three of its IT third-party service providers that manage and support its Medicaid management system. The Medicaid management system encompasses different functions, such as member and provider reporting, financial reporting, and federal reporting. Since the prior year audit, Medical Assistance Services developed its Information Technology (IT) Third Party Risk Management Procedure, which was effective on February 1, 2024, to facilitate the implementation of its IT System and Services Acquisition Policy. However, Medical Assistance Services is still working to implement the new procedure, which has resulted in the agency not yet verifying the following required controls and processes for one of the Medicaid management system IT service providers that is not covered by the Virginia Information Technologies Agency (VITA) Commonwealth of Virginia Risk and Authority Management Program. Medical Assistance Services does not confirm the geographic location of sensitive data monthly for IT service providers. Without confirming the geographic location of sensitive data, Medical Assistance Services may be unable to enforce contract requirements, laws, and standards due to the data falling outside of the United States’ jurisdiction. Medical Assistance Services does not confirm whether IT service providers perform vulnerability scans every 90 days. By not obtaining and analyzing the vulnerability scan results from the IT service provider, Medical Assistance Services increases the risk that the IT service providers are not remediating legitimate vulnerabilities in a timely manner. Medical Assistance Services experienced delays in implementing its new procedure due to limited staffing to properly communicate and train those responsible for monitoring IT service providers. Medical Assistance Services expects to complete its implementation by October 2024. Medical Assistance Services should dedicate the resources necessary to finish implementing its Third-Party Risk Management Procedure. Additionally, Medical Assistance Services should ensure that those tasked with monitoring IT service providers are confirming the geographic location of sensitive data and the provider’s performance of vulnerability scanning and remediation efforts per the Security Standard. Medical Assistance Services should also ensure the individuals responsible for monitoring consistently perform formal oversight processes in a timely manner, which will help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-022: Improve Information Security Program and Controls Applicable to: Department of Medical Assistance Services Prior Year Finding Number: 2023-010; 2022-024; 2021-024; 2020-024 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: Access Control; Awareness and Training; Incident Response; Information Security Roles and Responsibilities; Planning; Risk Assessment; Security Assessment and Authorization; System and Services Acquisition ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services continues to address weaknesses in its information technology (IT) general controls originally identified in a 2020 audit and confirmed in a 2023 audit covering the same IT general controls conducted by Medical Assistance Services’ Internal Audit division. During the 2023 audit, Internal Audit tested 105 controls required by the Commonwealth’s previous version of the Information Security Standard, SEC501, and identified 61 individual control weaknesses, a 58% non-compliance rate, that Internal Audit grouped into eight findings. Medical Assistance Services addressed four of the eight findings during fiscal year 2024. Noncompliance with required security controls increases the risk for unauthorized access to mission-critical systems and data in addition to weakening Medical Assistance Services ability to respond to malicious attacks to its IT environment. Medical Assistance Services has experienced delays in addressing these findings due to the number of findings and resources required to remediate the weaknesses. Medical Assistance Services updated its corrective action plan for the four remaining findings in June 2024, stating corrective actions are still ongoing with an estimated completion date of September 2024. Medical Assistance Services should prioritize and dedicate the necessary resources to ensure timely completion of its corrective action plans and to become compliant with the current version of the Commonwealth’s Information Security Standard, SEC530 (Security Standard). These actions will help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-023: Improve Database Security Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control; Audit and Accountability; Configuration Management; Contingency Planning; Identification and Authentication; System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services does not have formal policies, procedures, and a baseline configuration that outlines requirements and justifications for securing and maintaining the database supporting its primary system for financial accounting and reporting operations in accordance with the Security Standard, and industry best practices, such as the Center for Internet Security Benchmarks (CIS Benchmark). As a result, Medical Assistance Services has not implemented some required controls over the database. We communicated the weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to it containing descriptions of security mechanisms. The Security Standard requires Medical Assistance Services to develop, document, and disseminate information security policies and procedures that align with the control requirements in the Security Standard. Additionally, the Security Standard requires Medical Assistance Services to develop, document, and maintain a current baseline configuration of the system and apply more restrictive security configurations for sensitive systems. The Security Standard also requires Medical Assistance Services to review and update the policies, procedures, and baseline configuration on an annual basis and following an environmental change. Without detailed policies, procedures, and a baseline configuration that outlines requirements and justifications for securing and maintaining its database, Medical Assistance Services increases the risk that the system will not meet the minimum security requirements and recommendations to protect its sensitive data from malicious parties. Medical Assistance Services has experienced a lack of resources which has contributed to the absence of documentation outlining control requirements and procedures needed to properly secure the database. The absence of this documentation contributed to the deficiencies communicated in the FOIAE document and as a result, Medical Assistance Services has not consistently evaluated and applied security controls. Medical Assistance Services should dedicate the resources necessary to develop and implement formal policies and procedures to support its database based on the Security Standard requirements and settings recommended by industry best practices, such as the CIS Benchmark. Medical Assistance Services should develop a formal baseline configuration for the database that defines required security controls outlined in industry best practices, such as the CIS Benchmark. The baseline configuration should define deviations from recommended and expected security configurations as well as business justification and approval for any deviations. Additionally, Medical Assistance Services should develop a process to review the database’s configuration against its established baseline configuration on a scheduled basis and after major changes occur to help detect and address potential misconfigurations timely. Furthermore, Medical Assistance Services should implement the security controls and processes communicated in the FOIAE document to address risks present in the database to ensure the configuration aligns with the Security Standard and CIS Benchmark. These actions will help maintain the confidentiality, availability, and integrity of Medical Assistance Services’ sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-024: Continue Improving IT Risk Management Program Applicable to: Department of Social Services Prior Year Finding Number: 2023-014; 2022-030; 2021-026; 2020-027; 2019-063; 2018-025 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Planning; Risk Assessment ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to not have a formal and effective IT risk management program that aligns with the requirements in the Security Standard. Since we first issued this finding in 2018, Social Services remediated some risk management and contingency planning issues. However, Social Services continues not to: accurately verify and validate data and system sensitivity ratings; create risk assessments for 90 percent of its sensitive systems; create system security plans for the 55 current systems identified as sensitive; review risk assessments for 100 percent of its existing documentation; and implement corrective actions identified in risk assessments. We communicated the details of these weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. ISRM and TSD defined and documented a new risk assessment policy and procedure in April 2024. Social Services also established a new risk assessment process that engages system administrators and system owners to complete a risk assessment worksheet to submit to ISRM for evaluation. ISRM meets with system administrators, system owners, and the Agency Head, to review the resulting risk assessment report and establish a risk mitigation plan. However, Social Services has not yet matured the new risk assessment process due to recently formalizing the process. Social Services established the Cybersecurity Team as part of TSD in fiscal year 2024; therefore, the Cybersecurity Team and ISRM have not yet assessed and integrated the various risk management processes. Additionally, the new risk assessment procedure does not define and document the requirements and processes Social Services must follow to implement the corrective action responsibilities. ISRM should work with TSD, the Cybersecurity Team, and business units to ensure Social Services establishes and maintains an up-to-date sensitive systems list. The Information Security Officer, in conjunction with system and data owners, should classify agency IT systems and data based on sensitivity. Following its new risk assessment procedure and process, ISRM and the Cybersecurity Team should prioritize completing risk assessments and system security plans for its sensitive systems and review those documents annually to validate that the information reflects the current environment. Additionally, TSD should implement security controls to mitigate the risks and vulnerabilities identified in its risk assessments. Improving the IT risk management program will help to ensure the confidentiality, integrity, and availability of the agency’s sensitive systems and mission-essential functions. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-025: Improve Web Application Security Applicable to: Department of Social Services Prior Year Finding Number: 2023-015; 2022-029; 2021-025; 2020-026; 2019-037 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Audit and Accountability; Configuration Management; Risk Assessment; System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to not configure a sensitive web application in accordance with the Security Standard. During fiscal year 2024, Social Services remediated two of the five previously identified weaknesses; however, these two weaknesses existed during the fiscal year under review. Additionally, Social Services has not remediated three of the previously identified weaknesses. We communicated the weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. Lacking and insufficient procedures and processes to manage the web application contributed to the five weaknesses outlined in the separate FOIAE document. Social Services prioritizing other projects also contributed to the weaknesses persisting. TSD, ISRM, and business owners should work together to remediate the remaining weaknesses to secure the web application and meet the minimum requirements in its internal policies and the Security Standard. Addressing these weaknesses will help to ensure the confidentiality, integrity, and availability of sensitive and mission-critical data and achieve compliance with both internal policies and the Security Standard. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-035: Improve Information Security Program and IT Governance Applicable to: Department of Social Services Prior Year Finding Number: 2023-027; 2022-022 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: Information Security Roles and Responsibilities ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to have an insufficient governance structure to manage and maintain its information security program in accordance with the Security Standard. Specifically, Social Services does not assess information security requirements for its information technology (IT) projects and prioritize information security and IT resources to ensure its information security program effectively protects sensitive Commonwealth data in accordance with the Security Standard. We communicated the control weaknesses to management in a separate document marked Freedom of Information Act Exempt (FOIAE) under § 2.2-3705.2 of the Code of Virginia due to its sensitivity and description of security controls. The Security Standard requires the agency head to maintain an information security program that is sufficient to protect the agency’s IT systems and to ensure the agency documents and effectively communicates the information security program. Not prioritizing IT resources to properly manage its information security program can result in a data breach or unauthorized access to confidential and mission-critical data, leading to data corruption, data loss, or system disruption if accessed by a malicious attacker, either internal or external. The control weaknesses described in the communication marked FOIAE are the result of Social Services not assessing information security requirements prior to project implementation, in addition to Social Services not prioritizing information security within the IT environment. Social Services has hindered its ability to consistently and timely remediate findings from management recommendations issued during prior year audits and bring the information security program in compliance with the Security Standard by not dedicating the necessary IT resources to information security. During fiscal year 2024, Social Services created a cybersecurity team under the Technology Services Division (TSD) to liaison between TSD and the Division of Information Security and Risk Management (ISRM) to help bring the information security program in compliance with the Security Standard. However, due to the magnitude of the project, TSD, the cybersecurity team, ISRM, and the executive team have not yet completed efforts to remediate this finding. TSD, ISRM, and Social Services’ Cybersecurity and Executive teams should continue to work together to bring the IT security program in compliance with the Security Standard. TSD and ISRM should continue to evaluate IT resource levels to ensure sufficient resources are available and dedicated to prioritizing and implementing IT governance changes and address the control deficiencies discussed in the communication marked FOIAE. Additionally, Social Services should evaluate the organizational placement of the Information Security Officer (ISO) to ensure effective implementation of the information security program and controls. Implementing these recommendations will help to ensure Social Services protects the confidentiality, integrity, and availability of its sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-041: Evaluate Separation of Duty Conflicts within the Case Management System Applicable to: Department of Social Services Prior Year Finding Number: 2023-034 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Benefit Programs, which is the owner of Social Services’ case management system, has not performed nor documented a conflicting access review to identify the combination of roles that could pose a separation of duties conflict or to ensure compensating controls are in place to mitigate risks arising from those conflicts. Social Services uses the case management system to determine applicant eligibility and authorize benefit payments for the Medicaid, SNAP, CCDF, LIHEAP, and TANF federal grant programs. Social Services authorized over $17 billion in public assistance payments to beneficiaries from these federal programs through its case management system during fiscal year 2024. The Security Standard requires the agency to separate duties of individuals as necessary, document separation of duties of individuals, and define information system access authorizations to support the separation of duties. Further, Social Services’ Information Security Policy states that the system owner is responsible for identifying and documenting separation of duties of individuals and defining system access authorizations to support separation of duties. Without performing and documenting a conflicting access review, Social Services does not know which combination of roles may pose a separation of duties conflict and is unable to implement compensating controls. In effect, this increases the possibility of a system breach or other malicious attack on Social Services’ data and places Social Services’ reputation at risk. Benefit Programs has not yet begun their corrective action efforts and ISRM has not included this finding in its Plan of Actions and Milestones (POAM) report, which is its internal corrective action plan that it shares with Social Services’ Executive Team. As a result, Social Services’ Executive Team was not aware that Social Services continues to be non-compliant with the Security Standard and its Information Security Policy. According to Social Services’ Organizational Structure Report, ISRM provides guidance to system owners about security requirements and is ultimately responsible for protecting Social Services’ information systems by addressing security compliance and risk. Benefit Programs should conduct a conflicting access review for the case management system and collaborate with ISRM to ensure it performs and documents this review in accordance with Social Services’ Information Security Policy. Additionally, ISRM should monitor this finding’s progress through its POAM report and provide periodic updates to Social Services’ Executive Team. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-042: Perform Annual Review of Case Management System Access Applicable to: Department of Social Services Prior Year Finding Number: 2023-035 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Access Control ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Benefit Programs, which is the owner of Social Services’ case management system, continues to not perform the required annual access review. Social Services uses the case management system to determine applicant eligibility and authorize benefit payments for the Medicaid, SNAP, CCDF, LIHEAP, and TANF federal grant programs. Social Services authorized over $17 billion in public assistance payments to beneficiaries from these federal programs through its case management system during fiscal year 2024. The Security Standard requires the agency to review accounts for compliance with account management on an annual basis. Additionally, ISRM’s Procedures Manual for State and Local Security Officers requires system owners and security officers to review user access privileges annually. System owners and security officers must complete this review within 364 days from the completion date of the last security review. Benefit Programs last completed a security review over the case management system in June 2022. Benefit Programs is responsible for obtaining the case management system’s access listing from ISRM, coordinating the annual review with the security officers, and working with ISRM to modify user access privileges as necessary. However, Benefit Programs did not perform the required annual access review for the case management system because it did not initiate the process with ISRM, and ISRM did not include this finding in its POAM report, which is its internal corrective action plan that it shares with Social Services’ Executive Team. As a result, Social Services’ Executive Team was not aware that Social Services continues to be non-compliant with the Security Standard and its Procedures Manual for State and Local Security Officers. According to Social Services’ Organizational Structure Report, ISRM provides guidance to System Owners about security requirements and is ultimately responsible for protecting Social Services’ information systems by addressing security compliance and risk. Social Services increases the risk of improper or unnecessary access to sensitive systems by not reviewing access to the case management system annually, which could potentially result in a system breach or other malicious attack on Social Services’ data and adversely affect its reputation. Benefit Programs should perform the required annual security review for the case management system and collaborate with ISRM to ensure it completes this review in accordance with the Procedures Manual for State and Local Officers. Additionally, ISRM should monitor this finding’s progress through its POAM report and provide periodic updates to Social Services’ Executive Team. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-047: Continue Improving IT Change and Configuration Management Process Applicable to: Department of Social Services Prior Year Finding Number: 2023-049; 2022-052; 2021-049; 2020-044; 2019-038 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Configuration Management ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to improve its IT change and configuration management process to align with the Security Standard. Change management is a key control to evaluate, approve, and verify configuration changes to security components. Two weaknesses remain since our last review, which we communicated to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing description of security mechanisms. The Security Standard requires agencies to implement certain controls that reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. Social Services’ Change Management Process Guide details the process Social Services follows to manage changes, but does not include all the required elements, which contributed to the weaknesses remaining. Additionally, Social Services migrated to a new change management system of record in October 2023, which also contributed to the delay in remediating the remaining issues due to Social Services prioritizing the migration project. Not prioritizing and aligning IT change management processes with the Security Standard increases the risk of a data breach or unauthorized access to confidential and mission-critical data, leading to data corruption, data loss, or system disruption if accessed by a malicious attacker, either internal or external. Social Services should resolve the remaining two weaknesses discussed in the communication marked FOIAE in accordance with the Security Standard. Continuing to improve Social Services’ IT change and configuration management process will decrease the risk of unauthorized modifications to sensitive systems and help maintain the confidentiality, integrity, and availability of sensitive and mission-critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-053: Improve Vulnerability Remediation Efforts Applicable to: Department of Medical Assistance Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Risk Assessment ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Medical Assistance Services does not install security patches to mitigate vulnerabilities within its IT environment in accordance with its Vulnerability Scan Management procedure. Specifically, as of November 2024, Medical Assistance Services identified a significant number of vulnerabilities classified with a severity of critical and high and numerous vulnerabilities with a severity of medium or low in its IT environment that remained unmitigated beyond the time limits set in its procedure. Medical Assistance Services’ procedure requires the agency to mitigate and validate vulnerabilities within the following timeframes, depending on the vulnerability’s severity rating: High-severity flaws within 30 calendar days; Medium-severity flaws within 60 calendar days; and All others within 90 calendar days. Additionally, the Security Standard requires Medical Assistance Services to “monitor and scan for vulnerabilities in the system and hosted applications at least once every 30 days, and when new vulnerabilities potentially affecting the system are identified and reported.” The Security Standard also requires Medical Assistance Services to remediate legitimate vulnerabilities within 30 days unless otherwise specified by Commonwealth Security Risk Management (CSRM) in accordance with an organizational assessment of risk. The Commonwealth’s IT Risk Management Standard, SEC520 (Risk Management Standard) requires Medical Assistance Services to “fix vulnerabilities within 30 days of a fix becoming available that are either rated as critical or high according to the National Vulnerability Database or otherwise identified by CSRM.” Additionally, the Risk Management Standard requires Medical Assistance Services to remediate all other vulnerabilities within 90 days of a fix becoming available and acquire an approved security exception for the vulnerability should Medical Assistance Services not remediate it within the timeframes identified. Software vulnerabilities are publicly known flaws that bad actors may exploit and use to circumvent organizational information security controls to infiltrate a network or application. The longer these vulnerabilities exist in an environment, the higher the risk of a compromise and unauthorized access to sensitive and mission-critical systems and data. It is therefore imperative for organizations to respond quickly and mitigate these publicly known flaws as soon as possible. Without appropriate software patching and vulnerability management controls, Medical Assistance Services increases the risk of unauthorized access to sensitive and mission-critical systems. Medical Assistance Services lacks the staffing necessary to remediate the high number of vulnerabilities detected within the timeframes required by its Vulnerability Scan Management procedure. Medical Assistance Services should allocate the necessary resources to apply patches within the Vulnerability Scan Management procedure’s required timeframe to mitigate the vulnerabilities affecting its IT environment. If Medical Assistance Services is unable to mitigate vulnerabilities within the required timeframe, it should obtain an extension approval from CSRM that is based on an organizational assessment of risk. Timely remediation of significant vulnerabilities will help protect the confidentiality, integrity, and availability of Medical Assistance Services’ sensitive and mission-critical information. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-058: Conduct Information Technology Security Audits Applicable to: Department of Social Services Prior Year Finding Number: 2023-056 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Audit and Accountability ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services is making progress in conducting a comprehensive IT security audit on each sensitive system at least once every three years. While Social Services conducted an IT security audit over an additional 22 percent of its sensitive systems, 14 of the 79 sensitive systems (18%) due for an IT Security Audit remain unaudited. Social Services indicates it is on track to complete the remaining IT security audits by the end of calendar year 2025. The Security Standard requires that each IT system classified as sensitive undergo an IT security audit as required by and in accordance with the current version of the Commonwealth’s IT Security Audit Standard, SEC502 (IT Audit Standard). The IT Audit Standard requires that IT systems containing sensitive data, or systems with an assessed sensitivity of high on any of the criteria of confidentiality, integrity, or availability, shall receive an IT security audit at least once every three years. Without conducting full IT security audits for each sensitive system every three years, Social Services increases the risk that IT staff will not detect and mitigate existing weaknesses. Malicious parties taking advantage of continued weaknesses could compromise sensitive and confidential data. Further, such security incidents could lead to mission-critical systems being unavailable. During fiscal year 2024, Social Services’ Audit Services Manager collaborated with the business divisions, TSD, and ISRM to schedule and conduct audits. However, Social Services did not perform the remaining IT security audits due to the large number of sensitive systems requiring an audit. Lack of a documented procedure and process for conducting IT security audits also contributed to the lapse in IT security audits conducted over the last three years. Social Services should define and document a formal procedure and process for conducting IT security audits over each sensitive system at least once every three years that tests the effectiveness of the IT security controls and their compliance with Security Standard requirements. Social Services should then complete all outstanding IT security audits to ensure it meets the Security Standard requirements. Compliance with the IT Audit Standard will help to ensure the confidentiality, integrity, and availability of sensitive and mission critical data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-061: Develop and Provide Role-Based Security Awareness Training to System Administrators and Data Custodians Applicable to: Department of Social Services Prior Year Finding Number: N/A Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Awareness and Training ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 ISRM does not provide applicable role-based training to system administrators or data custodians that have security roles and responsibilities with elevated privileges. Additionally, ISRM does not document a procedure that outlines the steps it follows to administer the role-based training. An established security awareness training program is essential to protecting agency IT systems and data by ensuring that employees understand their roles and responsibilities in securing sensitive information at the agency. Social Services’ Awareness and Training Policy requires that Social Services’ Information Security Officer or designee provide role-based security and privacy training to personnel with the roles and responsibilities of system administrator and data custodian. Social Services’ Security Awareness and Training Policy and the Security Standard also require that Social Services administer role-based training to personnel before authorizing access to the system, information, or performing assigned duties; and annually thereafter, as well as when required by system changes. Without providing role-based training to all personnel with security-related roles, including personnel with the roles and responsibilities of system administrator and data custodian, Social Services increases the risk of human error and negligence. Additionally, lack of adequate role-based training increases the risk that users will be unaware or lack pertinent skills and knowledge to perform their security-related functions, resulting in an increased security risk. ISRM did not provide role-based training to personnel with designated information security roles due to competing priorities. Additionally, although the Awareness and Training Policy requires role-based training, Social Services does not define and document their process to provide role-based training to personnel with security-related functions, such as the specific training that each role should take, the deadline for role-based training completion, and the enforcement measure resulting from not completing the role-based training timely. ISRM should develop procedures that detail the process to provide role-based training to personnel with designated security roles. ISRM should also develop and administer role-based training for systems administrators and data custodians. Improving the security awareness training program will help protect Social Services from malicious attempts to compromise the confidentiality, integrity, and availability of sensitive data. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-064: Upgrade End-of-Life Technology Applicable to: Department of Social Services Prior Year Finding Number: 2023-058; 2022-060 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: System and Information Integrity ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services uses end-of-life (EOL) technologies in its IT environment and maintains technologies that support mission-essential data on IT systems running software that its vendors no longer support. We communicated the control weaknesses to management in a separate document marked FOIAE under § 2.2-3705.2 of the Code of Virginia, due to it containing descriptions of security mechanisms. The Security Standard prohibits agencies from using software that is EOL and which the vendor no longer supports to reduce unnecessary risk to the confidentiality, integrity, and availability of Social Services’ information systems and data. In May 2024, Social Services established a Cybersecurity Team to track and manage technologies but has not yet completed their processes. Using EOL technologies increases the risk of successful cyberattack, exploit, and data breach by malicious parties. Further, vendors do not offer operational and technical support for EOL or end-of-support technology, which affects data availability by increasing the difficulty of restoring system functionality if a technical failure occurs. Social Services should dedicate the necessary resources to evaluate and implement the controls and recommendations discussed in the communication marked FOIAE in accordance with the Security Standard. By dedicating the necessary resources to evaluate and implement these controls and recommendations, Social Services will help to ensure that it adequately secures its IT environment and systems. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-067: Continue Developing Record Retention Requirements and Processes for Electronic Records Applicable to: Department of Social Services Prior Year Finding Number: 2023-066; 2022-064; 2021-047; 2020-041; 2019-049; 2018-054 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Contingency Planning ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to operate without an adequate data retention process that ensures consistent compliance with retention requirements for its case management system and adherence to federal regulations and state law. Social Services’ case management system stores several types of federal benefit program records with varying retention requirements supporting ten programs and services, such as the Medical Assistance (Medicaid), Supplemental Nutrition Assistance (SNAP), Child Care and Development Fund (CCDF), LIHEAP, and TANF federal grant programs. Social Services’ case management system authorized over $17 billion in public assistance payments to beneficiaries from these federal programs during fiscal year 2024. Since fiscal year 2019, Social Services gathered retention requirements from the business divisions that support the federal programs and services. In fiscal year 2022, Social Services finalized and documented policies with retention requirements for the data sets handled by each of the ten programs and services supported by its case management system. Social Services determined that due to the risk and complexity of the project, as well as changes to federal requirements since its first analysis, the retention requirements for all ten programs and services supported by its case management system were not feasible as a single release. Therefore, Social Services planned a phased delivery approach including multiple releases. In November 2023, Social Services defined and documented a purge and retention design document to implement Release 1 of the record purge and retention project for its case management system. Social Services subsequently implemented Release 1 of the record purge and retention project in February 2024. However, Social Services has not completed the process to implement the records retention policies for each of the programs and services to ensure consistent retention and destruction of records in compliance with regulations and laws. Title 45 CFR § 155.1210, governs record retention for Medicaid and requires state agencies to maintain records for ten years. Additionally, the Virginia Public Records Act outlined in § 42.1-91 of the Code of Virginia makes an agency responsible for ensuring that it preserves, maintains, and makes accessible public records throughout their lifecycle, including converting and migrating electronic records as often as necessary so that an agency does not lose information due to hardware, software, or media obsolescence or deterioration. Furthermore, the Virginia Public Records Act in § 42.1-86.1 of the Code of Virginia details requirements for the disposition of records. Section § 42.1-86.1 requires that records created after July 1, 2006, and authorized to be destroyed or discarded, must be discarded in a timely manner and in accordance with the provisions of Chapter 7 of the Virginia Public Records Act. Further, records that contain identifying information as defined by subsection C of § 18.2-186.3 of the Code of Virginia shall be destroyed within six months of the expiration of the records retention period. Finally, the Security Standard requires agencies to implement backup and restoration plans that address the retention of the data in accordance with the records retention policy for every IT system identified as sensitive relative to availability. Without implementing records retention requirements, Social Services increases the risk of a data or privacy breach. Additionally, destroying documents that should be available for business processes or audit, or keeping data longer than stated, could expose Social Services to fines, penalties, or other legal consequences. Further, Social Services may not be able to ensure that backup and restoration efforts will provide mission critical information according to recovery times. Finally, retaining records longer than necessary causes the Commonwealth to spend additional resources to maintain, back-up, and protect information that no longer serves a business purpose. The magnitude and complexity of effectively implementing a retention and purge process for an integrated eligibility system delayed completion of the record purge and retention project. Additionally, following Release 1 implementation, Social Services identified an additional required element of the purge and retention project. For these reasons, Social Services plans to update the purge and retention design document and implement Release 2 in February 2025. Further, Social Services plans to complete the purge and retention project with the final release, Release 3, by September 2025. Social Services should complete the record purge and retention project for its case management system and, thereafter, implement consistent records retention and destruction processes across business divisions to ensure compliance with laws and regulations. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-068: Monitor Internal Controls to Ensure Timely Removal of System Access Applicable to: Department of Social Services Prior Year Finding Number: 2023-043; 2022-059; 2021-038;2021-027;2020-025;2019-027;2018-042 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: Personnel Security ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 Social Services continues to implement internal controls to monitor the timely removal of system access. The Security Standard requires the organization to disable information system access within 24 hours of employment termination. In response to the prior audit recommendations, ISRM developed an overarching policy governing system access that addresses the timely removal of system access and Social Services’ Division of Human Resources developed a policy to ensure supervisors follow the appropriate steps to offboard separated employees. Additionally, ISRM and the Division of Human Resources worked collaboratively to develop a process to identify individuals whose separation did not follow the offboarding policy and manually removed their access from Social Services’ access management system. However, because of the extent of its corrective actions, Social Services was not able to implement all of its planned corrective actions by the end of fiscal year 2024. Social Services administers numerous public assistance programs that collect personally identifiable information and other protected information from beneficiaries. Social Services could place its data and reputation at risk by not removing access timely. Additionally, Social Services could incur potential financial liabilities should its information become compromised. Therefore, Social Services should continue its corrective action efforts to implement internal controls to monitor the timely removal of system access. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-071: Continue to Ensure ITISP Suppliers Meet All Contractual Requirements Applicable to: Virginia Information Technologies Agency Prior Year Finding Number: 2023-072; 2022-100; 2021-023; 2020-070 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Other - 2 CFR § 200.303(e) Known Questioned Costs: $0 VITA has made significant progress to monitor and enforce the contractual requirements for the Information Technology Infrastructure Services Program (ITISP) suppliers. During fiscal year 2024, VITA and the Multisource Service Integration (MSI) continued to evaluate the current service level measurements to ensure they align with the Commonwealth’s needs. VITA and the MSI monitored the service level related to security and vulnerability patching for the entire fiscal year. The requirements of this service level for fiscal year 2024 included a Common Vulnerabilities and Exposures (CVE) threshold, which required that ITISP suppliers install any patch with a CVE score above the threshold within 60 days. If the supplier did not meet the service level threshold, VITA enforced a credit for the Commonwealth. Although VITA monitored the service levels implemented in the prior year, not enough time has passed to prove the effects of the consequences enforced. Our audits at various agencies for fiscal year 2024 found critical and highly important security patches not installed within 30 days as required by the Commonwealth’s Information Security Standard, SEC530 (Security Standard). As a result, the systems missing critical security updates are at an increased risk of cyberattack, exploitation, and data breach by malicious parties. When ITISP suppliers do not meet all contractual requirements (e.g., Service Level Agreements, Critical Deliverables, etc.) it impacts the ability of Commonwealth agencies that rely on the ITISP services to comply with the Security Standard. The Security Standard is a baseline for information security and risk management activities for Commonwealth agencies. Many agencies rely on services provided through ITISP suppliers to ensure compliance with the Security Standard. For example, the Security Standard requires the installation of security-relevant software and firmware updates within at least 30 days of the update’s release or within a timeframe approved by Commonwealth Security and Risk Management (CSRM) . Commonwealth agencies rely on the ITISP suppliers for the installation of security patches in systems that support agencies’ operations. Additionally, during fiscal year 2024, VITA continued to work with the managed security supplier to address the inability of agencies to access the audit log information in the managed detection and response (MDR) platform. VITA implemented a separate security and event management (SIEM) tool at the end of October 2023 to expand agencies’ capabilities to monitor audit log information. While the supplier implemented the MDR platform, VITA and the supplier determined to replace the MDR platform with the VITA-managed SIEM tool as the permanent audit log monitoring tool. However, while the SIEM tool is in production, it also does not include all audit log information in a usable format to allow agencies to adequately monitor their IT environments. The Security Standard requires agencies to review and analyze audit records at least every 30 days for indications of inappropriate or unusual activity. Our audits of various agencies for fiscal year 2024 found that agencies rely on VITA and ITISP suppliers to provide access to a centralized monitoring tool that collects audit log information about activities in the IT environment. Although the supplier was performing audit logging and monitoring, most agencies were unable to obtain access to the audit log information during fiscal year 2024, and thus, were not able to comply with the Security Standard requirements related to audit log monitoring. An inability for all agencies to review and monitor their individual audit logs increases the risk associated with the Commonwealth’s data confidentiality, integrity, and availability. To ensure all agencies that rely on the ITISP’s services comply with the Security Standard, VITA should ensure suppliers meet all contractual requirements (e.g., Service Level Agreements, Critical Deliverables, etc.). If VITA determines suppliers are not meeting these requirements, VITA should implement escalation procedures to compel the ITISP services to comply with the contractual requirements. Additionally, VITA should communicate with the affected agencies and provide guidance on what the agencies can do to comply with the Security Standard while the suppliers work to meet the requirements of the contract. VITA should also continue working with the ITISP suppliers and agencies to import audit log information to the SIEM tool to ensure agencies can review the activities occurring in their IT environments in accordance with the Security Standard. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-082: Perform Responsibilities Outlined in the Agency Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-097; 2022-011; 2021-070; 2020-074; 2019-090; 2018-093 Type of Finding: Internal Control and Compliance Severity of Deficiency: Material Weakness Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778 Federal Award Number and Year: 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.303(a); 2 CFR § 200.332 Known Questioned Costs: $0 Compliance continues to not adhere to its established approach to oversee the agency’s subrecipient monitoring activities, as outlined in its Agency Monitoring Plan. According to Social Services’ Organizational Structure Report, Compliance is responsible for agency-wide compliance and risk mitigation that helps to ensure adherence to state and federal legal and regulatory standards, including subrecipient monitoring. During fiscal year 2024, Social Services disbursed approximately $660 million to 342 subrecipients from 30 federal grant programs. During the audit, we noted the following deviations from the Agency Monitoring Plan: Compliance continues to not review programmatic division annual subrecipient monitoring plans to ensure they implement a risk-based approach. The Agency Monitoring Plan states that Compliance will use a Monitoring Plan Checklist to evaluate and determine if all the required elements for subrecipient monitoring are present in each division’s plan. Compliance does not hold monthly meetings with Subrecipient Monitoring Coordinators, as required by the Agency Monitoring Plan, where divisions can share information concerning risks and federal and/or grant-specific requirements, approaches to assessing risk, and changes that could affect subrecipients and the monitoring processes. Compliance has not reviewed each division’s monitoring activities nor provided quarterly reports of variances and noncompliance from the Agency Monitoring Plan to Social Services’ executive team. As a result, Compliance did not identify that the Division of Benefit Programs (Benefit Programs) did not complete risk assessments for 50 of its 324 (15%) locality subrecipients, properly document considerations for localities with elevated risks, nor perform adequate risk assessments for their non-locality subrecipients. Since the prior audit, Compliance has communicated the Agency Monitoring Plan to the Subrecipient Monitoring Coordinators. Additionally, Compliance has worked with Social Services’ Executive Team to secure funding for a grants management system and additional subrecipient monitor positions. However, Compliance has yet to establish a timeline for when it intends for the system to be fully functional and has not explored alternate options to comply with its Agency Monitoring Plan. Further, Compliance has not collaborated with Subrecipient Monitoring Coordinators to determine how the agency collectively plans to accomplish the goals and objectives set forth within the Agency Monitoring Plan. Collaboration between Compliance and Subrecipient Monitoring Coordinators is imperative to ensuring that Social Services complies with the pass-through entity requirements in 2 CFR § 200.332. Title 2 CFR § 200.303(a) requires pass-through entities to establish, document, and maintain effective internal control over the federal award that provides reasonable assurance that the non-Federal entity is managing the federal award in compliance with federal statutes, regulations, and the terms and conditions of the federal award. Without performing the responsibilities in the Agency Monitoring Plan, Compliance cannot assure that the agency’s subrecipient monitoring efforts are adequate to comply with the regulations at 2 CFR § 200.332. Additionally, Compliance places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards by not monitoring the agency’s subrecipient monitoring activities. Because of the scope of this matter and the magnitude of Social Services’ subrecipient monitoring responsibilities, we consider these weaknesses collectively to create a material weakness in internal controls over compliance. Compliance should work collaboratively with Social Services’ Executive Team and the subrecipient monitoring coordinators to fulfil the agency’s responsibilities in the Agency Monitoring Plan. Further, Compliance should explore alternative solutions to track and monitor each division’s subrecipient monitoring activities and report the results to the Executive Team until it develops and implements its grants management system. Evaluating alternative solutions will help Social Services mitigate the risk of incurring federal sanctions because of non-compliance. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-085: Evaluate Subrecipients’ Risk of Noncompliance in Accordance with Federal Regulations Applicable to: Department of Social Services Prior Year Finding Number: 2023-100; 2022-016; 2021-071 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(b) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants evaluated each subrecipient’s risk of noncompliance in accordance with federal regulations. Benefit Programs oversees the administration of the Medicaid, SNAP, TANF, and LIHEAP federal grant programs. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Additionally, Benefit Programs partnered with program consultants to perform risk assessment procedures. While auditing Benefit Programs’ fiscal year 2024 subrecipient monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Program consultants did not complete non-locality programmatic risk assessments for 219 out of 251 (87%) subawards with payments during the fiscal year. Program consultants did not include adequate justification for why it would not perform a monitoring review during the monitoring period for 83 out of 274 (30%) locality programmatic risk assessments assessed as high or medium risk. Program consultants did not complete 50 out of 324 (15%) locality programmatic risk assessments. Program consultants assessed three of the non-locality subrecipients as moderate risk without an adequate justification of why a monitoring review would not be scheduled for these non-locality subrecipients. Program consultants improperly assessed two of the non-locality subrecipients as low risk even though they had never submitted a Single Audit report to the Clearinghouse. Program consultants did not include a locality programmatic risk assessment that was identified as requiring a targeted monitoring review in their schedule for the fiscal year. Title 2 CFR § 200.332(b) requires pass-through entities to evaluate each subrecipient's risk of noncompliance with federal statutes, regulations, and the terms and conditions of the subaward for purposes of determining the appropriate subrecipient monitoring. Without performing the proper risk assessment procedures, Benefit Programs cannot demonstrate that it monitored the activities of the subrecipients as necessary to ensure that the pass-through entities used the subawards for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Benefit Programs was not able to adequately oversee the implementation of its risk assessment processes due to turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants complete risk assessment procedures for all of its subrecipients in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.
2024-086: Confirm Monitoring Activities are Conducted in Accordance with the Monitoring Plan Applicable to: Department of Social Services Prior Year Finding Number: 2023-102; 2022-014 Type of Finding: Internal Control and Compliance Severity of Deficiency: Significant Deficiency Information System Security Control Family: N/A ALPT or Cluster Name and ALN: Medicaid Cluster - 93.775, 93.777, 93.778; Temporary Assistance for Needy Families (TANF) - 93.558; Low-Income Home Energy Assistance Program (LIHEAP) - 93.568 Federal Award Number and Year: 2401VATANF; 2401VALIEA; 2405VA5MAP - 2024 Name of Federal Agency: U.S. Department of Health and Human Services Type of Compliance Requirement - Criteria: Subrecipient Monitoring - 2 CFR § 200.332(d) Known Questioned Costs: $0 Benefit Programs did not confirm that program consultants performed all required subrecipient monitoring activities in accordance with its subrecipient monitoring plan. During fiscal year 2024, Social Services disbursed approximately $660 million in federal funds to roughly 342 subrecipients from 30 federal grant programs. As part of its fiscal year 2024 corrective action efforts, Benefit Programs updated its monitoring plan to include risk assessment and monitoring reviews for both localities and non-localities subrecipients, began performing locality and non-locality risk assessments, and created tracking documents to better manage the subrecipient monitoring process. Further, Benefit Programs partnered with program consultants to execute its subrecipient monitoring activities. While auditing Benefit Programs’ fiscal year 2024 monitoring activities, we noted the following deviations from its subrecipient monitoring plan: Benefit Programs did not confirm program consultants notified the locality timely about the subrecipient monitoring review process. As a result, Benefit Programs did not identify that program consultants did not initiate timely communications for five out of 19 (26%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants fully documented corrective actions taken by its subrecipients in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide fully documented corrective action plans for four out of 19 (21%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants uploaded all fiscal year 2024 monitoring review records to its data repository in accordance with its subrecipient monitoring plan. As a result, Benefit Programs was not able to provide complete documentation for three out of 19 (16%) scheduled locality monitoring reviews. Benefit Programs did not confirm that program consultants included the appropriate sampling units, as outlined in its subrecipient monitoring plan. As a result, Benefit Programs did not identify that three out of 19 (16%) locality monitoring reviews had less sampling units than required by its subrecipient monitoring plan. Benefit Programs did not confirm that program consultants performed all scheduled monitoring reviews. As a result, Benefit Programs did not identify that program consultants did not perform a scheduled monitoring review for one out of 19 (5%) of its locality subrecipients. Based on Benefit Programs’ subrecipient monitoring risk assessments, this locality review was necessary due to the presence of risk factors which created a higher risk of non-compliance. Benefit Programs has not fully implemented its non-locality risk assessment and monitoring review processes which caused program consultants to perform only one monitoring review over approximately 251 non-locality subawards with payments during the fiscal year. Title 2 CFR § 200.332(e) requires the pass-through entity to monitor the activities of the subrecipient as necessary to ensure that the subrecipient uses the subaward for authorized purposes in compliance with federal statutes, regulations, and the terms and conditions of the subaward. Without confirming that program consultants conducted monitoring activities in accordance with the monitoring plan, Benefit Programs cannot provide assurance that it complied with federal regulations and potentially places Social Services at risk of disallowed expenditures and/or suspension or termination of its federal awards. Benefit Programs was not able to adequately oversee the execution of monitoring activities because of turnover in its subrecipient monitoring coordinator position. Additionally, Social Services’ Compliance Division was not aware of this non-compliance because it was not performing its monitoring responsibilities in accordance with its Agency Monitoring Plan. Benefit Programs should continue to evaluate its resource levels to ensure that it has adequate resources to effectively oversee the execution of its subrecipient monitoring plan. Additionally, Benefit Programs should dedicate the necessary resources to confirm that program consultants are performing monitoring procedures in accordance with its subrecipient monitoring plan. Views of Responsible Officials: The views of responsible officials are included in the report related to their applicable organization, which can be found at www.apa.virginia.gov and, in summary, do not express disagreement with the finding.