recommended reading

IRS mismanaged funds for major computer application

The Internal Revenue Service mismanaged funds for a major computer application that manages taxpayer data, which was officially halted in September 2008 so agency officials could reevaluate future plans for the system, according to an audit report released by the inspector general.

Between fiscal 2005 and fiscal 2008, the IRS received $41 million to develop four releases of the Account Management Services system, which was designed to provide agency employees faster access to taxpayer account information. According to a report from the IG, the IRS spent $17.4 million between January 2008 and November2008 on the system's core infrastructure, which included servers and network technology, as well as on development and project management associated with the releases. Lack of controls over how funding was spent caused a number of shortfalls.

"The AMS project management team experienced difficulty in managing project funding, [and] instead of reallocating and transferring the funding through the existing governance process, they used funds from future releases for the current release," the IG said.

Congress and the Government Accountability Office require that reports on the IRS' modernization costs and deployment schedules be included in the Business Systems Modernization Expenditure Plan, which estimates costs and sets schedules. Descriptions of work for eight transactions totaling almost $3.2 million "clearly did not match the funding source," which is defined by an internal order code, the IG reported.

Two transactions totaling $771,724 had descriptions that matched the internal order codes, but the work performed supported releases different from the ones the funds were allocated for. The IRS provided descriptions for five transactions totaling nearly $1.5 million, but did not identify which release the work supported.

"When one release was low on funding, they procured assets and services for that release by charging the expense to other releases," the IG said. "Adequate internal controls where the narrative description is compared to the internal order code would have identified these transactions as inappropriate."

The IRS spent $12 million on infrastructure and project management services for multiple releases of the computer application without the required approval, although the IG reported that the spending resulted in positive results.

"With a contract of this scope, control over spending for each release can be difficult," the IG noted. "A release-specific contract may have provided improved controls for employees, including requisition preparers, approving officials, the financial plan manager and management, to prevent cross-release spending."

The project management team completed deployment of Release 1.3 of AMS in February, and Release 2.1 is on track for its scheduled August delivery, but further development of the project is currently on hold. In 2007, the IRS decided to modernize and reuse the existing Integrated Data Retrieval System, which IRS employees use to work tax cases, eliminating the requirement to develop many of the capabilities originally planned for the AMS system. In September, the IRS' customer service executive steering committee approved a recommendation from the agency's Program Integration Office to stop all activities contributing to future releases of AMS so the goals of the project could be reevaluated.

"Because of these tentative plans about its future, IRS executives need to make several strategic decisions that will affect the future of the AMS system," the IG reported. "The longer these decisions are delayed, the greater the risk of costly rework."

In response to the recommendations, the chief technology officer agreed to ensure that AMS project management activities follow the appropriate governance process to redirect remaining AMS funding to complete Releases 1.3 and 2.1, and address the need to improve controls over project funding.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.