EAC OIG, through the independent public accounting firm of Clifton Gunderson LLP, conducted this audit to determine whether (1) the necessity of using personally identifiable information for processing was properly evaluated; (2) the EAC had established adequate procedures governing the collection, use and security of personally identifiable information; and (3) EAC had properly complied with the prescribed procedures to prevent unauthorized access to and the unintended use of personally identifiable information.
Audit of U.S. Election Assistance Commission's Compliance with Section 522 of the 2005 Consolidated Appropriations Act
Report Information
Status of Recommendations
Designate a Chief Privacy Officer or formally appoint an individual with the responsibility of monitoring and enforcing privacy related policies and procedures. Privacy responsibilities should be added to the position description (PD) of this assigned…
Develop an understanding of which EAC systems are covered by GSA's FISMA review rotation plan. Consequently, EAC should request from the service provider their systems review rotation schedule and note which systems are covered in each year's…
Develop and implement formal policies that address the information protection needs associated with PII to include:a) references to applicable information technology security policies and proceduresb) EAC specific procedures for responding to breaches of…
Complete the encryption of blackberry devices and laptops with Credent Encryption software as well as implement two-factor authentication.
Develop and maintain a plan of actions and milestones (POA&M) to address weaknesses identified in developing and implementing protections of PII.
Conduct a risk assessment which addresses the risks associated with the download, remote access, or other removal of PII from each system containing PII.