Control space of e-government EUROSAI ITWG

34 organisations 206 reports - 718 cases

Switzerland 13 - 59

2010

Business Continuity Management
A cross-section audit on business continuity management (BCM).

IT strategy of Swiss Federal Institute of Technology
Performance audit of IT strategy in research area.

Does the Admin PKI correspond to the original objectives and the needs of the Federal Administration and the Cantons?
Internal coordination can be more difficult than the external one.

2011

IT security in the Federal Administration
Technical and organizational deficiencies work together against data security.

2015

Parallel Audit on Biometric Passports - Overall Results (anonymised)
EUROSAI ITWG: Parallel Audit on Biometric Passports.

Audit of the key ICT project regarding a consumption tax platform Federal Customs Administration (FCA)
First attempt to ITC consumption tax project.

Audit of the key ICT project federal GEVER programme Federal Chancellery
Advanced process management system's cost-effectiveness and deadlines at risk.

Audit of the procurement of ICT products with the potential to be standard products
ICT procurement system reviewed.

2017

Analysis of alternatively financed building projects of the Federal Institutes ofTechnology
Analysis of alternatively financed building projects.

2022

Information security
Audit of the effectiveness of incident management in protecting federal ICT from cyber-risks
Cyberincident reporting needs to be quicker.

2023

Professional integrity
Cross-sectional audit of secondary occupations with a focus on conflicts of interest
Secondary occupations examined.

Public e-services
Examination of development and operation of the public key infrastructure
Comprehensive review of Public Key Infrastructure.

2024

Public e-services
Audit of the DTI key project Polycom Value Preservation 2030 with a focus on the border security subnetwork
Infrastructure Upgrade On Track.

Denmark 13 - 65

2013

Report to the Public AccountsCommittee on mitigation of cyber attacks
Three basic security measures are often neglected.

Report to on the user-friendliness and user involvement in the development of e-government services in Denmark
User-friendliness of public services should be consistenty required and tested.

2014

Report on the government’s processing of confidential data on persons and companies
Inadequate protection of confidential data.

Report on the problems connected with the development and implementation of the digitally based Shared Medication Record
Involvement of key participants necessary from the very beginning.

2015

Extract from the report to the Public Accounts Committee on the access to IT systems that support the provision of essential services to the Danish society
Inadequate management and control of domain administrator privileges.

Staff scheduling in government institutions
Scheduling irregular hours work.

Usability of public digital services directed at businesses
G2B - in search of user friendliness.

2016

Management of IT security in systems outsourced to external suppliers
Security to be improved in IT processes outsourced to external suppliers .

2017

The protection of IT systems and health data in three Danish regions
Security to be improved in IT systems with health data.

Relocation of government jobs
Difficult experience of relocation of jobs.

2018

The protection of research data at the Danish universities
The protection of research data at the Danish universities.

2023

Information security
Cyber security resilience of the Danish public sector II
Be prepared for breakdowns.

Information security
Security of servers managed by the Danish Agency for Governmental IT Services
Upgrade or decommission.

Latvia 11 - 65

2010

Evaluation of the effectiveness of implementation and compliance with regulatory enactments and the legal framework of the project “E-government Portfolio”
Funds to absorb but no efficient project methodology? Be prepared for troubles.

2011

Actions of national and municipal authorities to ensure the fulfillment of the obligations under the Loan Agreement “Safety Net and Social Sector Reform Program” between the Republic of Latvia and the World Bank
Well coordinated information structure is necessary for the unemployment benefits system.

2013

Material–technical supply of the State Police
Essential role of pre-project evaluation.

Software management assessment in local governments and local government educational institutions
Software management assessment in local governments and local government educational institutions.

2015

Storage of Electronic Documents and Data at the National Archives of Latvia
Do Archives ensure the storage of e-documents?.

Is the project 'E-health in Latvia' a step towards the right direction?
E-health is a step forward in right direction, but not all objectives will be reached!.

2017

Does the state administration effectively use the stored information?
State administration could use the accumulated information more effectively.

2019

Has Public Administration Used All Opportunities for Efficient Management of ICT Infrastructure?
Efficient Management of ICT Infrastructure.

2020

Does the Public Investment in Internet Access Reach the Population?
Middle mile network is not enough.

2021

Public e-services
Does the country ensure effective use of the official electronic address in communication with individuals and businesses?
Effective use of the official electronic address.

2022

Public e-services
Can we rely on the access to IS and the receipt of e-services?
Manage access to the receipt of e-services.

Sweden 20 - 103

2011

IT Support in the Judicial Chain
Needed: good conditions by government, better steering and control by authorities.

Correct information at the right time in healthcare and nursing – collaboration without effect?
Information share is crucial for competitive health care.

2016

The National Government Service Centre – Has administration become more effective?
Has Swedish public administration become more effective?.

Information security work at nine agencies
Difficulties in achieving appropriate IT security.

Professional integrity
Oversight of law enforcement agencies - An audit of the Swedish Commission on Security and IntegrityProtection
Unclarities make task harder.

Incorrect payments in social insurance - Control activities of the Swedish Social Insurance Agency
Balance of priorities needed to reduce incorrect payments.

2017

Population registration - uphill quality work
Quality of population register.

2018

Supply of food and medicinal products
Supply of food and medicinal products.

The protection of valuable forest
Protection of valuable forest.

Protection against fraud in migration activities at missions abroad
Migration activities can be a subject to fraud.

Recovery of housing allowance - easy to make mistakes
Avoid mistakes in housing allowance recovery.

For the sake of security – intelligence sharing between the Police Authority and the Swedish Security Service
Cooperation between Police and Security Service.

The Annual Municipal Accounts as a basis for comparing municipalities - are the cost indicator reliable?
Municipal accounting: more standardized or more controlled.

Higher education institutions' provision of premises- room for improvement
How to pay for higher education institutions' premises.

The Swedish Transport Administrations support to research and innovation
Robust internal control required to manage innovations.

2019

The Art of Governing – the Government’s management of cultural sector institutions
The Art of Influencing cultural institutions.

Swedish Customs control – an accurate enterprise?
It is better to know your own errors.

2020

Professional integrity
Finansinspektionen’s work to combat conflicts of interest
Avoiding conflicts of interest requires more attention from Finansinspektionen.

2023

Information security
Government control of national information and cyber security – both urgent and important
Consistency on strategic level.

2024

Public e-services
Who’s there? - Establishing identity at government agencies
Who’s there? - Establishing identity at government agencies.

UK 22 - 151

2009

The National Offender Management Information System (NOMIS)
Rescoping necessary, but not fully successful.

2011

Identifying and meeting central government's skills requirements
Start with well managed responsibilities.

2013

Managing the risk of legacy ICT to public service delivery
Possible approaches to the problem of 'legacy ICT'.

The rural broadband programme
Intervention in a noncompetitive market.

2015

Central government staff costs
Results of staff reductions.

Conflicts of interest
First, recognise the conflicts of interest are a real risk.

2016

Use of consultants and temporary staff
New skills needed in a longer term.

Homelessness
Homelessness grows despite increased spendings to reduce it.

Performance measurement by regulators
Performance measurement for regulators.

Information security
Protecting information across government
Coordination of Information Protecting system.

2017

Digital transformation in government
Support exemplars, provide consistent guidance... and do not lose focus.

Housing in England: overview
Efforts to support housing.

Online fraud
Uneven response to online fraud.

WannaCry Cyber Attack and the NHS
Why the British NHS became a victim of WannaCry.

2018

Good Practice in Annual Reports 2016-17
Reporting: a real skill.

Improving government’s planning and spending framework
Value for money vs. short-term planning.

2019

The BBC’s understanding of its audiences and users
Understand your audience, BBC.

The effectiveness of Official Development Assistance expenditure
Need of more coordination and transparency.

2020

Improving broadband
Lessons of Superfast Programme.

2024

Artificial intelligence
Use of artificial intelligence in government
Preparing to AI requires time.

2025

Information security
Government cyber resilience
Government faces critical cybersecurity challenges ahead.

Project management
Lessons learned: Governance and decision‑making on mega‑projects
Key governance issues arise in MEGA-Projects.

USA 31 - 185

2003

Electronic Records. Management and Preservation Pose Challenges
Basics of electronic records management.

2012

Software Developement Effective Practices and Federal Chalenges in Applying Agile Methods
Agile project approach in government practice.

Information Technology Cost Estimation Agencies Need to Address Significant Weakness in Policies and Practices
IT cost estimation.

Improved Planning and Performance Measures Are Needed to Help Ensure Successful Technology Modernization
Massive modernization effort needs coordination.

2015

ACQUISITION REFORM: DOD Should Streamline Its Decision-Making Process for Weapon Systems to Reduce Inefficiencies
Refinement of decision-making processes.

Copyright Office Needs to Develop Plans that Address Technical and Organizational Challenges
No justified investments without IT strategy.

2016

Federal Agencies Need to Address Aging Legacy Systems
Be aware of legacy IT risks.

Federal Human Resources Data
Internal control weaknesses may put mission at risk.

FEMA Needs to Address Management Weaknesses to Improve Its Systems
Controls in emergency management.

Homeland Security. Oversight of Neglected Human Resources Information Technology Investment Is Needed
Human resources IT investments get stuck in management's lack of interest.

OMB and Agencies Need to Focus Continued Attention on Implementing Reform Law
How to invest efficiently in IT.

Opportunities Exist for SEC to Improve Its Controls over Financial Systems and Data
IT security basics under scrutiny.

VETERANS’ HEALTH CARE - Preliminary Observations on VHA’s Claims Processing Delays and Efforts to Improve the Timeliness of Payments to Community Providers
Data processing hold back by technology limitation, workload and administrative burden.

2017

RURAL BROADBAND DEPLOYMENT: Improved Consistency with Leading Practices Could Enhance Management of Loan and Grant Programs
Green Book can help in broadband development.

2019

Steps Needed to Identify Acquisition Training Needs for Non-Acquisition Personnel
Non-Acquisition staff can be crucial for acquisition.

Opportunities Exist for FAA to Improve Airport Terminal Area Safety Efforts
Inefficient use of data.

Electronic Health Records - VA Needs to Identify and Report Existing System Costs
Difficulties after 30 years of decentralized development.

VA ACQUISITION MANAGEMENT: Supply Chain Management and COVID-19 Response
Pandemic points up weaknesses of procurement solutions.

2020

Broadband: Observations on Past and Ongoing Efforts to Expand Access and Improve Mapping Data
Successful broadband delivery with challenges.

GAO-20-701, COVID-19: Federal Efforts Could Be Strengthened by Timely and Concerted Actions
Overview of the response to the COVID-19.

AUTOMATED TECHNOLOGIES: DOT Should Take Steps to Ensure Its Workforce Has Skills Needed to Oversee Safety
Automated transportation holds promises, but also safety challenges.

2021

ARTIFICIAL INTELLIGENCE: An Accountability Framework for Federal Agencies and Other Entities
Auditor’s look at AI solutions.

2023

Information security
National Cybersecurity Strategy Needs to Address Information Sharing Performance Measures and Methods
Sharing information on cyber threats to critical infrastructure.

2024

Information security
CYBERSECURITY: Implementation of Executive Order Requirements Is Essential to Address Key Actions
Completing leadership and oversight requirements.

Information security
CRITICAL INFRASTRUCTURE PROTECTION: EPA Urgently Needs a Strategy to Address Cybersecurity Risks to Water and Wastewater Systems
The water sector faces increasing cybersecurity-related risks.

Artificial intelligence
Artificial Intelligence: Generative AI Technologies and Their Commercial Applications
Generative AI in Brief.

Information security
CRITICAL INFRASTRUCTURE PROTECTION: Agencies Need to Enhance Oversight of Ransomware Practices and Assess Federal Support
Ransomware - significant security challenge to critical infrastructure.

2025

Public e-services
ARTIFICIAL INTELLIGENCE: DHS Needs to Improve Risk Assessment Guidance for Critical Infrastructure Sectors
AI and security of critical infrastructure .

Public e-services
HEARING DETECTION AND INTERVENTION: Program Connects Deaf or Hard of Hearing Infants and Children to Services, but Actions Needed to Improve Access
Help, measure and analize.

Public e-services
Critical Actions Needed to Urgently Address IT Acquisition and Management Challenges
Urgent reforms needed for troubled IT investments.

Public e-services
DOD SATELLITE COMMUNICATIONS: Reporting on Progress Needed to Provide Insight on New Approach
SATCOM transition faces reporting gaps.