FEMA needs better IT systems to cut risk of double-dipping, auditors say

FEMA needs better processes and IT systems to catch duplications

The Federal Emergency Management Agency is at high risk of paying duplicate benefits to disaster victims because of limitations in its business processes and information technology systems, according to a new audit  released by an inspector general.

The IG of FEMA's parent department, the Homeland Security Department, hired the KPMG LLP accounting firm to review $22.7 billion worth of disaster aid distributed by FEMA under the National Flood Insurance Program and in the Individuals and Households Program from August 2005 to August 2006, according to the report published Oct. 30.

Duplication of benefits can occur in several ways, including recipients of flood insurance also receiving homeowners’ insurance payments, or recipients of cash grants for housing also receiving government-supplied motel rooms, trailers or home repair funding.

Because of limitations in FEMA's IT systems, KPMG said it was not able to determine a specific amount of duplicate payments. For example, applicant data may be entered into one of several FEMA processing systems, which are not interconnected, and the result is significant data inconsistency.

However, KPMG auditors concluded that the risk of double-dipping is substantial.

“FEMA’s risk of paying duplicate benefits is high because of limitations in how FEMA’s business processes and systems collect and maintain disaster assistance data,” the audit states. “The process and system limitations reduce FEMA’s ability to operate sound management controls to identify and prevent duplicate payments.”

The auditors recommend that FEMA implement improved business processes and IT systems and correct data inconsistencies. FEMA officials agreed with the recommendations.

It is not the first time FEMA has been criticized for weak business controls. In April, DHS Inspector General Richard Skinner pointed out problems with FEMA's information security controls.

About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group