How VA missed $213M in overpayments

The Veterans Affairs Department might have found as much as $213 million in additional overpayments during a recent internal audit if it had used better methodology and more objective risk assessments, according to a new report from VA’s Office of Inspector General.

Auditors reviewed VA’s “High-Dollar Overpayments Report” for the first quarter of fiscal 2010, which listed 101 overpayments totaling $1.1 million. The Veterans Benefits Administration reported 67 overpayments, while the Veterans Health Administration reported 34 overpayments. However, the IG’s staff found several areas in which reporting by VBA and VHA was incomplete or insufficient.

Specifically, auditors identified 143 overpayments totaling $623,434 that VBA did not include in its total, wrote Belinda Finn, VA’s assistant IG for audits and evaluations, in the report.


Related stories:

Auditors estimate $2.8B in improper payments at SSA, FEMA

Administration uses IT to cut improper payments


The lapses were primarily due to VBA misinterpreting White House guidance on how to define overpayment thresholds and not including some overpayments due to administrative errors, Finn wrote. The report recommends that those deficiencies be corrected, and VA officials generally agreed with the recommendation.

Furthermore, VBA might have missed an additional 39,208 incidents of potential overpayments totaling $213 million, also as a result of its misinterpretation of White House guidance, Finn wrote.

“We determined that these 39,208 overpayments met some of the criteria used in determining reportable high-dollar overpayments,” the report states. “VBA did not request sufficient information or conduct analysis to determine which overpayments met all of the criteria and should have been reported. This occurred because VA misinterpreted [the Office of Management and Budget’s] guidance on determining high-dollar overpayments.”

VBA did not apply thresholds accurately or report prior-period overpayments identified in the first quarter, overpayments caused by administrative errors or overpayments when documentation was insufficient to determine if high-dollar thresholds were met, the report states.

In addition, the audit discovered problems with VHA’s risk-assessment programs that suggest that additional improper payments are going unrecorded.

“We also found VHA’s fiscal 2009 risk assessment did not adequately assess the level of risk associated with their programs,” the report states. “VHA relied upon a self-assessment process that consisted of a checklist.” And that process appeared to be self-serving.

“Personnel who performed the self-assessments lacked objectivity,” the report states. “Financial assistance auditors stated the assessments resulted in extremely low error rates that did not reconcile with findings reported by independent audits.”

The report recommends that VHA improve its risk assessments, and officials agreed with the recommendation.

About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Tue, Aug 23, 2011

Its a government agency using taxpayers money. You should not be surprised that this kind of stuff happens when there is little incentive to be careful with how you spend.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group