Internal controls (51 - 52 of 52 items)
Computers and Privacy: How the Government Obtains, Verifies, Uses, and Protects Personal Data
IMTEC-90-70BR: Published: Aug 3, 1990. Publicly Released: Aug 31, 1990.
Pursuant to a congressional request, GAO presented information on: (1) how federal agencies obtain, verify, use, and protect personal data; (2) how individuals are made aware of information collected about them; (3) what telecommunications and network facilities agencies' systems use to transmit data; and (4) what effect new technologies have on the sharing of personal data.GAO found that: (1) age...
Financial System: Federal Oversight of Computer Security Needs to Be Strengthened
T-IMTEC-90-2: Published: Feb 21, 1990. Publicly Released: Feb 21, 1990.
GAO discussed its examination of computer security and federal oversight over certain critical financial and banking computer systems. GAO noted that: (1) there were no instances of hacker or virus attacks on the systems; (2) all of the systems had internal control weaknesses that would allow undetected security intrusions; (3) two systems had security weaknesses that increased the operational sec...