This is the accessible text file for GAO report number GAO-07-1246T 
entitled 'Veterans Affairs: Progress Made in Centralizing Information 
Technology Management, but Challenges Persist' which was released on 
September 19, 2007.

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov.

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately.

United States Government Accountability Office:
GAO: 
Testimony Before the Senate Committee on Veterans’ Affairs:

For Release on Delivery: 
Expected at 9:30 a.m. EDT Wednesday, September 19, 2007:

Veterans Affairs: 
Progress Made in Centralizing Information Technology Management, but 
Challenges Persist: 

Statement of Valerie C. Melvin, Director: 
Human Capital and Management Information Systems Issues:

GAO Highlights:

Highlights of GAO-07-1246T, a testimony before the Senate Committee on 
Veterans' Affairs.

Why GAO Did This Study:

The Department of Veterans Affairs (VA) depends on information 
technology (IT) to effectively serve our nation’s veterans, with an IT 
budget of about $1 billion annually. However, it has encountered 
numerous challenges in managing its IT programs and initiatives. To 
address these challenges, VA is realigning its IT organization and 
management to a centralized model founded on a defined set of improved 
management processes. Begun in October 2005, the realignment is planned 
to be complete by July 2008. 

In this testimony, GAO discusses its recent reporting on VA’s 
realignment effort and its management of other IT programs and 
initiatives, including ongoing systems development efforts and work to 
share electronic health information with the Department of Defense 
(DOD). To prepare this testimony, GAO reviewed its past work in these 
areas.

What GAO Found:

VA has made progress in moving to a centralized management structure 
for IT; however, at the time of GAO’s review in May 2007, the 
department had still to address certain critical success factors for 
transformation, and it had not yet institutionalized key IT management 
processes. VA’s plans for realigning the management of its IT program 
include elements of several of the six factors that GAO identified as 
critical for the department’s implementation of a centralized 
management structure, and it had fully addressed one factor—ensuring 
commitment from top leadership—having obtained the Secretary’s approval 
of the realignment and the new IT governance structure. However, as of 
May 2007, the department did not plan to address one of the critical 
success factors: dedicating an implementation team to manage change. 
Having such a team is important, since the implementation of the 
realignment is expected to continue until July 2008. Without a 
dedicated team, it is less likely that the implementation will be 
managed effectively. In addition, although the department had begun to 
take action to establish improved management processes—a cornerstone of 
the realignment—it had not made significant progress. As of May 2007, 
it had begun pilot testing 2 of 36 planned new processes. Until it 
institutionalizes key processes throughout the department, the full 
benefits of the realignment may not be realized. 

At the same time that it is implementing the realignment, VA is 
managing ongoing IT programs such as information security and inventory 
control, and it is continuing initiatives to develop IT systems. The 
department is managing these programs and initiatives using existing 
management processes, many of which display the long-standing 
weaknesses that VA aims to alleviate through its realignment. Some 
progress has been made: for example, the department took actions to 
improve controls over IT equipment, such as issuing several new 
policies to establish guidance and controls for information security, 
but because the realignment was not yet fully implemented, improved 
processes for inventory control had not been established. In addition, 
progress on the development of a modernized compensation and benefits 
system occurred after the project implemented improved management 
processes, which the department now plans to apply to all its IT 
projects. VA also achieved a milestone in the long-term effort to share 
electronic health information with DOD, having begun to exchange 
limited medical data with DOD (at selected sites) through an interface 
between the data repositories for the modern health information systems 
that each department is developing. To achieve their long-term vision, 
VA and DOD have much work still to do (such as extending the current 
capability throughout both departments), and the two departments have 
not yet projected a final completion date for the whole initiative. 
Further progress in VA’s IT programs and initiatives could be 
significantly aided by the improved processes that are the cornerstone 
of the realignment. Until these are fully implemented, the impact of 
the realignment on these programs and initiatives is uncertain. 

What GAO Recommends:

In the reports covered by this testimony, GAO made recommendations 
aimed at improving VA’s management of its IT programs and initiatives.

To view the full product, including the scope and methodology, click on 
[hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-07-1246T]. For more 
information, contact Valerie Melvin at (202) 512-6304 or 
melvinv@gao.gov.

[End of section]

Mr. Chairman and Members of the Committee:

I am pleased to participate in today's hearing on the information 
technology program of the Department of Veterans Affairs (VA). As you 
know, the department depends on information technology (IT) to 
effectively serve our nation's veterans, with an IT budget that amounts 
to about $1 billion annually. However, VA has encountered numerous 
challenges in managing its IT resources, as we have reported over the 
years. In our more recent reporting, we have identified challenges in 
security management, inventory control, project management, and other 
IT management processes.[Footnote 1] One factor contributing to the 
development of these challenges has been the department's management 
structure,[Footnote 2] which until recently was decentralized and gave 
the VA administrations[Footnote 3] and headquarters offices[Footnote 4] 
control over a majority of the department's IT budget.

In October 2005, VA initiated a realignment of its IT program to 
provide greater authority and accountability over its resources. The 
goals of the realignment were to centralize IT management under the 
department-level Chief Information Officer (CIO) and to standardize 
operations and development of systems across the department through the 
use of new management processes based on industry best practices. 
Completion of the realignment is scheduled for July 2008.

At your request, my testimony today will summarize our work on the 
department's efforts in moving to a centralized IT management model, 
which will affect all of VA's IT programs and initiatives. In this 
context, we will also discuss our recent work on:

* information security,

* inventory control over IT equipment,

* migrating existing ("legacy") benefits systems to modern platforms, 
and:

* sharing electronic health information with the Department of Defense 
(DOD) and the prognosis for a DOD/VA bidirectional interoperable 
electronic health record.

* In developing this testimony, we reviewed our previous work in these 
areas. All work covered in this testimony was performed in accordance 
with generally accepted government auditing standards.

Results in Brief:

* VA has made progress in moving to a centralized management structure 
for IT; however, at the time of our review in May 2007, it had still to 
address some critical success factors for transformation, and it had 
not yet institutionalized key IT management processes.[Footnote 5] The 
department's plans for realigning the management of its IT program 
include elements of several of the six factors that we identified as 
critical for its implementation of a centralized management structure. 
However, as of May 2007, VA did not plan to address one of the critical 
success factors: dedicating an implementation team to manage change. 
Having such a team is important at this stage, because the realignment 
is not expected to be completed until July 2008. Without a team 
dedicated to managing the realignment, it is less likely that the 
department will be able to ensure that the realignment is managed 
effectively throughout its implementation. In addition, although the 
department had begun to take action to establish improved IT management 
processes--a cornerstone of the realignment--it had not made 
significant progress at the time of our report. As of May 2007, it had 
begun pilot testing 2 of 36 planned new processes. Until it 
institutionalizes key management processes throughout the department, 
the full benefits of the realignment may not be realized.

* In the meantime, VA is undertaking a number of programs and 
initiatives that depend on the effective management and use of IT 
resources. The department has made progress in its programs and 
initiatives, but much work remains.

* In a September 2007 report, we state that although VA has made 
progress in addressing security weaknesses, it has not yet fully 
implemented key recommendations to strengthen its information security 
practices.[Footnote 6] In addition, although the management structure 
for information security has changed under the realignment, improved 
security management processes have not yet been completely developed 
and implemented, and responsibility for the department's information 
security functions is divided between two organizations, with no 
documented process for the two offices to coordinate with each other.

* With regard to the department's IT inventory control, we reported 
recently that a weak overall control environment for IT equipment at 
four audited locations posed a significant security vulnerability to 
the nation's veterans with regard to sensitive data maintained on this 
equipment.[Footnote 7] VA had taken some actions to improve controls 
over IT equipment, such as issuing several new policies to establish 
guidance and controls for information security. In addition, the 
organizational realignment had begun, but as it was not yet fully 
implemented, improved processes for inventory control had not been 
established.

* VBA has been pursuing efforts to migrate benefits processing from its 
aging legacy system and develop modernized replacement 
systems.[Footnote 8] We reported that two initiatives (one on 
compensation and pension payments and another on education benefits) 
had both been hindered by project management weaknesses and in 
particular the lack of integrated project plans. In April 2007, we 
reported that the compensation and pension replacement project had 
improved its management processes and made progress; VA concurred with 
our recommendation that the improved processes be incorporated into 
specific policy and guidance for all IT projects in the department. 
Such processes could benefit the education benefits project: when we 
reported in July 2007, the initiative had achieved some enhancements in 
claims processing, but the absence of an integrated project plan meant 
that critical elements were missing for effectively guiding the project 
to completion, such as an overall approach for coordinating various 
improvement initiatives.

* As we testified in May 2007, VA and DOD have made progress in both 
long-and short-term initiatives to share health information, but much 
work remains to achieve the goal of a shared electronic medical record 
and seamless transition between the two departments.[Footnote 9]

* Under their long-term initiative, the departments had begun to 
exchange limited medical data (at selected sites) through an interface 
between the data repositories for the modern health information systems 
that each department is developing. Although implementing this 
interface is a milestone toward the departments' long-term goal, VA and 
DOD must still extend the current capability throughout both 
departments, finish developing their two modernized systems, and 
transition from their existing systems.[Footnote 10] The departments 
have not yet projected a final completion date for the whole initiative.

* In their near-term efforts, the departments have completed a system 
for one-way transfer of health information from DOD to VA when service 
members leave the military, and they are conducting demonstration 
projects to exchange limited data at selected sites. The departments 
have also established ad hoc processes (such as scanning paper records) 
to meet the immediate need to provide data on severely wounded service 
members to VA's polytrauma centers.

These multiple initiatives and ad hoc processes highlight the need for 
a project plan that integrates both long-and short-term initiatives. 
Without such a plan, it remains unclear how all the initiatives are to 
be incorporated into an overall strategy focused on achieving the 
departments' goal of comprehensive, seamless exchange of health 
information.

In the reports covered by this testimony, we have made numerous 
recommendations aimed at improving the department's management of its 
IT programs and initiatives. VA has agreed with these recommendations 
and has taken action or plans to take action to implement them. If this 
implementation is properly executed, it could help the department to 
realize the expected benefits of the realignment, as well as the aims 
of its programs and initiatives.

Background:

VA's mission is to promote the health, welfare, and dignity of all 
veterans in recognition of their service to the nation by ensuring that 
they receive medical care, benefits, social support, and lasting 
memorials. Its three major components, the Veterans Benefits 
Administration (VBA), the Veterans Health Administration (VHA), and the 
National Cemetery Administration, are primarily responsible for 
carrying out this mission. Over time, the use of IT has become 
increasingly crucial to the department's effort to provide benefits and 
services. VA relies on its systems for providing access to medical 
information to ensure high-quality health care for veterans as well as 
for processing benefit claims, including compensation and pension and 
education benefits.

In reporting on VA's IT management over the past several years, we have 
highlighted challenges the department has faced in achieving its vision 
of creating "One VA"--that is, integrating IT resources to enable 
department employees to help veterans obtain services and information 
more quickly and effectively. One major challenge was that the 
department's information systems and services were highly decentralized 
and that its administrations controlled a majority of the IT 
budget.[Footnote 11] As we have previously pointed out, it is crucial 
for the department CIO to ensure that well-established and integrated 
processes for leading, managing, and controlling investments are 
followed throughout the department. Similarly, a contractor's 
assessment of VA's IT organizational alignment, issued in February 
2005, noted the lack of control over how and when money is 
spent.[Footnote 12] The assessment found that project managers within 
the administrations had the ability to shift money to support 
individual projects. Also, according to the assessment, the focus of 
department-level management was only on reporting expenditures to the 
Office of Management and Budget and Congress, rather than on managing 
these expenditures within the department.

VA Is Transforming its IT Organization to a Centralized Model:

In response to the challenges that we and others noted, the department 
officially began its effort to provide the CIO with greater authority 
over IT in October 2005. At that time, the Secretary issued an 
executive decision memorandum granting approval for the development of 
a new IT management structure for the department. According to VA, its 
goals in moving to centralized management are to provide the department 
better oversight over the standardization, compatibility, and 
interoperability of IT systems, as well as better overall fiscal 
discipline for the budget. By July 2006, the department's realignment 
contractor began work to assist with the realignment effort.

In February 2007, the Secretary approved the department's new 
organization structure, which includes the Assistant Secretary for 
Information and Technology, who serves as VA's CIO. As shown in figure 
1, the CIO is supported by a Principal Deputy Assistant Secretary and 
five Deputy Assistant Secretaries--new senior leadership positions 
created to assist the CIO in overseeing functions such as cyber 
security, IT portfolio management, systems development, and IT 
operations.

Figure 1: Organizational Chart for VA Office of Information and 
Technology:

[See PDF for image]

Source: VA.
Note: DAS = Deputy Assistant Secretary.

[End of figure]

In April 2007, the Secretary approved a governance plan that is 
intended to enable the Office of Information and Technology to 
centralize its decision making. The plan describes the relationship 
between IT governance and departmental governance and the approach the 
department intends to take to enhance governance.

VA's Realignment Depends on Establishing Standardized IT Management 
Processes:

As the foundation for its realignment, VA plans to implement improved 
management processes in five key areas: enterprise management, business 
management, business application management, infrastructure, and 
service support. The particular management processes, recommended by 
the department's realignment contractor, were based on industry best 
practices[Footnote 13] and encompass all areas of IT management, such 
as those necessary for effective IT programs (such as security 
management and asset management processes) and IT initiatives (such as 
risk management and project management processes). In attachment 1, we 
provide brief descriptions of the 36 IT management processes to be 
addressed in VA's realignment.

According to the contractor, establishing improved management processes 
and standardizing these processes across the department are essential 
to the effectiveness of the centralized management model. By 
implementing these improved processes, VA expects to correct 
deficiencies it has encountered as a result of its decentralized 
management approach. Proper implementation should result in 
institutionalizing best management practices that will be sustained 
regardless of future leadership changes at the department. According to 
the contractor, with a system of defined management processes, the 
Office of Information and Technology could quickly and accurately 
change the way IT supports the department. The contractor also noted 
that failure to include such processes in the realignment would 
introduce the risk that any progress in completing the realignment 
would be the result of trial and error.

Successful Organization Transformations Are Based on Critical Success 
Factors:

We have reported in the past[Footnote 14] on key factors that are 
needed in order to successfully transform an organization to be more 
results oriented, customer focused, and collaborative in nature. We 
reported that large-scale change management initiatives are not simple 
endeavors and require the concentrated efforts of both leadership and 
employees to realize intended synergies and to accomplish new 
organizational goals. We also noted that there are a number of key 
practices that can serve as the basis for federal agencies to transform 
their cultures in response to governance challenges, such as those that 
an organization like VA might face when transforming to a centralized 
IT management structure. Among the significant factors we identified as 
critical for ensuring the success of VA's move to centralized 
management are:

* ensuring commitment from top leadership,

* establishing a governance structure to manage resources,

* linking the IT strategic plan to the organization strategic plan,

* using workforce strategic management to identify proper roles for all 
employees,

* communicating change to all stakeholders, and:

* dedicating an implementation team to manage change.

Successful Implementation of the Realignment Effort Requires Continued 
Focus on Critical Success Factors and Implementation of Improved 
Management Processes:

In our recent review of the department's effort to realign its IT 
program, we evaluated, among other things, whether the realignment plan 
includes the critical factors for successful transformation as 
discussed above.[Footnote 15] We reported that VA's realignment plan 
included elements of several of the six critical success factors that 
we identified. However, VA had not fully addressed all six factors. 
Only one factor had been fully addressed; additional work remained on 
the other five factors, as shown in table 1.

Table 1: Summary of VA's Actions Addressing Critical Success Factors as 
of May 2007:

Critical success factor: Ensuring commitment from top leadership; 
Addressed: Yes; 
Progress: Secretary approved the new IT organization structure and the 
transfer of employees.

Critical success factor: Establishing a governance structure to manage 
resources; 
Addressed: Partially; 
Progress: Secretary approved the IT governance plan, but VA has not 
established IT governance boards or process descriptions for centrally 
managing IT.

Critical success factor: 
Linking IT strategic plan to organization strategic plan; 
Addressed: No; 
Progress: VA has not yet updated its IT strategic plan to reflect the 
new organization, but it has established a date by which it intends to 
update the plan.

Critical success factor: Using workforce strategic management to 
identify proper roles for all employees; 
Addressed: Partially; 
Progress: VA has identified workforce management responsibilities, but 
it has not established a knowledge and skills inventory.

Critical success factor: Communicating change to all stakeholders; 
Addressed: Partially; 
Progress: VA has addressed staff concerns about the realignment through 
memorandums and conferences, but it has not fully staffed offices that 
will facilitate communication.

Critical success factor: Dedicating an implementation team to manage 
change; 
Addressed: No; 
Progress: VA does not plan to establish a realignment implementation 
team.

Source: GAO.

[End of table]

The department had fully addressed the first critical success factor, 
ensuring commitment from top leadership, as demonstrated by the 
Secretary's actions in support of the realignment. Besides approving 
the transfer of personnel to the centralized office, the Secretary 
approved in February 2007 a new organization structure for centralized 
IT management.

Since undertaking the realignment, VA concentrated its efforts on 
transferring approximately 6,000 staff to the CIO's office from the 
administrations and staff offices and on creating the new centralized 
organizational structure. As shown in the table, VA had begun or 
planned to begin actions on four other critical success factors, but it 
had not completed the actions. For example, the department approved its 
governance plan to address how the Office of Information and Technology 
will manage resources; however, it had not yet established the boards 
that are to provide governance over the centralized structure. In 
addition, although the department had identified the responsibilities 
for managing its workforce within its new structure, it had not yet 
established a knowledge and skills inventory to help determine the 
proper roles for all employees in the new organization.

VA had neither addressed nor planned to address the last critical 
success factor: dedicating an implementation team to manage change. 
Although it had highlighted the importance of managing change in its 
realignment documentation, VA did not plan to establish a realignment 
implementation team. As we have pointed out,[Footnote 16] a dedicated 
implementation team that is responsible for the day-to-day management 
of a major change initiative is critical to ensure that the project 
receives the focused, full-time attention needed to be sustained and 
successful. Specifically, the implementation team is important to 
ensuring that various change initiatives are implemented in a coherent 
and integrated way. The team must have the necessary authority and 
resources to set priorities, make timely decisions, and move quickly to 
implement the transformation. In addition, the implementation team can 
assist in tracking implementation goals for a change initiative and 
identifying performance shortfalls or schedule slippages. It is 
important for the team to use performance metrics to provide a succinct 
and concrete statement of expected performance versus actual 
performance. Because of its close involvement with the change 
initiative, the implementation team can also suggest corrections to 
remedy any problems.

The department had not addressed this critical success factor: it had 
not dedicated an implementation team to manage the realignment effort 
and track its progress. At the conclusion of our review in June 2007, 
staff from the IT realignment office, which was responsible for 
overseeing the realignment, had been reassigned to other areas of 
responsibility within the department's new structure. In addition, the 
Director of the Realignment Office told us that multiple offices would 
assume responsibility for managing the realignment through July 2008: 
the Office of Quality and Performance Management would oversee process 
implementation across the Office of Information and Technology, and the 
Office of Oversight and Compliance Management would assess whether the 
department is complying with the new processes. However, there was no 
one group responsible for managing the realignment in its entirety. 
Without such a dedicated group, it is less likely that VA will be able 
to ensure that the realignment is managed effectively throughout its 
implementation.

With regard to the new IT management processes, the department had 
begun to take action, but it had not made significant progress at the 
time of our report. The department had planned to begin implementing 9 
of the 36 new processes in March 2007. However, the department had 
missed key implementation dates for these processes. As of May 2007, it 
had begun pilot testing two of the new processes: the risk management 
process and the solution (that is, business application) test and 
acceptance process.

Thus, although the department had taken positive steps in moving to 
centralized IT management, it had much more work to complete before the 
realignment can be considered finished and a success. If VA does not 
continue to address the critical success factors we identified and 
develop and implement the new management processes by their target 
date, the department may continue to operate in a decentralized manner 
and risk not fully realizing the long-term benefits of the realignment.

Accordingly, we recommended that the department dedicate an 
implementation team responsible for change management throughout the 
transformation and that it develop detailed IT governance process 
descriptions that identify how IT resources will be managed in the 
centralized organization. We also made seven additional recommendations 
aimed at ensuring that the realignment is successfully accomplished. 
The department generally concurred with our recommendations and stated 
that it has taken action or has actions under way to address each of 
our recommendations.

Improved Processes Planned under the Realignment Are Not Yet in Place 
for IT Programs and Initiatives:

Although IT management has been centralized under the CIO, at the time 
of our review, IT programs and initiatives continued to be managed 
under previously established processes. The key processes to be used as 
the foundation for the realignment had not yet had an impact on IT 
programs (specifically, security and inventory management) or 
initiatives (such as VBA's modernization efforts and VHA's initiatives 
on sharing medical data with DOD).

Sustained Management Commitment and Oversight Are Vital to Resolving 
Long-Standing Security Weaknesses:

As mandated by the Federal Information Security Management Act (FISMA) 
of 2002,[Footnote 17] every agency is to establish an information 
security program. In addition, security management is a key management 
process that under the realignment is to be established uniformly 
across the department. VA's IT systems contain sensitive information 
that is vulnerable to inadvertent or deliberate misuse, loss, or 
improper disclosure.

This vulnerability was highlighted by an incident in May 2006, when VA 
announced that computer equipment containing personally identifiable 
information[Footnote 18] on approximately 26.5 million veterans and 
active duty members of the military was stolen from the home of a VA 
employee. Until the equipment was recovered, veterans did not know 
whether their information was likely to be misused.

In a September 2007 report, we state that although VA has made progress 
in addressing security weaknesses, it has not yet fully implemented key 
recommendations to strengthen its information security 
practices.[Footnote 19] It has implemented 2 of our 4 previous 
recommendations and only 2 of the 22 recommendations made by the 
department's inspector general (IG). Among those recommendations not 
implemented are our recommendation that it complete a comprehensive 
security management program and an IG recommendation to strengthen 
critical infrastructure planning to ensure that information security 
requirements are addressed. Because these recommendations have not yet 
been implemented, the department will be at increased risk that 
personal information of veterans and other individuals, such as medical 
providers, may be exposed to data tampering, fraud, and inappropriate 
disclosure.

Our report describes several major initiatives that VA has begun or 
continued since the May 2006 security incident, in efforts to 
strengthen information security practices and secure personal 
information within the department. Among these initiatives are the 
department's efforts to reorganize its management structure to provide 
better oversight and fiscal discipline over its IT systems.[Footnote 20]

Establishing an effective IT management structure is the starting point 
for coordinating and communicating the continuous cycle of information 
security activities necessary to address current risks on an ongoing 
basis while providing guidance and oversight for the security of the 
entity as a whole. Under FISMA and the Veterans Benefits, Health Care, 
and Information Technology Act of 2006, the CIO ensures compliance with 
requirements of these laws and designates a chief information security 
officer (CISO) to assist in carrying out his responsibilities. One 
mechanism organizations can adopt to achieve effective coordination and 
communication is to establish a central security management office or 
group to coordinate departmentwide security-related 
activities.[Footnote 21] To ensure that information security activities 
are effective across an organization, the management structure should 
also include clearly defined roles and responsibilities for all 
security staff and coordination of responsibilities among individual 
staff.

Under the realignment, the management structure for information 
security has changed, but improved security management processes have 
not yet been completely developed and implemented. In particular, under 
the new structure, responsibility for information security functions 
within the department is divided between two organizations (see fig. 
2), but no documented process yet exists for the two responsible 
offices to coordinate with each other in managing and implementing the 
departmentwide security program.

Figure 2: Security Functions in New Office of Information and 
Technology Structure:

[See PDF for image]

Source: VA.

Note: DAS = Deputy Assistant Secretary.

[End of figure]

Under the new organization, the Director of the Cyber Security Office 
(who is also the department's designated CISO)[Footnote 22] has 
responsibility for developing and maintaining a departmentwide security 
program, among other things. However, the Director of the Field 
Operations and Security Office is responsible for implementing the 
program. Although VA officials indicated that these officials are 
communicating about the department's implementation of security 
policies and procedures, this communication is not defined as a role or 
responsibility for either position in the new management organization 
book, nor is there a documented process in place to coordinate the 
management and implementation of the security program. Both of these 
activities are key security management practices. Without a documented 
process, policies or procedures could be inconsistently implemented 
throughout the department, which could prevent the CISO from 
effectively ensuring departmentwide compliance with FISMA. In addition, 
without a defined process and responsibilities, VA will have limited 
assurance that the management and implementation of security policies 
and procedures are effectively coordinated and communicated. Developing 
and documenting these policies and procedures are essential for 
achieving an improved and effective security management process under 
the new centralized management model.

Accordingly, among the actions we recommended to the department was to 
document clearly defined coordination responsibilities for the Director 
of Field Operations and Security and the Director of Cyber Security, as 
well as to develop and implement a process for these officials to 
coordinate on the implementation of IT security policies and procedures 
throughout the department. We also made 15 other recommendations to 
improve the department's ability to protect its information and 
systems, including the development of various processes and procedures 
to ensure that tasks in the department's security action plans have 
time frames for implementation. VA generally agreed with our 
recommendations and stated that it had already implemented some of the 
recommendations and had actions under way to address the others.

Inadequate Controls over IT Equipment at Selected VA Locations Pose 
Continuing Risk of Theft, Loss, and Misappropriation:

In light of reported weaknesses in VA inventory controls and reported 
thefts of laptop computers and data breaches, the adequacy of such 
controls has been an ongoing concern. In July 2007, we reported and 
testified on an assessment of the risk of theft, loss, or 
misappropriation of IT equipment at selected VA medical 
centers.[Footnote 23] Our assessment found that a weak overall control 
environment for IT equipment at the four locations we audited posed a 
significant security vulnerability to the nation's veterans with regard 
to sensitive data maintained on this equipment. According to our 
Standards for Internal Control in the Federal Government, agencies are 
required to establish physical controls to safeguard vulnerable assets, 
such as IT equipment, which might be vulnerable to risk of loss; in 
addition, federal records management law requires federal agencies to 
record essential transactions. However, we reported in July that 
current VA property management policy does not provide guidance for 
creating records of inventory transactions as changes occur. Also, 
policies requiring annual inventories of sensitive items (such as IT 
equipment), adequate physical security, and immediate reporting of lost 
and missing items had not been enforced.

Our statistical tests of physical inventory controls at the four 
locations identified a total of 123 missing IT equipment items, 
including 53 computers that could have stored sensitive data. The lack 
of user-level accountability and inaccurate records on status, 
location, and item descriptions make it difficult to determine the 
extent to which actual theft, loss, or misappropriation may have 
occurred without detection. Table 2 summarizes the results of our 
statistical tests at each location.

Table 2: Current IT Inventory Control Failures at Four Test Locations:

Control failures: Missing items; 
Washington, D.C., medical center: 28%; 
Indianapolis, medical center: 6%; 
San Diego, medical center: 10%; 
VA HQ offices: 11%.

Control failures: Incorrect user organization; 
Washington, D.C., medical center: 80%; 
Indianapolis, medical center: 69%; 
San Diego, medical center: 70%; 
VA HQ offices: 11%.

Control failures: Incorrect location; 
Washington, D.C., medical center: 57%; 
Indianapolis, medical center: 23%; 
San Diego, medical center: 53%; 
VA HQ offices: 44%.

Control failures: Recordkeeping errors; 
Washington, D.C., medical center: 5%; 
Indianapolis, medical center: 0%; 
San Diego, medical center: 5%; 
VA HQ offices: 3%.

Source: GAO analysis.

Note: Each of these estimates has a margin of error, based on a two- 
sided, 95 percent confidence interval, of ±10 percent or less.

[End of table]

We also found that the four VA locations had reported over 2,400 
missing IT equipment items, valued at about $6.4 million, identified 
during physical inventories performed in fiscal years 2005 and 2006. 
Missing items were often not reported for several months and, in some 
cases, several years. It is very difficult to investigate these losses 
because information on specific events and circumstances at the time of 
the losses is not known. Further, our limited tests of computer hard 
drives in the excess property disposal process found hard drives at two 
of the four case study locations that contained personal information, 
including veterans' names and Social Security numbers. Our tests did 
not find any remaining data after sanitization procedures were 
performed.[Footnote 24] However, weaknesses in physical security at IT 
storage locations and delays in completing the data sanitization 
process heighten the risk of data breach.

Although VA had taken some actions to improve controls over IT 
equipment (such as issuing several new policies to establish guidance 
and controls for IT security) and had reorganized and centralized the 
IT function within the department under the CIO, we reported that these 
actions had not yet been fully implemented. The new CIO organization 
had no formal responsibility for medical equipment that stored or 
processed patient data and did not address roles or necessary 
coordination between information resource management and property 
management personnel with regard to inventory control of IT equipment. 
The Assistant Secretary for Information and Technology, who serves as 
the CIO, told us that the new CIO organization structure will include a 
unit that will have responsibility for IT equipment asset management 
once it becomes operational. However, at the time of our report, this 
unit had not yet been funded or staffed. To ensure accountability and 
safeguarding of sensitive IT equipment, effective implementation will 
be key to the success of the department's IT policy and organizational 
changes.

We made 12 recommendations for actions to be taken by the department to 
help minimize the risk of loss, theft, and misappropriation of 
government IT equipment used in VA operations. The recommendations 
included establishing policies and procedures that require, among other 
things, recording inventory transactions and establishing specific, 
individual user-level accountability. VA management generally agreed 
with our findings and concurred with all 12 recommendations, noting 
that it had actions planned or under way to address them.

Challenges Persist for Efforts to Migrate from the Aging Benefits 
Delivery Network:

To administer various benefits programs, VBA relies on an aging system, 
the Benefits Delivery Network (BDN). The BDN, which has been in 
operation for more than 40 years, is based on antiquated software 
programs, which have become increasingly difficult and costly to 
maintain. VBA is in the process of replacing the BDN with a faster, 
more flexible, and higher capacity system.

Replacing the BDN has been a focus of systems development efforts at 
VBA since 1986.[Footnote 25] VBA currently depends on the BDN to 
administer programs for three types of benefits: (1) compensation and 
pension, (2) education, and (3) vocational rehabilitation and 
employment (VRE) services.[Footnote 26] Originally, the administration 
planned to modernize the entire system, but after experiencing numerous 
false starts and spending approximately $300 million on the overall 
modernization of the BDN, VBA revised its strategy in 1996. First, it 
narrowed its focus to replacing only those functionalities that support 
the compensation and pension program, and began developing a 
replacement system, which it generally refers to as the Veterans 
Service Network (VETSNET).[Footnote 27] Then, in December 1999, it 
began an initiative, The Education Expert System (TEES), to move its 
education claims processing systems from the BDN to new technology 
platforms and a new architecture, as a way to improve its education 
benefits delivery services. (We have not evaluated the VRE program or 
possible plans to migrate VRE operations from the BDN.)

Progress Made in Long-Term Effort to Replace Benefits Payment System, 
but Challenges Persist:

When VBA began the VETSNET project in 1996, it planned to complete the 
replacement system in May 1998 at an estimated cost of $8 million. 
However, over the years, VBA encountered numerous problems in 
completing the replacement system. We have reported on this topic 
several times, making numerous recommendations.[Footnote 28] Although 
VA concurred with our recommendations and took several actions to 
address them, its actions were not sufficient to implement all our 
recommendations or establish the program on a solid footing: certain 
basic requirements of sound project management, such as an integrated 
project plan for the replacement system, continued to be lacking.

In 2005, because of concerns about continuing problems with the 
replacement project, VA contracted for an independent assessment of the 
department's options for the project, including whether the project 
should be terminated. This assessment, conducted by the Carnegie Mellon 
Software Engineering Institute (SEI), concluded that the replacement 
project faced many risks arising from management and organizational 
issues, but no technical barriers that could not be overcome.[Footnote 
29] According to SEI, a new system was still needed, and VBA would not 
be able to successfully deliver a full, workable solution unless it 
addressed its management and organizational weaknesses. SEI recommended 
that VBA continue to work on the project at a reduced pace, while 
taking an aggressive approach to addressing the identified weaknesses.

We reported in April 2007[Footnote 30] that VBA was generally following 
the course of action recommended by SEI: it was continuing to work on 
the replacement initiative at a slower pace, while taking action to 
address identified weaknesses in overall management and software 
development processes. For example, VBA established a new governance 
structure, and it took steps to improve its software development 
processes, such as establishing risk and requirements management 
processes. However, some processes had not been addressed, such as 
capacity planning and management, which will be important for ensuring 
that further development does not lead to processing slowdowns. 
Further, VBA had not yet documented policies and procedures to 
institutionalize all the process improvements that it made on the 
replacement initiative, having first concentrated its efforts on 
establishing the governance and building the organization. If VBA does 
not institutionalize these improvements, it increases the risk that 
they may not be maintained through the life of the project or be 
available for application to other development initiatives.

As of April 2007, VBA had developed critical functionalities needed to 
process and pay certain original compensation claims using the 
replacement system. According to VBA officials, all five of the major 
software applications that make up the new system were being used in 
VA's regional offices to establish and process new compensation claims 
for veterans. In April 2007, the replacement system was providing 
monthly compensation payments to almost 50,000 veterans (out of about 3 
million veterans who receive such payments). Nonetheless, the system 
requires further development, and VBA still faces the substantial task 
of converting records for the approximately 3.5 million beneficiaries 
on the BDN to the replacement system.

Under the realignment, the responsibility for all system development 
projects has moved from VBA to the central CIO organization: 
specifically, the Deputy Assistant Secretary for Enterprise 
Development. Thus, this official is now responsible for completing the 
development and implementation of VETSNET. Accordingly, we recommended 
that the CIO document and incorporate the improved processes for 
managing risks, requirements, and defects into specific policy and 
guidance for the replacement initiative and for future use throughout 
VBA. VA concurred with our recommendation and stated that the VETSNET 
project management processes will be incorporated into a set of 
standard project management policies, processes, and procedures for all 
IT projects in VA. Further, the CIO has identified the VETSNET 
governance model as the model for all VA enterprisewide IT projects, 
and it is being implemented in other VA priority IT development 
programs.

In addition, we made five other recommendations aimed at sustaining the 
improved management and software development processes currently being 
used by VETSNET project management, including processes for capacity 
planning and management. The Secretary also agreed with these 
recommendations and described actions planned in response.

Improved Planning Needed to Guide Development and Implementation of 
Education Benefits System:

The Education Expert System (or TEES) effort aims to replace the 
existing education benefits systems on the BDN with a new rules-based 
system that will add more automated capabilities, eliminate most human 
intervention, and enable faster and more accurate processing of 
education claims. When it began the initiative, VBA had planned to 
complete the new system by September 2005; however, in 2004, the 
department refocused and rebaselined the system's development effort. 
VA currently estimates that the TEES initiative will be completed by 
2011.

When we reported on this matter in July 2007, VBA had enhanced 
education benefits claims processing by developing certain 
functionalities to allow information to be captured in an electronic 
format.[Footnote 31] For example, it had developed automated systems 
that allow (1) education institutions to provide online enrollment 
certifications, (2) students to provide online and telephonic 
verification of enrollment, and (3) the public to inquire about 
approved academic programs, licensing and certification programs, and 
national exams. However, although VBA had identified other initiatives 
as necessary to complete the new system and eliminate most human 
intervention, it had not taken action on these initiatives, which 
included moving the processing and payment functionality used for many 
education claims from the BDN to new technology.

Contributing to our concerns was that VBA did not have an integrated 
project plan for the TEES initiative. According to agency officials, 
the plan that had been developed in 2001 has not been updated since 
2004, when program goals were modified. Because VBA did not have an 
integrated project management plan, it lacked critical elements needed 
to effectively guide the initiative to completion (such as a full 
description of the scope of the system development efforts) and an 
overall approach for coordinating its various education claims 
initiatives (such as the BDN code conversion effort). Without these 
critical elements, the department would be at risk of wasting millions 
of dollars on education claims processing initiatives that may overlap 
or be duplicative.

One reason for this management weakness is the lack of well-defined IT 
management processes across VA, which is to be addressed by the 
realignment. Under the realignment, the responsibility for TEES, like 
other system development projects, has moved from VBA to the Deputy 
Assistant Secretary for Enterprise Development, who is part of the 
central CIO organization. At the time of our report, the TEES project 
had not yet been affected by VA's stated intention of incorporating the 
VETSNET project management processes into a set of standard project 
management policies, processes, and procedures for all IT projects in 
the department. Establishing improved IT management processes is vital 
to ensuring effective project management and thus the future 
development and implementation of TEES.

To ensure the successful implementation of TEES, we made three 
recommendations aimed at ensuring that a comprehensive, integrated 
project plan to coordinate and manage the initiative would be 
developed. VA concurred with our recommendations and described actions 
planned to address them.

VA Is Making Progress in Sharing Medical Information with DOD, but the 
Two Departments Are Far from Comprehensive Electronic Medical Records:

For almost 10 years, VA and DOD have been engaged in multiple efforts 
to share electronic medical information, which is important in helping 
to ensure that active-duty military personnel and veterans receive high-
quality health care. These include efforts focused on the long- term 
vision of a single "comprehensive, lifelong medical record for each 
service member"[Footnote 32] that would allow a seamless transition 
between the two departments, as well as more near-term efforts to meet 
immediate needs to exchange health information, including responding to 
current military crises.

As we testified in May 2007, VA and DOD have made progress in sharing 
health information, but much work remains to achieve the goal of a 
shared electronic medical record and seamless transition between the 
two departments.[Footnote 33] In their long-term initiatives, each 
department is developing its own modern health information system to 
replace its legacy systems, and they are collaborating on a program to 
develop an interface to enable these modernized systems to share data 
and ultimately to have interoperable[Footnote 34] electronic medical 
records. Unlike the legacy systems, the modernized systems are to be 
based on computable data: that is, the data are to be in a format that 
a computer application can act on, for example, to provide alerts to 
clinicians (of such things as drug allergies) or to plot graphs of 
changes in vital signs such as blood pressure. According to the 
departments, such computable data contribute significantly to patient 
safety and the usefulness of electronic medical records.

At the time of our testimony, the departments had begun to implement 
the first release of the interface between their modernized data 
repositories, and computable outpatient pharmacy and drug allergy data 
were being exchanged at seven VA and DOD sites. Although the data being 
exchanged were limited, implementing this interface is a milestone 
toward the long-term goal of modernized systems with interoperable 
electronic medical records.

While working on this long-term effort, the two departments also made 
progress in various near-term initiatives to exchange electronic 
medical information in their existing systems. The departments 
completed development of a system to allow the one-way transfer of 
health information from DOD to VA when service members leave the 
military. DOD has been using this system (the Federal Health 
Information Exchange or FHIE) to transfer information to VA since 2002. 
According to department officials, as of March 2007, over 184 million 
clinical messages on more than 3.8 million veterans had been 
transferred to the FHIE data repository, and VA had been given access 
to data for more than 681,000 separated service members and demobilized 
Reserve and National Guard members who had been deployed. Transfers are 
done in batches once a month, or weekly for veterans who have been 
referred to VA treatment facilities. According to a joint DOD/VA 
report,[Footnote 35] FHIE has made a significant contribution to the 
delivery and continuity of care of separated service members as they 
transition to veteran status, as well as to the adjudication of 
disability claims.

In addition, two ongoing demonstration projects were successfully 
exchanging particular types of data at selected sites:

* The Laboratory Data Sharing Interface allows DOD and VA facilities 
serving the same geographic area to share laboratory resources. As of 
May 2007, this capability had been deployed at 9 localities to 
communicate orders for lab tests and their results electronically and 
could be deployed at others if the need is demonstrated.

* The Bidirectional Health Information Exchange allows a real-time, two-
way view of health data from existing systems.[Footnote 36] As of May 
2007, this system provided this capability (for outpatient data) to all 
VA sites and 25 DOD sites and (for certain inpatient discharge summary 
data)[Footnote 37] to all VA sites and 5 DOD sites. Expanding this 
interface is the foundation of the departments' interim strategy to 
share information among their existing systems.

The two departments had also undertaken ad hoc activities to accelerate 
the transmission of health information on severely wounded patients 
from DOD to VA's four polytrauma centers. These centers care for 
veterans and service members with disabling injuries to more than one 
physical region or organ system. The ad hoc processes include manual 
workarounds such as scanning paper records and individually 
transmitting radiological images. Such processes were generally 
feasible only because the number of polytrauma patients was small 
(about 350 in all as of May 2007).

Through all these efforts, VA and DOD have achieved exchanges of health 
information. However, these exchanges are as yet limited, and it is not 
clear how they are to be integrated into an overall strategy toward 
achieving the departments' long-term goal of comprehensive, seamless 
exchange of health information. Significant work remains to be done for 
the departments to achieve their long-term goals, including agreeing to 
standards for the remaining categories of medical information, 
populating the data repositories with all this information, completing 
the development of their modernized systems, and transitioning from the 
legacy systems. In addition, the departments have not yet projected a 
completion date for the project as a whole. Consequently, it is 
essential for the departments to develop a comprehensive project plan 
to guide this effort to completion. In previous work, we have made 
numerous recommendations with regard to this effort, placing particular 
stress on the need for comprehensive planning.[Footnote 38] VA and DOD 
have agreed with our recommendations, and have taken action to 
implement them. However, at the time of our May testimony, the two 
departments had not yet developed a comprehensive integrated project 
plan.

The need for such a comprehensive plan is further highlighted by the 
strategy announced by the two departments in January 2007: that is, to 
jointly develop a new inpatient medical record system. The departments 
have indicated that by adopting a joint solution, they could realize 
significant cost savings and make inpatient health care data 
immediately accessible to both departments. Incorporating this new 
strategy into the departments' ongoing efforts would be greatly 
facilitated by a comprehensive project plan.

In summary, effectively instituting the realignment is essential to 
ensuring that its IT programs achieve their objectives and that VA has 
a solid and sustainable approach to managing its IT investments. The 
department continues to work on improving such programs as information 
security and asset control, and it currently has many significant 
initiatives under way, for which substantial investments have been 
made. Yet we continue to see management weaknesses in these programs 
and initiatives (many of a long-standing nature), which are the very 
weaknesses that VA aims to alleviate with its reorganized management 
structure. However, until the department provides the foundation for 
its new IT management structure by carrying out its plans to establish 
a comprehensive set of improved management processes, the impact of 
this vital undertaking will be diminished. Implementation of the 
recommendations that we have made in this area could play a significant 
role in resolving many of these concerns.

Mr. Chairman, this concludes my statement. I would be pleased to 
respond to any questions that you or other members of the committee may 
have at this time.

Contacts and Acknowledgements:

For information about this testimony, please contact Valerie C. Melvin 
at (202) 512-6304 or melvinv@gao.gov. Key contributions to this 
testimony were made by Barbara Oliver, Assistant Director; Barbara 
Collier, B. Scott Pettis; J. Michael Resser; Eric Trout, and Charles 
Youman.

Attachment 1. Key Information Technology Management Processes to Be 
Addressed in VA Realignment:

Key area: Enterprise management; 
IT management process: Information technology (IT) strategy; 
Description: Addressing long-and short-term objectives, business 
direction, and their impact on IT, the IT culture, communications, 
information, people, processes, technology, development, and 
partnerships.

Key area: Enterprise management; 
IT management process: IT management; 
Description: Defining a structure of relationships and processes to 
direct and control the IT endeavor.

Key area: Enterprise management; 
IT management process: Risk management; 
Description: Identifying potential events that may affect the 
organization and managing risk to be within acceptable levels so that 
reasonable assurance is provided regarding the achievement of 
organization objectives.

Key area: Enterprise management; 
IT management process: Architecture management; 
Description: Creating, maintaining, promoting, and governing the use of 
IT architecture models and standards across and within the change 
programs of an organization.

Key area: Enterprise management; 
IT management process: Portfolio management; 
Description: Assessing all applications, services, and IT projects that 
consume resources in order to understand their value to the IT 
organization.

Key area: Enterprise management; 
IT management process: Security management; 
Description: Managing the department's information security program, as 
mandated by the Federal Information Security Management Act (FISMA) of 
2002.

Key area: Enterprise management; 
IT management process: IT research and innovation; 
Description: Generating ideas, evaluating and selecting ideas, 
developing and implementing innovations, and continuously recognizing 
innovators and learning from the experience.

Key area: Enterprise management; 
IT management process: Project management; 
Description: Planning, organizing, monitoring, and controlling all 
aspects of a project in a continuous process so that it achieves its 
objectives.

Key area: Business management; 
IT management process: Stakeholder requirements management; 
Description: Managing and prioritizing all requests for additional and 
new technology solutions arising from a customer's needs.

Key area: Business management;
IT management process: Customer satisfaction management; 
Description: Determining whether and how well customers are satisfied 
with the services, solutions, and offerings from the providers of IT.

Key area: Business management;
IT management process: Financial management; 
Description: Providing sound stewardship of the monetary resources of 
the organization.

Key area: Business management;
IT management process: Service pricing and contract administration; 
Description: Establishing a pricing mechanism for the IT organization 
to sell its services to internal or external customers and to 
administer the contracts associated with the selling of those services.

Key area: Business management;
IT management process: Service marketing and sales; 
Description: Enabling the IT organization to understand the marketplace 
it serves, to identify customers, to "market" to these customers, to 
generate "marketing" plans for IT services and support the "selling" of 
IT services to internal customers.

Key area: Business management;
IT management process: Compliance management; 
Description: Ensuring adherence with laws and regulations, internal 
policies and procedures, and stakeholder commitments.

Key area: Business management;
IT management process: Asset management; 
Description: Maintaining information regarding technology assets, 
included leased and purchased assets, licenses, and inventory.

Key area: Business management;
IT management process: Workforce management; 
Description: Enabling an organization to provide the optimal mix of 
staffing (resources and skills) needed to provide the agreed-on IT 
services at the agreed-on service levels.

Key area: Business management;
IT management process: Service-level management; 
Description: Managing service-level agreements and performing the 
ongoing review of service achievements to ensure that the required and 
cost-justifiable service quality is maintained and gradually improved.

Key area: Business management;
IT management process: IT service continuity management; 
Description: Ensuring that agreed-on IT services continue to support 
business requirements in the event of a disruption to the business.

Key area: Business management;
IT management process: Supplier relationship management; 
Description: Developing and exercising working relationships between 
the IT organization and suppliers in order to make available the 
external services and products that are required to support IT service 
commitments to customers.

Key area: Business management;
IT management process: Knowledge management; 
Description: Promoting an integrated approach to identifying, 
capturing, evaluating, categorizing, retrieving, and sharing all of an 
organization's information assets.

Key area: Business application management; 
IT management process: Solution requirements; 
Description: Translating provided customer (business) requirements and 
IT stakeholder-generated requirements/constraints into solution-
specific terms, within the context of a defined solution project or 
program.

Key area: Business application management; 
IT management process: Solution analysis and design; 
Description: Creating a documented design from agreed-on solution 
requirements that describes the behavior of solution elements, the 
acceptance criteria, and agreed-to measurements.

Key area: Business application management; 
IT management process: Solution build; 
Description: Bringing together all the elements specified by a solution 
design via customization, configuration, and integration of created or 
acquired solution components.

Key area: Business application management; 
IT management process: Solution test and acceptance; 
Description: Validating that the solution components and integrated 
solutions conform to design specifications and requirements before 
deployment.

Key area: Infrastructure; 
IT management process: Service execution; 
Description: Addressing the delivery of operational services to IT 
customers by matching resources to commitments and employing the IT 
infrastructure to conduct IT operations.

Key area: Infrastructure; 
IT management process: Data and storage management; 
Description: Ensuring that all data required for providing and 
supporting operational service are available for use and that all data 
storage facilities can handle normal, expected fluctuations in data 
volumes and other parameters within their designed tolerances.

Key area: Infrastructure; 
IT management process: Event management; 
Description: Identifying and prioritizing infrastructure, service, 
business, and security events, and establishing the appropriate 
response to those events.

Key area: Infrastructure; 
IT management process: Availability management; 
Description: Planning, measuring, monitoring, and continuously striving 
to improve the availability of the IT infrastructure and supporting 
organization to ensure that agreed-on requirements are consistently met.

Key area: Infrastructure; 
IT management process: Capacity management; 
Description: Matching the capacity of the IT services and 
infrastructure to the current and future identified needs of the 
business.

Key area: Infrastructure; 
IT management process: Facility management; 
Description: Creating and maintaining a physical environment that 
houses IT resources and optimizes the capabilities and costs of that 
environment.

Key area: Service support; 
IT management process: Change management; 
Description: Managing the life cycle of a change request and activities 
that measure the effectiveness of the process as well as providing for 
its continued enhancement.

Key area: Service support; 
IT management process: Release management; 
Description: Controlling the introduction of releases (that is, changes 
to hardware and software) into the IT production environment through a 
strategy that minimizes the risk associated with the changes.

Key area: Service support; 
IT management process: Configuration management; 
Description: Identifying, controlling, maintaining, and verifying the 
versions of configuration items and their relationships in a logical 
model of the infrastructure and services.

Key area: Service support; 
IT management process: User contact management; 
Description: Managing each user interaction with the provider of IT 
service throughout its life cycle.

Key area: Service support; 
IT management process: Incident management; 
Description: Restoring a service affected by any event that is not part 
of the standard operation of a service that causes or could cause an 
interruption to or a reduction in the quality of that service.

Key area: Service support; 
IT management process: Problem management; 
Description: Resolving problems affecting the IT service, both 
reactively and proactively.

Source: GAO analysis of VA documentation.

[End of table]

FOOTNOTES

[1] For example, GAO, Information Security: Sustained Management 
Commitment and Oversight Are Vital to Resolving Long-standing 
Weaknesses at the Department of Veterans Affairs, GAO-07-1019 
(Washington, D.C.: Sept. 7, 2007); Veterans Affairs: Inadequate 
Controls over IT Equipment at Selected VA Locations Pose Continuing 
Risk of Theft, Loss, and Misappropriation, GAO-07-505 (Washington, 
D.C.: July 16, 2007); Veterans Affairs: Lack of Accountability and 
Control Weaknesses over IT Equipment at Selected VA Locations, GAO-07- 
1100T (Washington, D.C.: July 24, 2007); and Veterans Benefits 
Administration: Progress Made in Long-Term Effort to Replace Benefits 
Payment System, but Challenges Persist, GAO-07-614 (Washington, D.C.: 
Apr. 27, 2007). 

[2] GAO, Veterans Affairs: The Role of the Chief Information Officer in 
Effectively Managing Information Technology, GAO-06-201T (Washington, 
D.C.: Oct. 20, 2005); and Veterans Affairs: The Critical Role of the 
Chief Information Officer Position in Effective Information Technology 
Management, GAO-05-1017T (Washington, D.C.: Sept. 14, 2005).

[3] The VA comprises three separate administrations: the Veterans 
Benefits Administration, the Veterans Health Administration, and the 
National Cemetery Administration.

[4] The headquarters offices include the Office of the Secretary, six 
Assistant Secretaries, and three VA-level staff offices.

[5] GAO, Veterans Affairs: Continued Focus on Critical Success Factors 
Is Essential to Achieving Information Technology Realignment, GAO-07- 
844 (Washington, D.C.: June 15, 2007).

[6] GAO, Information Security: Sustained Management Commitment and 
Oversight Are Vital to Resolving Long-standing Weaknesses at the 
Department of Veterans Affairs, GAO-07-1019 (Washington, D.C.: Sept. 7, 
2007).

[7] GAO, Veterans Affairs: Inadequate Controls over IT Equipment at 
Selected VA Locations Pose Continuing Risk of Theft, Loss, and 
Misappropriation, GAO-07-505 (Washington, D.C.: July 16, 2007) and 
Veterans Affairs: Lack of Accountability and Control Weaknesses over IT 
Equipment at Selected VA Locations, GAO-07-1100T (Washington, D.C.: 
July 24, 2007). 

[8] GAO, Veterans Benefits Administration: Progress Made in Long-Term 
Effort to Replace Benefits Payment System, but Challenges Persist, GAO- 
07-614 (Washington, D.C.: Apr. 27, 2007), and Veterans Affairs: 
Improved Planning Needed to Guide Development and Implementation of 
Education Benefits System, GAO-07-1045 (Washington, D.C.: July 31, 
2007).

[9] GAO, Information Technology: VA and DOD Are Making Progress in 
Sharing Medical Information, but Are Far from Comprehensive Electronic 
Medical Records, GAO-07-852T (Washington, D.C.: May 8, 2007).

[10] Among other tasks required to complete development, the two 
departments must agree to standards and populate the data repositories 
for the categories of medical information that have not yet been 
addressed: that is, all categories except outpatient pharmacy and drug 
allergy data.

[11] For example, according to an October 2005 memorandum from the 
former CIO to the Secretary of Veterans Affairs, the CIO had direct 
control over only 3 percent of the department's IT budget and 6 percent 
of the department's IT personnel. In addition, in the department's 
fiscal year 2006 IT budget request, the Veterans Health Administration 
was identified to receive 88 percent of the requested funding, while 
the department was identified to receive only 4 percent.

[12] Gartner Consulting, OneVA IT Organizational Alignment Assessment 
Project "As-Is" Baseline (McLean, Virginia; Feb. 18, 2005).

[13] Specifically, these processes are derived from the IT Governance 
Institute's Control Objectives for Information and Related Technology 
(CobiT®) and Information Technology Infrastructure Library (ITIL) as 
configured by the Process Reference Model for IT (PRM-IT) from a VA 
contractor.

[14] GAO, Results-Oriented Cultures: Implementation Steps to Assist 
Mergers and Orgnizational Transformations, GAO-03-669 (Washington, 
D.C.: July 2, 2003); and Highlights of a GAO Forum: Mergers and 
Transformations: Lessons Learned for a Department of Homeland Security 
and Other Federal Agencies, GAO-03-293SP (Washington, D.C.: Nov. 14, 
2002).

[15] GAO, Veterans Affairs: Continued Focus on Critical Success Factors 
Is Essential to Achieving Information Technology Realignment, GAO-07- 
844 (Washington, D.C.: June 15, 2007).

[16] GAO, Results-Oriented Cultures: Implementation Steps to Assist 
Mergers and Organizational Transformations, GAO-03-669 (Washington, 
D.C.: July 2, 2003).

[17] FISMA, Title III, E-Government Act of 2002, Pub. L. No. 107-347 
(Dec. 17, 2002). Further, the Veterans Benefits, Health Care, and 
Information Technology Act of 2006, Pub. L. No. 109-461 (Dec. 22, 2006) 
contains specific requirements for VA's information security program.

[18] "Personally identifiable information" refers to any information 
about an individual maintained by an agency, including any information 
that can be used to distinguish or trace an individual's identity, such 
as his or her name, Social Security number, date and place of birth, 
mother's maiden name, biometric records, etc., or any other personal 
information that is linked or linkable to an individual.

[19] GAO, Information Security: Sustained Management Commitment and 
Oversight Are Vital to Resolving Long-standing Weaknesses at the 
Department of Veterans Affairs, GAO-07-1019 (Washington, D.C.: Sept. 7, 
2007).

[20] Other initiatives are developing a remedial action plan; 
establishing an information protection program; improving incident 
management capability; and establishing an office responsible for 
oversight and compliance of IT within the department.

[21] This is one of the identified activities described in our 1998 
study of security management practices: GAO, Executive Guide: 
Information Security Management--Learning from Leading Organizations, 
GAO/AIMD-98-68 (Washington, D.C.: May 1998).

[22] The CISO position is currently unfilled, having been vacant since 
June 2006. Currently, the CIO is the acting CISO of the department. The 
department has been attempting to fill the position of the CISO since 
October 2006. 

[23] GAO, Veterans Affairs: Inadequate Controls over IT Equipment at 
Selected VA Locations Pose Continuing Risk of Theft, Loss, and 
Misappropriation, GAO-07-505 (Washington, D.C.: July 16, 2007) and 
Veterans Affairs: Lack of Accountability and Control Weaknesses over IT 
Equipment at Selected VA Locations, GAO-07-1100T (Washington, D.C.: 
July 24, 2007). 

[24] Sanitization is the process of removing all information from 
computer media. VA information resource management (IRM) personnel and 
contractors follow National Institute of Standards and Technology 
(NIST) Special Publication 800-88 guidelines, as well as more stringent 
Department of Defense (DOD) policy in DOD 5220.22-M, National 
Industrial Security Program Operating Manual, ch. 8, § 8-301, which 
requires performing three separate erasures for media sanitization.

[25] The BDN currently runs on aging software: COBOL programs and a 
nonrelational database. Analysts have indicated that moving from a 
nonrelational database of the BDN type to a more modern relational 
database is a challenging task.

[26] VBA also provides loan guaranty and life insurance benefits for 
veterans and their families, but these programs do not depend on the 
BDN.

[27] It also refers to the initiative as the compensation and pension 
or C&P replacement system.

[28] GAO, Software Capability Evaluation: VA's Software Development 
Process Is Immature, GAO/AIMD-96-90 (Washington, D.C.: June 19, 1996); 
Veterans Benefits Modernization: VBA Has Begun to Address Software 
Development Weaknesses But Work Remains, GAO/AIMD-97-154 (Washington, 
D.C.: Sept.15, 1997); VA Information Technology: Progress Continues 
Although Vulnerabilities Remain, GAO/T-AIMD-00-321 (Washington, D.C.: 
Sept. 21, 2000); VA Information Technology: Important Initiatives 
Begun, Yet Serious Vulnerabilities Persist, GAO-01-550T (Washington, 
D.C.: Apr. 4, 2001); VA Information Technology: Management Making 
Important Progress in Addressing Key Challenges, GAO-02-1054T 
(Washington, D. C.: Sept. 26, 2002); and Information Technology: VA and 
DOD Face Challenges in Completing Key Efforts, GAO-06-905T (Washington, 
D.C.: June 22, 2006).

[29] Kathryn Ambrose, William Novak, Steve Palmquist, Ray Williams, and 
Carol Woody, Report of the Independent Technical Assessment on the 
Department of Veterans Affairs VETSNET Program (Carnegie Mellon 
Software Engineering Institute, September 2005).

[30] GAO, Veterans Benefits Administration: Progress Made in Long-Term 
Effort to Replace Benefits Payment System, but Challenges Persist, GAO- 
07-614 (Washington, D.C.: Apr. 27, 2007).

[31] GAO, Veterans Affairs: Improved Planning Needed to Guide 
Development and Implementation of Education Benefits System, GAO-07- 
1045 (Washington, D.C.: July 31, 2007).

[32] In 1996, the Presidential Advisory Committee on Gulf War Veterans' 
Illnesses reported on many deficiencies in VA's and DOD's data 
capabilities for handling service members' health information. In 
November 1997, the President called for the two agencies to start 
developing a "comprehensive, lifelong medical record for each service 
member," and in 1998 issued a directive requiring VA and DOD to develop 
a "computer-based patient record system that will accurately and 
efficiently exchange information." 

[33] GAO, Information Technology: VA and DOD Are Making Progress in 
Sharing Medical Information, but Are Far from Comprehensive Electronic 
Medical Records, GAO-07-852T (Washington, D.C.: May 8, 2007).

[34] Interoperability is the ability of two or more systems or 
components to exchange information and to use the information that has 
been exchanged.

[35] December 2004 VA and DOD Joint Strategic Plan.

[36] DOD's Composite Health Care System (CHCS) and VA's VistA (Veterans 
Health Information Systems and Technology Architecture).

[37] Specifically, inpatient discharge summary data stored in VA's 
VistA and DOD's Clinical Information System (CIS), a commercial health 
information system customized for DOD. 

[38] GAO, Computer-Based Patient Records: VA and DOD Made Progress, but 
Much Work Remains to Fully Share Medical Information, GAO-05-1051T 
(Washington, D.C.: Sept. 28, 2005) and Information Technology: VA and 
DOD Face Challenges in Completing Key Efforts, GAO-06-905T (Washington, 
D.C.: June 22, 2006).

GAO's Mission:

The Government Accountability Office, the investigative arm of 
Congress, exists to support Congress in meeting its constitutional 
responsibilities and to help improve the performance and accountability 
of the federal government for the American people. GAO examines the use 
of public funds; evaluates federal programs and policies; and provides 
analyses, recommendations, and other assistance to help Congress make 
informed oversight, policy, and funding decisions. GAO's commitment to 
good government is reflected in its core values of accountability, 
integrity, and reliability.

Obtaining Copies of GAO Reports and Testimony:

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through the Internet. GAO's Web site [hyperlink, 
http://www.gao.gov] contains abstracts and full-text files of current 
reports and testimony and an expanding archive of older products. The 
Web site features a search engine to help you locate documents using 
key words and phrases. You can print these documents in their entirety, 
including charts and other graphics.

Each day, GAO issues a list of newly released reports, testimony, and 
correspondence. GAO posts this list, known as "Today's Reports," on its 
Web site daily. The list contains links to the full-text document 
files. To have GAO e-mail this list to you every afternoon, go to 
[hyperlink, http://www.gao.gov] and select "Subscribe to e-mail alerts" 
under the "Order GAO Products" heading.

Order by Mail or Phone:

The first copy of each printed report is free. Additional copies are $2 
each. A check or money order should be made out to the Superintendent 
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or 
more copies mailed to a single address are discounted 25 percent. 
Orders should be sent to:

U.S. Government Accountability Office:
441 G Street NW, Room LM:
Washington, D.C. 20548:

To order by Phone: 

Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:

To Report Fraud, Waste, and Abuse in Federal Programs:

Contact:

Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:

Congressional Relations:

Gloria Jarmon, Managing Director, JarmonG@gao.gov: 
(202) 512-4400: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7125: 
Washington, DC 20548:

Public Affairs:

Susan Becker, Acting Manager, BeckerS@gao.gov: 
(202) 512-4800: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7149: 
Washington, DC 20548: