text
stringlengths
1.98k
18.4k
summary
stringlengths
127
5.48k
The federal-state UI program, created in part by the Social Security Act of 1935, is administered under state law based on federal requirements. The primary objectives of the program are to provide temporary, partial compensation for lost earnings of eligible individuals who become unemployed through no fault of their own and to stabilize the economy during downturns. Applicants for UI benefits must have earned at least a certain amount in wages and/or have worked a certain number of weeks to be eligible. In addition, these individuals must, with limited exceptions, be available for and able to work, and actively search for work. The federal-state structure of the program places primary responsibility for its administration on the states, and gives them wide latitude to administer the programs in a manner that best suits their needs within the guidelines established by federal law. Within the context of the federal- state partnership, Labor has general responsibility for overseeing the UI program to ensure that the program is operating effectively and efficiently. For example, Labor is responsible for monitoring state operations and procedures, providing technical assistance and training, and analyzing UI program data to diagnose potential problems. State agencies rely extensively on IT systems to carry out their UI program functions. These include systems for administering benefits and for collecting and administering the taxes used to fund the programs. Benefit systems are used for determining eligibility for benefits; recording claimant filing information, such as demographic information, work history, and qualifying wage credits; determining updates as needed, such as changes in work-seeking status; and calculating state-specific weekly and maximum benefit amounts. Tax systems are used for online reporting and payment of employers’ tax and wage reports; calculating tax, wage, and payment adjustments, and any penalties or interest accrued; processing quarterly tax and wage amounts; determining and processing late payment penalties, interest, civil penalties, or fees; and adjusting previously filed tax and wage reports as a result of a tax audit, an amended report submitted by the employer, or an erroneously keyed report. However, the majority of the states’ existing systems for UI operations were developed in the 1970s and 1980s. Although some agencies have performed upgrades throughout the years, most of the state legacy systems have aged considerably. As they have aged, the systems have presented challenges to the efficiency of states’ existing IT environments. In a survey published by the National Association of State Workforce Agencies (NASWA) in 2010, states reported the following issues: Over 90 percent of the systems run on outdated hardware and software programming languages, such as Common Business Oriented Language (COBOL), which is one of the oldest computer programming languages. The systems are costly and difficult to support. The survey found, for example, that over two-thirds of states face growing costs for mainframe hardware and software support of their legacy systems. Most states’ systems cannot efficiently handle current workload demands, including experiencing difficulties implementing new federal or state laws due to constraints imposed by the systems. States have realized an increasing need to transition to web-based online access for UI data and services. States also cited specific issues with their legacy systems, including the fact that they cannot be reprogrammed quickly enough to respond to changes resulting from legislative mandates. In addition, states have developed one or more stand-alone ancillary systems to fulfill specific needs, but these systems are not integrated with their legacy mainframe systems, decreasing efficiency. Finally, according to the states, existing legacy systems cannot keep up with advances in technology, such as the move to place more UI services online. In addition to providing general oversight of the UI program, the Department of Labor plays a role in facilitating the modernization of states’ UI IT systems. This role consists primarily of providing funding and technical support to the state agencies. In this regard, Labor distributes federal funds to each state for the purpose of administering its UI program, including funds that can be used for IT modernization. Through supplemental budget funds, Labor has supported the establishment of state consortiums, in which three or four states work together to develop and share a common system. These efforts are intended to allow multiple states to pool their resources and reduce risk in the pursuit of a single common system that they can each use after applying state-specific programming and configuration settings. Labor also helps to provide technical assistance to the states by supporting and participating in two key groups—NASWA and the Information Technology Support Center (ITSC). NASWA provides a forum for states to exchange information and ideas about how to improve program operations; serves as a liaison between state workforce agencies and federal government agencies, Congress, businesses, and intergovernmental groups; and is the collective voice of state agencies on workforce policies and issues. ITSC is funded by Labor and the states to provide technical services, core projects, and a central capacity for exploring the latest technology for all states. ITSC’s core services to states include application development, standards development, and UI modernization services, among others. Our September 2012 report noted that selected states had made varying progress in modernizing the IT systems supporting their UI programs. Specifically, we found that each of the three states that were part of a multistate consortium were in the initial phases of planning that included defining business needs and requirements; two individual states were in the development phase—that is, building the system based on requirements; two were in a “mixed” phase where part of the system was in development and part was in the operations and maintenance phase; and two were completed and in operations and maintenance. These efforts had, among other things, enhanced states’ UI technology to support web-based services with more modern databases and replaced outdated programming languages. They also included the development of auxiliary systems, such as document management systems and call center processing systems. Nevertheless, while the states had made progress, we found that they faced a number of challenges related to their modernization efforts. In particular, individual states encountered the following challenges, among others: All nine states cited limited funding and/or the increasing cost of UI systems as a major challenge. For example, they said that the economic downturn had resulted in smaller state budgets, which limited state funds for IT modernization. Moreover, once funds were identified or obtained, it often took a considerable amount of time to complete the IT project. Officials added that developing large state or multistate systems may span many years, and competing demands on resources can delay project implementation. As a result, states may fund one phase of a project with the hope that funds will be available in the future for subsequent phases. This lack of consistent funding potentially hinders effective IT project planning. Seven of the nine states cited a lack of staff in their UI offices with the expertise necessary to manage IT modernization efforts: Several states said they lacked sufficient subject matter experts knowledgeable in the extensive rules and requirements of the UI program. Such experts are essential to helping computer designers and programmers understand the program’s business processes, supporting an effective transition to the reengineered process, and identifying system requirements and needs. States also identified challenges in operating and maintaining a system developed by vendors because state employees may have lacked the needed expertise to maintain the new system once the vendor staff leave. The states added that their staffs may implement larger-scale systems only once every 10 to 15 years, leading to gaps in required knowledge and skills, process maturity and discipline, and executive oversight. States further stressed that their staffs may have expertise in an outdated computer language, while modernization efforts require them to learn new skills and more modern programming languages. According to a 2011 workforce survey, over 78 percent of state chief information officers confirmed that state salary rates and pay grade structures presented a challenge in attracting and retaining skilled IT talent. According to Labor, the limited staff resources facing states have required that subject matter experts be pulled off projects to address the workload demands of daily operations. Six of the nine states noted that continuing to operate their legacy systems while simultaneously implementing new UI systems required them to balance scarce staff resources between the two major efforts. In addition to the challenges facing individual states, we found that states participating in multistate consortiumschallenges: encountered a separate set of Representatives from all three consortiums indicated that differences among states in procurement, communication, and implementation of best practices; the involvement of each state’s IT office; and the extent to which the state’s IT is centralized could impact the effort to design and develop a common system. As a result, certain state officials told us that consortiums were not practical; one official questioned whether a common platform or system could be successfully built and made transferable among states in an economically viable way. States within a consortium often had different views on the best approach to developing and modernizing systems. State officials said that using different approaches to software development is not practical when developing a common system, but that it was difficult to reach consensus on a single approach. In one case, a state withdrew from a consortium because it disagreed with the development approach being taken by the consortium. States had concerns about liabilities in providing services to another state. IT representatives from one consortium’s lead state noted that decisions taken by the lead state could result in blame for outcomes that other states were unsatisfied with, and there was a concern that the lead state’s decision making could put other states’ funds at risk. One state withdrew from its leadership position because of such concerns about liability. Reaching agreement on the location of system resources could also be a challenge. For example, one consortium encountered difficulty in agreeing on the location of a joint data center to support the states and on the resources that should be dedicated to operating and managing the facility, while complying with individual state requirements. All three consortium representatives we spoke to noted that obtaining an independent and qualified leader for a multistate modernization effort was challenging. State IT project managers and chief information officers elaborated that while each state desires to successfully reach a shared goal, the leader of a consortium must keep the interests of each state in balance and have extensive IT experience that goes beyond his or her own state’s technology environment. Both individual states and consortium officials had developed methods to mitigate specific challenges and identified lessons learned. For example, several states were centralizing and standardizing their IT operations to address technical challenges; found that a standardized, statewide enterprise architecture could provide a more efficient way to leverage project development; and took steps to address consortium challenges they encountered, such as ensuring that each state’s IT department is involved in the project. In our report, we noted that ITSC had been tasked with preparing an assessment of lessons learned from states’ modernization efforts, but at the time of our review, this assessment had not been completed. Moreover, the scope of the assessment was limited to ITSC’s observations and had not been formally reviewed by the states or Labor. A comprehensive assessment would include formal input from states and consortiums, the ITSC Steering Committee, and Labor. Accordingly, we recommended that Labor (1) perform a comprehensive analysis of lessons learned and (2) distribute the analysis to each state through an information-sharing platform or repository, such as a website. Labor generally agreed with the first recommendation; it did not agree or disagree with the second recommendation but said it was committed to sharing lessons learned. In addition, the nine states in our review had established, to varying degrees, certain IT management controls that aligned with industry- accepted program management practices. These controls included the following: establishing aspects of a project management office for centralized and coordinated management of projects under its domain; incorporating industry-standard project management processes, tools, and techniques into their modernization UI efforts; adopting independent verification and validation to verify the quality of the modernization projects; and employing IT investment management standards, such as those called for in our IT investment management framework. If effectively implemented, these controls could help successfully guide the states’ UI modernization efforts. In summary, while states have taken steps to modernize the systems supporting their UI programs, they face a number of challenges in updating their aging legacy systems and moving program operations to a modern web-based IT environment. Many of the challenges pertain to inconsistent funding, a lack of sufficient staff with adequate expertise, and in some cases, the difficulty of effective interstate collaboration. States have begun to address some of these challenges, and the nine states in our review had established some IT management controls, which are essential to successful modernization efforts. In addition, the Department of Labor can continue to play a role in supporting and advising states in their efforts. Chairman Reichert, Ranking Member Doggett, and Members of the Subcommittee, this concludes my statement. I would be happy to answer any questions at this time. If you have any questions concerning this statement, please contact Valerie C. Melvin, Director, Information Management and Technology Resources Issues, at (202) 512-6304 or melvinv@gao.gov. Other individuals who made key contributions include Christie Motley, Assistant Director; Lee A. McCracken; and Charles E. Youman. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.
The joint federal-state unemployment insurance program is the Department of Labor's largest income maintenance program, and its benefits provide a critical source of income for millions of unemployed Americans. The program is overseen by Labor and administered by the states. To administer their UI programs, states rely heavily on IT systems--both to collect and process revenue from taxes and to determine eligibility and administer benefits. However, many of these systems are aging and were developed using outdated computer programming languages, making them costly and difficult to support and incapable of efficiently handling increasing workloads. Given the importance of IT to state agencies' ability to process and administer benefits, GAO was asked to provide testimony summarizing aspects of its September 2012 report on UI modernization, including key challenges states have encountered in modernizing their tax and benefit systems. To develop this statement, GAO relied on its previously published work. As GAO reported in September 2012, nine selected states had made varying degrees of progress in modernizing the information technology (IT) systems supporting their unemployment insurance (UI) programs. Specifically, the states' modernization efforts were at various stages--three were in early phases of defining business needs and requirements, two were in the process of building systems based on identified requirements, two were in a "mixed" phase of having a system that was partly operational and partly in development, and two had systems that were completely operational. The enhancements provided by these systems included supporting web-based technologies with more modern databases and replacing outdated programming languages, among others. Nevertheless, while taking steps to modernize their systems, the selected states reported encountering a number of challenges, including the following: Limited funding and the increasing cost of UI systems . The recent economic downturn resulted in smaller state budgets, limiting what could be spent on UI system modernization. In addition, competing demands and fluctuating budgets made planning for system development, which can take several years, more difficult. A lack of sufficient expertise among staff . Selected states reported that they had insufficient staff with expertise in UI program rules and requirements, the ability to maintain IT systems developed by vendors, and knowledge of current programming languages needed to maintain modernized systems. A need to continue to operate legacy systems while simultaneously implementing new systems . This required states to balance scarce resources between these two efforts. In addition, a separate set of challenges arose for states participating in multistate consortiums, which were established to pool resources for developing joint systems that could be used by all member states: Differences in state laws and business processes impacted the effort to design and develop a common system. States within a consortium differed on the best approach for developing and modernizing systems and found it difficult to reach consensus. Decision making by consortium leadership raised concerns about liability for outcomes that could negatively affect member states. Consortiums found it difficult to obtain a qualified leader for a multistate effort who was unbiased and independent. Both consortium and individual state officials had taken steps intended to mitigate challenges. GAO also noted that a comprehensive assessment of lessons learned could further assist states' efforts. In addition, the states in GAO's review had established certain IT management controls that can help successfully guide modernization efforts. These controls include establishing a project management office, using industry-standard project management guidance, and employing IT investment management standards, among others. In its prior report on states' UI system modernization efforts, GAO recommended that the Department of Labor conduct an assessment of lessons learned and distribute the analysis to states through an information-sharing platform such as a website. Labor agreed with the first recommendation; it neither agreed nor disagreed with the second recommendation, but stated that it was committed to sharing lessons learned.
To improve federal efforts to assist state and local personnel in preparing for domestic terrorist attacks, H.R. 525 would create a single focal point for policy and coordination—the President’s Council on Domestic Terrorism Preparedness—within the Executive Office of the President. The new council would include the President, several cabinet secretaries, and other selected high-level officials. An Executive Director with a staff would collaborate with executive agencies to assess threats; develop a national strategy; analyze and prioritize governmentwide budgets; and provide oversight of implementation among the different federal agencies. In principle, the creation of the new council and its specific duties appear to implement key actions needed to combat terrorism that we have identified in previous reviews. Following is a discussion of those actions, executive branch attempts to implement them, and how H.R. 525 would address them. In our May 2000 testimony, we reported that overall federal efforts to combat terrorism were fragmented. There are at least two top officials responsible for combating terrorism and both of them have other significant duties. To provide a focal point, the President appointed a National Coordinator for Security, Infrastructure Protection and Counterterrorism at the National Security Council. This position, however, has significant duties indirectly related to terrorism, including infrastructure protection and continuity of government operations. Notwithstanding the creation of this National Coordinator, it was the Attorney General who led interagency efforts to develop a national strategy. H.R. 525 would set up a single, high-level focal point in the President’s Council on Domestic Terrorism Preparedness. In addition, H.R. 525 would require that the new council’s executive chairman—who would represent the President as chairman—be appointed with the advice and consent of the Senate. This last requirement would provide Congress with greater influence and raise the visibility of the office. We testified in July 2000 that one step in developing sound programs to combat terrorism is to conduct a threat and risk assessment that can be used to develop a strategy and guide resource investments. Based upon our recommendation, the executive branch has made progress in implementing our recommendations that threat and risk assessments be done to improve federal efforts to combat terrorism. However, we remain concerned that such assessments are not being coordinated across the federal government. H.R. 525 would require a threat, risk, and capability assessment that examines critical infrastructure vulnerabilities, evaluates federal and applicable state laws used to combat terrorist attacks, and evaluates available technology and practices for protecting critical infrastructure against terrorist attacks. This assessment would form the basis for the domestic terrorism preparedness plan and annual implementation strategy. In our July 2000 testimony, we also noted that there is no comprehensive national strategy that could be used to measure progress. The Attorney General’s Five-Year Plan represents a substantial interagency effort to develop a federal strategy, but it lacks desired outcomes. The Department of Justice believes that their current plan has measurable outcomes about specific agency actions. However, in our view, the plan needs to go beyond this to define an end state. As we have previously testified, the national strategy should incorporate the chief tenets of the Government Performance and Results Act of 1993 (P.L. 130-62). The Results Act holds federal agencies accountable for achieving program results and requires federal agencies to clarify their missions, set program goals, and measure performance toward achieving these goals. H.R. 525 would require the new council to publish a domestic terrorism preparedness plan with objectives and priorities, an implementation plan, a description of roles of federal, state and local activities, and a defined end state with measurable standards for preparedness. In our December 1997 report, we reported that there was no mechanism to centrally manage funding requirements and to ensure an efficient, focused governmentwide approach to combat terrorism. Our work led to legislation that required the Office of Management and Budget to provide annual reports on governmentwide spending to combat terrorism. These reports represent a significant step toward improved management by providing strategic oversight of the magnitude and direction of spending for these programs. Yet we have not seen evidence that these reports have established priorities or identified duplication of effort as the Congress intended. H.R. 525 would require the new council to develop and make budget recommendations for federal agencies and the Office of Management and Budget. The Office of Management and Budget would have to provide an explanation in cases where the new council’s recommendations were not followed. The new council would also identify and eliminate duplication, fragmentation, and overlap in federal preparedness programs. In our April 2000 testimony, we observed that federal programs addressing terrorism appear in many cases to be overlapping and uncoordinated. To improve coordination, the executive branch has created organizations like the National Domestic Preparedness Office and various interagency working groups. In addition, the annual updates to the Attorney General’s Five-Year Plan track individual agencies’ accomplishments. Nevertheless, we have still noted that the multitude of similar federal programs have led to confusion among the state and local first responders they are meant to serve. H.R. 525 would require the new council to coordinate and oversee the implementation of related programs by federal agencies in accordance with the domestic terrorism preparedness plan. The new council would also make recommendations to the heads of federal agencies regarding their programs. Furthermore, the new council would provide written notification to any department that it believes is not in compliance with its responsibilities under the plan. Federal efforts to combat terrorism are inherently difficult to lead and manage because the policy, strategy, programs, and activities to combat terrorism cut across more than 40 agencies. Congress has been concerned with the management of these programs and, in addition to H.R. 525, two other bills have been introduced to change the overall leadership and management of programs to combat terrorism. On March 21, 2001, Representative Thornberry introduced H.R. 1158, the National Homeland Security Act, which advocates the creation of a cabinet-level head within the proposed National Homeland Security Agency to lead homeland security activities. On March 29, 2001 Representative Skelton introduced H.R. 1292, the Homeland Security Strategy Act of 2001, which calls for the development of a homeland security strategy developed by a single official designated by the President. In addition, several other proposals from congressional committee reports and various commission reports advocate changes in the structure and management of federal efforts to combat terrorism. These include Senate Report 106-404 to Accompany H.R. 4690 on the Departments of Commerce, Justice, and State, the Judiciary, and Related Agencies Appropriation Bill 2001, submitted by Senator Gregg on September 8, 2000; the report by the Gilmore Panel (the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction, chaired by Governor James S. Gilmore III) dated December 15, 2000; the report of the Hart-Rudman Commission (the U.S. Commission on National Security/21st Century, chaired by Senators Gary Hart and Warren B. Rudman) dated January 31, 2001; and a report from the Center for Strategic and International Studies (Executive Summary of Four CSIS Working Group Reports on Homeland Defense, chaired by Messrs. Frank Cilluffo, Joseph Collins, Arnaud de Borchgrave, Daniel Goure, and Michael Horowitz) dated 2000. The bills and related proposals vary in the scope of their coverage. H.R. 525 focuses on federal programs to prepare state and local governments for dealing with domestic terrorist attacks. Other bills and proposals include the larger issue of homeland security that includes threats other than terrorism, such as military attacks. H.R. 525 would attempt to resolve cross-agency leadership problems by creating a single focal point within the Executive Office of the President. The other related bills and proposals would also create a single focal point for programs to combat terrorism, and some would have the focal point perform many of the same functions. For example, some of the proposals would have the focal point lead efforts to develop a national strategy. The proposals (with one exception) would have the focal point appointed with the advice and consent of the Senate. However, the various bills and proposals differ in where they would locate the focal point for overall leadership and management. The two proposed locations for the focal point are in the Executive Office of the President (like H.R. 525) or in a Lead Executive Agency. Table 1 shows various proposals regarding the focal point for overall leadership, the scope of its activities, and it’s location. Location of focal point Executive Office of the President Lead Executive Agency (National Homeland Security Agency) Lead Executive Agency (Department of Justice) Lead Executive Agency (National Homeland Security Agency) Homeland security (including domestic terrorism, maritime and border security, disaster relief and critical infrastructure activities) Homeland security (including antiterrorism and protection of territory and critical infrastructures from unconventional and conventional threats by military or other means) Domestic terrorism preparedness (crisis and consequence management) Domestic and international terrorism (crisis and consequence management) Homeland security (including domestic terrorism, maritime and border security, disaster relief, and critical infrastructure activities) Homeland Defense (including domestic terrorism and critical infrastructure protection) Based upon our analysis of legislative proposals, various commission reports, and our ongoing discussions with agency officials, each of the two locations for the focal point—the Executive Office of the President or a Lead Executive Agency—has its potential advantages and disadvantages. An important advantage of placing the position with the Executive Office of the President is that the focal point would be positioned to rise above the particular interests of any one federal agency. Another advantage is that the focal point would be located close to the President to resolve cross agency disagreements. A disadvantage of such a focal point would be the potential to interfere with operations conducted by the respective executive agencies. Another potential disadvantage is that the focal point might hinder direct communications between the President and the cabinet officers in charge of the respective executive agencies. Alternately, a focal point with a Lead Executive Agency could have the advantage of providing a clear and streamlined chain of command within an agency in matters of policy and operations. Under this arrangement, we believe that the Lead Executive Agency would have to be one with a dominant role in both policy and operations related to combating terrorism. Specific proposals have suggested that this agency could be either the Department of Justice (per Senate Report 106-404) or an enhanced Federal Emergency Management Agency (per H.R. 1158 and its proposed National Homeland Security Agency). Another potential advantage is that the cabinet officer of the Lead Executive Agency might have better access to the President than a mid-level focal point with the Executive Office of the President. A disadvantage of the Lead Executive Agency approach is that the focal point—which would report to the cabinet head of the Lead Executive Agency—would lack autonomy. Further, a Lead Executive Agency would have other major missions and duties that might distract the focal point from combating terrorism. Also, other agencies may view the focal point’s decisions and actions as parochial rather than in the collective best interest. H.R. 525 would provide the new President’s Council on Domestic Terrorism Preparedness with a variety of duties. In conducting these duties, the new council would, to the extent practicable, rely on existing documents, interagency bodies, and existing governmental entities. Nevertheless, the passage of H.R. 525 would warrant a review of several existing organizations to compare their duties with the new council’s responsibilities. In some cases, those existing organizations may no longer be required or would have to conduct their activities under the supervision of the new council. For example, the National Domestic Preparedness Office was created to be a focal point for state and local governments and has a state and local advisory group. The new council has similar duties that may eliminate the need for the National Domestic Preparedness Office. As another example, we believe the overall coordinating role of the new council may require adjustments to the coordinating roles played by the Federal Emergency Management Agency, the Department of Justice’s Office of State and Local Domestic Preparedness Support, and the National Security Council’s Weapons of Mass Destruction Preparedness Group in the policy coordinating committee on Counterterrorism and National Preparedness. In our ongoing work, we have found that there is no consensus—either in Congress, the Executive Branch, the various commissions, or the organizations representing first responders—as to whether the focal point should be in the Executive Office of the President or a Lead Executive Agency. Developing such a consensus on the focal point for overall leadership and management, determining its location, and providing it with legitimacy and authority through legislation, is an important task that lies ahead. We believe that this hearing and the debate that it engenders, will help to reach that consensus. This concludes our testimony. We would be pleased to answer any questions you may have. For future questions about this statement, please contact Raymond J. Decker, Director, Defense Capabilities and Management at (202) 512-6020. Individuals making key contributions to this statement include Stephen L. Caldwell and Krislin Nalwalk. Combating Terrorism: Observations on Options to Improve the Federal Response (GAO-01-660T, Apr. 24, 2001). Combating Terrorism: Accountability Over Medical Supplies Needs Further Improvement (GAO-01-463, Mar. 30, 2001). Combating Terrorism: Federal Response Teams Provide Varied Capabilities; Opportunities Remain to Improve Coordination (GAO-01-14, Nov. 30, 2000). Combating Terrorism: Linking Threats to Strategies and Resources (GAO/T-NSIAD-00-218, July 26, 2000). Combating Terrorism: Comments on Bill H.R. 4210 to Manage Selected Counterterrorist Programs (GAO/T-NSIAD-00-172, May 4, 2000). Combating Terrorism: How Five Foreign Countries Are Organized to Combat Terrorism (GAO/NSIAD-00-85, Apr. 7, 2000). Combating Terrorism: Issues in Managing Counterterrorist Programs (GAO/T-NSIAD-00-145, Apr. 6, 2000). Combating Terrorism: Need to Eliminate Duplicate Federal Weapons of Mass Destruction Training (GAO/NSIAD-00-64, Mar. 21, 2000). Critical Infrastructure Protection: Comprehensive Strategy Can Draw on Year 2000 Experiences (GAO/AIMD-00-1, Oct. 1, 1999). Combating Terrorism: Need for Comprehensive Threat and Risk Assessments of Chemical and Biological Attack (GAO/NSIAD-99-163, Sept. 7, 1999). Combating Terrorism: Observations on Growth in Federal Programs (GAO/T-NSIAD-99-181, June 9, 1999). Combating Terrorism: Issues to Be Resolved to Improve Counterterrorist Operations (GAO/NSIAD-99-135, May 13, 1999). Combating Terrorism: Observations on Federal Spending to Combat Terrorism (GAO/T-NSIAD/GGD-99-107, Mar. 11, 1999). Combating Terrorism: Opportunities to Improve Domestic Preparedness Program Focus and Efficiency (GAO/NSIAD-99-3, Nov. 12, 1998).
This testimony discusses the Preparedness Against Domestic Terrorism Act of 2001 (H.R. 525). To improve federal efforts to help state and local personnel prepare for domestic terrorist attacks, H.R. 525 would create a single focal point for policy and coordination--the President's Council on Domestic Terrorism Preparedness--within the White House. The new council would include the President, several cabinet secretaries, and other selected high-level officials. H.R. 525 would (1) create an executive director position with a staff that would collaborate with other executive agencies to assess threats, (2) require the new council to develop a national strategy, (3) require the new council to analyze and review budgets, and (4) require the new council to oversee implementation among the different federal agencies. Other proposals before Congress would also create a single focal point for terrorism. Some of these proposals place the focal point in the Executive Office of the President and others place it in a lead executive agency. Both locations have advantages and disadvantages.
In November 1994, the Office of the Director of Defense Procurement initiated the SPS program to acquire and deploy a single automated system to perform all contract-management-related functions for all DOD organizations. At that time, life-cycle costs were estimated to be about $3 billion over a 10-year period. From 1994 to 1996, the department defined SPS requirements and solicited commercially available vendor products for satisfying these requirements. Subsequently, in April 1997, the department awarded a contract to American Management Systems (AMS), Incorporated, to (1) use AMS’s commercially available contract management system as the foundation for SPS, (2) modify this commercial product as necessary to meet DOD requirements, and (3) perform related services. The department also directed the contractor to deliver functionality for the system in four incremental releases. The department later increased the number of releases across which this functionality would be delivered to seven, reduced the size of the increments, and allowed certain more critical functionality to be delivered sooner (see table 1 for proposed SPS functionality by increment). Since our report of July 2001, DOD has revised its plans. According to the SPS program manager, current plans no longer include increments 6 and 7 or releases 5.0 and 5.1. Instead, release 4.2 (increment 5) will include at least three, but not more than seven, subreleases. At this time, only the first of the potentially seven 4.2 subreleases is under contract. This subrelease is scheduled for delivery in April 2002, with deployment to the Army and the Defense Logistics Agency scheduled for June 2002. Based on the original delivery date, release 4.2 is about one year overdue. The department reports that it has yet to define the requirements to be included within the remaining 4.2 subreleases, and has not executed any contract task orders for these subreleases. According to SPS officials, they will decide later this year whether to invest in these additional releases. As of December 2001, the department reported that it had deployed four SPS releases to over 777 locations. The Director of Defense Procurement (DDP) has responsibility for the SPS program, and the CIO is the milestone decision authority for SPS because the program is classified as a major Defense acquisition. Our July 2001 report detailed program problems and investment management weaknesses. To address these weaknesses, we recommended, among other things, that the department report on the lessons to be learned from its SPS experience for the benefit of future system acquisitions. Similarly, other reviews of the program commissioned by the department in the wake of our review raised similar concerns and identified other problems and management weaknesses. The findings from our report are summarized below in two major categories: lack of economic justification for the program and inability to meet program commitments. We also summarize the findings of the other studies. The Clinger-Cohen Act of 1996, OMB guidance, DOD policy, and practices of leading organizations provide an effective framework for managing information technology investments, not just when a program is initiated, but continuously throughout the life of the program. Together, they provide for (1) economically justifying proposed projects on the basis of reliable analyses of expected life-cycle costs, benefits, and risks; and (2) using these analyses throughout a project’s life-cycle as the basis for investment selection, control, and evaluation decisionmaking, and doing so for large projects (to the maximum extent practical) by dividing them into a series of smaller, incremental subprojects or releases and individually justifying investment in each separate increment on the basis of costs, benefits, and risks. The department had not met these investment management tenets for SPS. First, the latest economic analysis for the program—dated January 2000— was not based on reliable estimates because most of the cost estimates in the 2000 economic analysis were estimates carried forward from the April 1997 analysis (adjusted for inflation). Only the cost estimates being funded and managed by the SPS program office, which were 13 percent of the total estimated life-cycle cost in the analysis, were updated in 2000 to reflect more current contract estimates and actual expenditures/ obligations for fiscal years 1995 through 1999. Moreover, the military services, which share funding responsibility with the SPS program office for implementing the program, questioned the reliability of these cost estimates. However, this uncertainty was not reflected in the economic analysis using any type of sensitivity analysis. A sensitivity analysis would have disclosed for decisionmakers the investment risk being assumed by relying on the estimates presented in the economic analysis. Moreover, the latest economic analysis (January 2000) was outdated because it did not reflect the program’s current status and known problems and risks. For instance, this analysis was based on a program scope and associated costs and benefits that anticipated four software releases. However, as mentioned previously, the program now consists of five releases, and subreleases within releases, in order to accommodate changes in SPS requirements. Estimates of the full costs, benefits, and risks relating to this additional release and its subreleases were not part of the 2000 economic analysis. Also, this analysis did not fully recognize actual and expected delays in meeting SPS’s full operational capability milestone, which had been slipped by 3½ years and DOD officials say that further delays are currently expected. Such delays not only increase the system acquisition costs but also postpone, and thus reduce, accrual of system benefits. Further, several DOD components are now questioning whether they will even deploy the software, which would further reduce SPS’s cost effectiveness calculations in the 2000 economic analysis. Second, the department had not used these analyses as the basis for deciding whether to continue to invest in the program. The latest economic analysis showed that SPS was not a cost-beneficial investment because the estimated benefits to be realized did not exceed estimated program costs. In fact, the 2000 analysis showed estimated costs of $3.7 billion and estimated benefits of $1.4 billion, which was a recovery of only 37 percent of costs. According to the former SPS program manager, this analysis was not used to manage the program and there was no DOD requirement for updating an economic analysis when changes to the program occurred. Third, DOD had not made its investment decisions incrementally as required by the Clinger-Cohen Act and OMB guidance. That is, although the department is planning to acquire and implement SPS as a series of five increments, it has not made decisions about whether to invest in each release on the basis of the release’s expected return on investment, as well as whether prior releases were actually achieving return-on-investment expectations. In fact, for the four increments that have been deployed, the department had not validated whether the increments were providing promised benefits and was not accounting for the costs associated with each increment so that it could even determine actual return on investment. Instead, the department had treated investment in this program as one, monolithic investment decision, justified by a single, “all-or-nothing” economic analysis. Our work has shown that it is difficult to estimate, with any degree of accuracy, cost and schedule estimates for many increments to be delivered over many years because later increments are not well understood or defined. Also, these estimates are subject to change based on actual program experiences and changing requirements. This “all-or- nothing” approach to investing in large system acquisitions, like SPS, has repeatedly proven to be ineffective across the federal government, resulting in huge sums being invested in systems that do not provide commensurate benefits. Measuring progress against program commitments is closely aligned with economically justifying information-technology investments, and is equally important to ensuring effective investment management. The Clinger- Cohen Act, OMB guidance, DOD policy, and practices of leading organizations provide for making and using such measurements as part of informed investment decisionmaking. DOD had not met key commitments and was uncertain whether it was meeting other commitments because it was not measuring them. (See table 2 for a summary of the department’s progress against commitments.) two analyses, such as the number and dollar value of estimated benefits, and the information gathered did not map to the 22 benefit types listed in the 1997 economic analysis. Instead, the study collected subjective judgments (perceptions) that were not based on predefined performance metrics for SPS capabilities and impacts. Thus, the department was not measuring SPS against its promised benefits. The former program manager told us that knowing whether SPS was producing value and meeting commitments was not the program office’s objective because there was no departmental requirement to do so. Rather, the objective was simply to acquire and deploy the system. Similarly, CIO officials told us that the department was not validating whether deployed releases of SPS were producing benefits because there was no DOD requirement to do so and no metrics had been defined for such validation. However, the Clinger-Cohen Act of 1996 and OMB guidance emphasize the need to have investment management processes and information to help ensure that information-technology projects are being implemented at acceptable costs and within reasonable and expected time frames and that they are contributing to tangible, observable improvements in mission performance (i.e., that projects are meeting the cost, schedule, and performance commitments upon which their approval was justified). For programs such as SPS, DOD required this cost, schedule, and performance information to be reported quarterly to ensure that programs did not deviate significantly from expectations. In effect, these requirements and guidance recognize that one cannot manage what one cannot measure. Shortly after receiving our draft report for comment, the department initiated several studies to determine the program’s current status, assess program risks, and identify actions to improve the program. These studies focused on such areas as program costs and benefits, planned commitments, requirements management, program office structure, and systems acceptance testing. Consistent with our findings and recommendations, these studies identified the need to establish performance metrics that will enable the department to measure the program’s performance and tie these metrics to benefits and customer satisfaction; clearly define organizational accountability for the program; provide training for all new software releases; standardize the underlying business processes and rules that the system is to support; acquire the software source code; and address open customer concerns to ensure user satisfaction. In addition, the department found other program management concerns not directly within the scope of our review, such as the need to appropriately staff the program management office with sufficient resources and address the current lack of technical expertise in areas such as contracting, software engineering, testing, and configuration management; modify the existing contract to recognize that the system does not employ a commercial-off-the-shelf software product, but rather is based on customized software product; establish DOD-controlled requirements management and acceptance testing processes and practices that are rigorous and disciplined; and assess the continued viability of the existing contractor. To address the many weaknesses in the SPS program, we made several recommendations in our July 2001 report. Specifically, we recommended that (1) investment in future releases or major enhancements to the system be made conditional on the department first demonstrating that the system is producing benefits that exceed costs; (2) future investment decisions, including those regarding operations and maintenance, be based on complete and reliable economic justifications; (3) any analysis produced to justify further investment in the program be validated by the Director, Program Analysis and Evaluation; (4) the Assistant Secretary of Defense for Command, Control, Communications, and Intelligence (C3I) clarify organizational accountability and responsibility for measuring SPS program against commitments and to ensure that these responsibilities are met; (5) program officials take the necessary actions to determine the current state of progress against program commitments; and (6) the Assistant Secretary of Defense for C3I report by October 31, 2001, to the Secretary of Defense and to DOD’s relevant congressional committees on lessons learned from the SPS investment management experience, including what actions will be taken to prevent a recurrence of this experience on other system acquisition programs. DOD’s reaction to our report was mixed. In official comments on a draft of our report, the Deputy CIO generally disagreed with our recommendations, noting that they would delay development and deployment of SPS. Since that time, however, the department has acknowledged its SPS problems and begun taking steps to address some of them. In particular, it has done the following. The department has established and communicated to applicable DOD organizations the program’s chain-of-command and defined each participating organization’s responsibilities. For example, the Joint Requirements Board was delegated the responsibility for working with the program users to define and reach agreement on the needed functionality for each software release. The department has restructured the program office and assigned additional staff, including individuals with expertise in the areas of contracting, software engineering, configuration management, and testing. However, according to the current program manager, additional critical resources are needed, such as two computer information technology specialists and three contracting experts. It has renegotiated certain contract provisions to assume greater responsibility and accountability for the requirements management and testing activities. For example, DOD, rather than the contractor, is now responsible for writing the test plans. However, additional contract changes remain to be addressed, such as training, help-desk structure, facilities support, and system operations and maintenance. The department has designated a user-satisfaction manager for the program and defined forums and approaches intended to better engage users. It has established a new testing process, whereby program officials now develop the test plans and maintain control over all software testing performed. In addition, SPS officials have stated their intention to prepare analyses for future program activities beyond those already under contract, such as the acquisition of additional system releases, and use these analyses in deciding whether to continue to deploy SPS or pursue another alternative; define system performance metrics and use these metrics to assess the extent to which benefits have been realized from already deployed system releases; and report on lessons learned from its SPS experience to the Secretary of Defense and relevant congressional committees. The department’s actions and intentions are positive steps and consistent with our recommendations. However, much remains to be accomplished. In particular, the department has yet to implement our recommendations aimed at ensuring that (1) future releases or major enhancements to the system be made conditional on first demonstrating that the system is producing benefits that exceed costs and (2) future investment decisions, including those regarding operations and maintenance, be based on a complete and reliable economic justification. We also remain concerned about the future of SPS for several additional reasons. First, definitive plans for how and when to justify future system releases or major enhancements to existing releases do not yet exist. Second, SPS officials told us that release 4.2, which is currently under contract, may be expanded to include functionality that was envisioned for releases 5.0 and 5.1. Including such additional functionality could compound existing problems and increase program costs. Third, not all defense components have agreed to adopt SPS. For example, the Air Force has not committed to deploying the software; the National Imagery and Mapping Agency, the Defense Advanced Research Projects Agency, and the Defense Intelligence Agency have not yet decided to use SPS; and the DOD Education Agency has already adopted another system because it deemed SPS too expensive.
The Department of Defense (DOD) lacks management control of the Standard Procurement System (SPS). DOD has not (1) ensured that accountability and responsibility for measuring progress against commitments are clearly understood, performed, and reported; (2) demonstrated, on the basis of reliable data and credible analysis, that the proposed system solution will produce economic benefits commensurate with costs; (3) used data on progress against project cost, schedule, and performance commitments throughout a project's life cycle to make investment decisions; and (4) divided this large project into a series of incremental investment decisions to spread the risks over smaller, more manageable components. GAO found that DOD lacks the basic information needed to make informed decisions on how to proceed with the project. Nevertheless, DOD continues to push forward in acquiring and deploying additional versions of SPS. This testimony summarizes a July report (GAO-01-682).
CT uses ionizing radiation and computers to produce cross-sectional images of internal organs and body structures. MRI uses powerful magnets, radio waves, and computers to create cross-sectional images of internal body tissues. NM uses radioactive materials in conjunction with an imaging modality to produce images that show both structure and function within the body. During an NM service, such as a PET scan, a patient is administered a small amount of radioactive substance, called a radiopharmaceutical or radiotracer, which is subsequently tracked by a radiation detector outside the body to render time-lapse images of the radioactive material as it moves through the body. Imaging equipment that uses ionizing radiation—such as CT and NM—poses greater potential short- and long-term health risks to patients than other imaging modalities, such as ultrasound. This is because ionizing radiation has enough energy to potentially damage DNA and thus increase a person’s lifetime risk of developing cancer. In addition, exposure to very high doses of this radiation can cause short-term injuries, such as burns or hair loss. To become accredited, ADI suppliers must select a CMS-designated accrediting organization, pay the organization an accreditation fee, and demonstrate that they meet the organization’s standards. As we noted in our May 2013 report, the accrediting organization fees vary. For example, as of January 2013, ACR’s accreditation fees ranged from $1,800 to $2,400 per unit of imaging equipment, while IAC’s fees ranged from $2,600 to $3,800 per application. While the specific standards used by accrediting organizations vary, MIPPA requires all accrediting organizations to have standards in five areas: (1) qualifications of medical personnel who are not physicians and who furnish the technical component of ADI services, (2) qualifications and responsibilities of medical directors and supervising physicians, (3) procedures to ensure that equipment used in furnishing the technical component of ADI services meets performance specifications, (4) procedures to ensure the safety of beneficiaries and staff, and (5) establishment and maintenance of a quality-assurance and quality control program. To demonstrate that they meet their chosen accrediting organization’s standards, ADI suppliers must submit an online application as well as required documents, which could include information on qualifications of personnel or a sample of patient images. MIPPA requires CMS to oversee the accrediting organizations and authorizes CMS to modify the list of selected accrediting organizations, if necessary. Federal regulations specify that CMS may conduct “validation audits” of accredited ADI suppliers and provide for the withdrawal of CMS approval of an accrediting organization at any time if CMS determines that the organization no longer adequately ensures that ADI suppliers meet or exceed Medicare requirements. CMS also has requirements for accrediting organizations. For example, accrediting organizations are responsible for using mid-cycle audit procedures, such as unannounced site visits, to ensure that accredited suppliers maintain compliance with MIPPA’s requirements for the duration of the 3-year accreditation cycle. According to CMS officials, five full-time staff are budgeted to oversee and develop standards for the ADI accreditation requirement.report was issued in May 2013, CMS has begun to gather input from stakeholders on the development of national standards for the accreditation of ADI suppliers, which it intends to develop by the end of 2014. Medicare payment for the technical component of ADI services is intended to cover the cost of the equipment, supplies, and nonphysician staff and is generally significantly higher than the payment for the professional component. The payment for the professional component is intended to cover the physician’s time in interpreting the image and writing a report on the findings. Medicare reimburses providers through different payment systems depending on where an ADI service is performed. When an ADI service is performed in an office setting such as a physician’s office or IDTF, both the professional and technical component are billed under the Medicare physician fee schedule. Alternatively, when the ADI service is performed in an institutional setting, the physician can only bill the Medicare physician fee schedule for the professional component, while the payment for the technical component is covered under a different Medicare payment system, according to the setting in which the service is provided. For example, the technical component of an ADI service provided in a hospital outpatient department is paid under the hospital outpatient prospective payment system (OPPS). The use of imaging services grew rapidly during the decade starting in 2000—MedPAC reported that cumulative growth between 2000 and 2009 totaled 85 percent—although the rate of growth has declined in recent Growth in imaging utilization and expenditures—including those years.for ADI services—prompted action from Congress, CMS, and private payers. Congress has enacted legislation to help ensure appropriate Medicare payment for ADI services; in some cases, this legislation has had the effect of reducing Medicare payment for the technical component of certain imaging services, such as the following: The Deficit Reduction Act of 2005 required that, beginning January 1, 2007, Medicare payment for certain imaging services under the physician fee schedule not exceed the amount Medicare pays under the OPPS. The Patient Protection and Affordable Care Act (PPACA), as amended by the Health Care and Education Reconciliation Act of 2010 (HCERA) and the American Tax Relief Act of 2012 (ATRA), reduced payment for the technical component of ADI services by adjusting assumptions, known as utilization rates, related to the rate at which certain imaging equipment is used. These changes had the effect of reducing payments for the technical component of ADI services beginning in January 2011, with additional reductions scheduled to take effect in 2014. CMS implemented additional changes to Medicare payment policy to help ensure appropriate payment for ADI services, which had the effect of reducing Medicare payment for certain imaging services. In January 2006 CMS began applying a multiple procedure payment reduction (MPPR) policy to the technical component of certain CT and MRI services, which reduces payments for these services when they are furnished together by Beginning in the same physician, to the same patient, on the same day.January 2012, CMS expanded the MPPR by reducing payments for the lower-priced professional component of certain CT and MRI services by 25 percent when two or more services are furnished by the same physician to the same patient, in the same session, on the same day. Private payers have also implemented policies designed to help control imaging utilization and expenditures. One such policy is the use of prior authorization, which can involve requirements that physician orders of imaging services meet certain guidelines in order to qualify for payment. Further, best practice guidelines, such as ACR’s Appropriateness Criteria, as well as efforts to educate physicians and patients about radiation exposure associated with imaging, have been used to promote the appropriate use of imaging services. We found that the number of ADI services provided to Medicare beneficiaries in the office setting—an indicator of access to those services—began declining before and continued declining after the accreditation requirement went into effect on January 1, 2012 (see fig. 1). In particular, the rate of decline from 2009 to 2010 was similar to the rate from 2011 to 2012 for the CT; MRI; and NM, including PET, services in our analysis. These results suggest that the overall decline was driven, at least in part, by factors other than accreditation. For example, the number of CT services per 1,000 FFS beneficiaries declined by 9 percent between 2009 and 2010, 4 percent between 2010 and 2011, and 9 percent between 2011 and 2012. The percentage decline in the number of ADI services provided in the office setting was generally similar in both urban and rural areas during the period we studied, although we found that substantially more services were provided in urban areas than in rural areas (see fig. 2). The number of ADI services per 1,000 FFS beneficiaries provided in urban areas declined by 7 percent between 2011 and 2012, while the number of services provided in rural areas declined by 8 percent. In addition, 148 services were provided per 1,000 FFS beneficiaries in urban areas in 2012, as compared to 81 services per 1,000 beneficiaries in rural areas. One reason the use of ADI services in the office setting was relatively low in rural areas was that a smaller percentage of ADI services in these areas were provided in the office setting. Specifically, in 2012, about 14 percent of ADI services in rural areas were provided in the office setting, compared to 23 percent of ADI services in urban areas. See appendix I for trends in the number of urban and rural ADI services by modality. The effect of accreditation on access—as illustrated by our analysis of the trends in ADI services in the office setting—is unclear in the context of recent policy and payment changes as well as other factors affecting the use of imaging services. In particular, the decline in ADI services occurred amid the implementation in recent years of public and private policies to slow rapid increases in imaging utilization and spending. Factors, including public and private policies, that may have played a role in the decline in ADI service utilization include the following: Medicare payment reductions. Reductions in Medicare payment may have contributed to the decline in ADI services between 2009 and 2012 as reduced fees may affect physicians’ willingness to For example, provide imaging services for Medicare beneficiaries.PPACA and ATRA reduced payment for the technical component of ADI services by adjusting assumptions related to the rate at which certain imaging equipment is used. In addition, CMS implemented a 25 percent payment reduction for the professional component of certain CT and MRI services under the MPPR, effective January 1, 2012—the same date the accreditation requirement went into effect. Prior authorization. Studies have suggested that increased use of prior authorization policies among private payers in recent years has contributed to a decrease in ADI services provided to privately insured individuals. These policies may have had a spillover effect on Medicare, thus contributing to the decline in ADI services provided to Medicare beneficiaries from 2009 to 2012. Radiation awareness. Studies have suggested that increased physician and patient awareness of the risks associated with radiation exposure may have led to a decline in CT and NM services provided to Medicare beneficiaries. Of the remaining two suppliers, one indicated that it was unsure whether accreditation has affected the number of services it provides, while the other indicated that accreditation may have led to a slight increase in the number of services it provides. accreditation process. According to the representatives, IAC and ACR requested that CMS provide a provisional accreditation period for new suppliers that would allow them to obtain reimbursement for applicable ADI services while they undergo the accreditation process. According to CMS, it does not have the authority under MIPPA to provide provisional accreditation, as the statute only allows accredited suppliers to be paid for the technical component of ADI services beginning on January 1, 2012. We provided a draft of this report for review to the Department of Health and Human Services, and the agency stated that it had no comments. We are sending copies of this report to the Secretary of Health and Human Services and appropriate congressional committees. The report will also be available at no charge on the GAO website at http://www.gao.gov. If you or your staff have any questions about this report, please contact me at (202) 512-7114 or cosgrovej@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix II. In addition to the contact named above, Phyllis Thorburn, Assistant Director; William Black, Assistant Director; Priyanka Sethi Bansal; William A. Crafton; Richard Lipinski; Beth Morrison; Jennifer Whitworth; and Rachael Wojnowicz made key contributions to this report.
The Medicare Improvements for Patients and Providers Act of 2008 (MIPPA) required that beginning January 1, 2012, suppliers that produce the images for Medicare-covered ADI services in office settings, such as physician offices, be accredited by an organization approved by CMS. MIPPA mandated that GAO issue two reports on the effect of the accreditation requirement. The first report, issued in 2013, assessed CMS's standards for the accreditation of ADI suppliers and its oversight of the accreditation requirement. In this report, GAO examined the effect the accreditation requirement may have had on beneficiary access to ADI services provided in the office setting. To do this, GAO examined trends in the use of the three ADI modalities—CT; MRI; and NM, including PET—provided to Medicare beneficiaries from 2009 through 2012 that were subject to the ADI accreditation requirement. GAO also interviewed CMS officials, representatives of the Intersocietal Accreditation Commission and the American College of Radiology—the two CMS-approved accrediting organizations that accounted for about 99 percent of all accredited suppliers as of January 2013; and 19 accredited ADI suppliers that reflected a range of geographic areas, imaging services provided, and accrediting organizations used. In addition, GAO reviewed relevant literature to understand the context of any observed changes in ADI services throughout the period studied. GAO found that the number of advanced diagnostic imaging (ADI) services provided to Medicare beneficiaries in the office setting—an indicator of access to those services—began declining before and continued declining after the accreditation requirement went into effect on January 1, 2012. In particular, the rate of decline from 2009 to 2010 was similar to the rate from 2011 to 2012 for magnetic resonance imaging (MRI); computed tomography (CT); and nuclear medicine (NM), including positron emission tomography (PET) services. These results suggest that the overall decline was driven, at least in part, by factors other than accreditation. The percentage decline in the number of ADI services provided in the office setting was generally similar in both urban and rural areas during the period GAO studied. The effect of accreditation on access is unclear in the context of recent policy and payment changes implemented by Medicare and private payers. For example, the Centers for Medicare & Medicaid Services (CMS) reduced Medicare payment for certain CT and MRI services, which could have contributed to the decline in the number of these services. Officials from CMS, representatives from the accrediting organizations, and accredited ADI suppliers GAO interviewed suggested that any effect of the accreditation requirement on access was likely limited. The Department of Health and Human Services stated that it had no comments on a draft of this report.
Federal operations and facilities have been disrupted by a range of events, including the terrorist attacks on September 11, 2001; the Oklahoma City bombing; localized shutdowns due to severe weather conditions, such as hurricanes Katrina, Rita, and Wilma in 2005; and building-level events, such as asbestos contamination at the Department of the Interior’s headquarters. In addition, federal operations could be significantly disrupted by people-only events, such as an outbreak of severe acute respiratory illness (SARS). Such disruptions, particularly if prolonged, can lead to interruptions in essential government services. Prudent management, therefore, requires that federal agencies develop plans for dealing with emergency situations, including maintaining services, ensuring proper authority for government actions, and protecting vital assets. Until relatively recently, continuity planning was generally the responsibility of individual agencies. In October 1998, Presidential Decision Directive (PDD) 67 identified FEMA—which is responsible for leading the effort to prepare the nation for all hazards and managing federal response and recovery efforts following any national incident—as the lead agent for federal COOP planning across the federal executive branch. FEMA’s responsibilities include ● formulating guidance for agencies to use in developing viable plans; ● coordinating interagency exercises and facilitating interagency coordination, as appropriate; and ● overseeing and assessing the status of COOP capabilities across the executive branch. In July 1999, FEMA issued the first version of Federal Preparedness Circular (FPC) 65, its guidance to the federal executive branch on developing viable and executable contingency plans that facilitate the performance of essential functions during any emergency. FPC 65 applies to all federal executive branch departments and agencies at all levels, including locations outside Washington, D.C. FEMA released an updated version of FPC 65 in June 2004, providing additional guidance to agencies on each of the topics covered in the original guidance. In partial response to a recommendation we made in April 2004, the 2004 version of FPC 65 also included new guidance on human capital considerations for COOP events. For example, the guidance instructed agencies to consider telework—also referred to as telecommuting or flexiplace—as an option in their continuity planning. Telework has gained widespread attention over the past decade in both the public and private sectors as a human capital flexibility that offers a variety of potential benefits to employers, employees, and society. In a 2003 report to Congress on the status of telework in the federal government, the Director of OPM described telework as “an invaluable management tool which not only allows employees greater flexibility to balance their personal and professional duties, but also allows both management and employees to cope with the uncertainties of potential disruptions in the workplace, including terrorist threats.” A 2005 OPM report on telework notes the importance of telework in responding flexibly to emergency situations, as demonstrated in the wake of the devastation caused by Hurricane Katrina, when telework served as a tool to help alleviate the issues caused by steeply rising fuel prices nationwide. In 2004, we surveyed major federal agencies at your request to determine how they planned to use telework during COOP events. We reported that, although agencies were not required to use telework in their COOP plans, 1 of the 21 agency continuity plans in place on May 1, 2004, documented plans to address some essential functions through telework. In addition, 10 agencies reported that they intended to use telework following a COOP event, even though those intentions were not documented in their continuity plans. The focus on using telework in continuity planning has been heightened in response to the threat of pandemic influenza. In November 2005, the White House issued a national strategy to address this threat, which states that social distancing measures, such as telework, may be appropriate public health interventions for infection control and containment during a pandemic outbreak. The strategy requires federal departments and agencies to develop and exercise preparedness and response plans that take into account the potential impact of a pandemic on the federal workforce. It also tasks DHS—the parent department of FEMA—with developing plans to implement the strategy in regard to domestic incident management and federal coordination. In May 2006, the White House issued an implementation plan in support of the pandemic strategy. This plan outlines the responsibilities of various agencies and establishes time lines for future actions. Although more agencies reported plans for essential team members to telework during a COOP event than in our 2004 survey, few documented that they had made the necessary preparations to effectively use telework during an emergency. While FPC 65 does not require agencies to use telework during a COOP event, it does state that they should consider the use of telework in their continuity plans and procedures. All of the 23 agencies that we surveyed indicated that they considered telework as an option during COOP planning, and 15 addressed telework in their COOP plans (see table 1). For agencies that did not plan to use telework during a COOP event, reasons cited by agency officials for this decision included (1) the need to access classified information— which is not permitted outside of secured areas—in order to perform agency essential functions and (2) a lack of funding for the necessary equipment acquisition and network modifications. The agencies that did plan to use telework in emergencies did not consistently demonstrate that they were prepared to do so. We previously identified steps agencies should take to effectively use telework during an emergency. These include preparations to ensure that staff has adequate technological capacity, assistance, and training. Table 1 provides examples of gaps in agencies’ preparations, such as the following: ● Nine of the 23 agencies reported that some of their COOP essential team members are expected to telework during a COOP event. However, only one agency documented that it had notified its team members that they were expected to telework during such an event. ● None of the 23 agencies demonstrated that it could ensure adequate technological capacity to allow designated personnel to telework during a COOP event. No guidance addresses the steps that agencies should take to ensure that they are fully prepared to use telework during a COOP event. When we reported the results of our 2004 survey, we recommended that the Secretary of Homeland Security direct the Under Secretary for Emergency Preparedness and Response to develop, in consultation with OPM, guidance on the steps that agencies should take to adequately prepare for the use of telework during a COOP event. However, to date, no such guidance has been created. In March 2006, FEMA disseminated guidance to agencies regarding the incorporation of pandemic influenza considerations into COOP planning. The guidance states that the dynamic nature of a pandemic influenza requires that the federal government take a nontraditional approach to continuity planning and readiness. It suggests the use of telework during such an event. According to the guidance, agencies should consider which essential functions and services can be conducted from a remote location (e.g., home) using telework. However, the guidance does not address the steps agencies should take when preparing to use telework during an emergency. For example, although the guidance states that agencies should consider testing, training, and exercising of social distancing techniques, including telework, it does not address other necessary preparations, such as informing designated staff of the expectation to telework or providing them with adequate technical resources and support. Earlier this month, after we briefed your staff, the White House released an Implementation Plan in support of the National Strategy for Pandemic Influenza. This plan calls on OPM to work with DHS and other agencies to revise existing telework guidance and issue new guidance on human capital planning and COOP. The plan establishes an expectation that these actions will be completed within 3 months. If the forthcoming guidance from DHS and other responsible agencies does not require agencies to make the necessary preparations for telework, agencies are unlikely to take all the steps necessary to ensure that employees will be able to effectively use telework to perform essential functions during any COOP event. In addition, inadequate preparations could limit the ability of nonessential employees to contribute to agency missions during extended emergencies, including a pandemic influenza scenario. In summary, Mr. Chairman, although more agencies reported plans for essential team members to telework during a COOP event than in our previous survey, few documented that they had made the necessary preparations to effectively use telework during an emergency. In addition, agencies lack guidance on what these necessary preparations are. Although FEMA’s recent telework guidance does not address the steps agencies should take to prepare to use telework during an emergency event, new guidance on telework and COOP is expected to be released later this year. If the new guidance does not specify the steps agencies need to take to adequately prepare their telework capabilities for use during an emergency situation, it will be difficult for agencies to make adequate preparations to ensure that their teleworking staff will be able to perform essential functions during a COOP event. In our report, we made recommendations aimed at helping to ensure that agencies are adequately prepared to perform essential functions following an emergency. Among other things, we recommended that the Secretary of Homeland Security direct the FEMA Director to establish a time line for developing, in consultation with OPM, guidance on the steps that agencies should take to adequately prepare for the use of telework during a COOP event. In commenting on a draft of the report, the Director of DHS’s Liaison Office partially agreed with this recommendation and stated that FEMA will coordinate with OPM in the development of a time line for further telework guidance. In addition, he stated that both FEMA and OPM have provided guidance on the use of telework. However, as stated in our report, present guidance does not address the preparations agencies should make for using telework during emergencies. With the release of the White House’s Implementation Plan regarding pandemic influenza, a time line has now been established for the issuance of revised guidance on telework; however, unless the forthcoming guidance addresses the necessary preparations, agencies may not be able to use telework effectively to ensure the continuity of their essential functions. Mr. Chairman, this concludes my statement. I would be pleased to respond to any questions that you or other members of the Committee may have at this time. For information about this testimony, please contact Linda D. Koontz at (202) 512-6240 or at koontzl@gao.gov. Key contributions to this testimony were made by James R. Sweetman, Jr., Assistant Director; Barbara Collier; Sairah Ijaz; Nick Marinos; and Kim Zelonis. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.
To ensure that essential government services are available in emergencies, federal agencies are required to develop continuity of operations (COOP) plans. The Federal Emergency Management Agency (FEMA), within the Department of Homeland Security (DHS), is responsible for providing guidance to agencies on developing such plans. Its guidance states that in their continuity planning, agencies should consider the use of telework--that is, work performed at an employee's home or at a work location other than a traditional office. The Office of Personnel Management (OPM) recently reported that 43 agencies have identified staff eligible to telework, and that more than 140,000 federal employees used telework in 2004. OPM also reported that many government operations can be carried out in emergencies using telework. For example, telework appears to be an effective strategy for responding to a pandemic--a global outbreak of disease that spreads easily from person to person and causes serious illness and death worldwide. In previous work, GAO identified steps that agencies should take to effectively use telework during an emergency. GAO was asked to testify on how agencies are addressing the use of telework in their continuity planning, which is among the topics discussed in a report being released today (GAO-06-713). Although agencies are not required to use telework in continuity planning, 9 of the 23 agencies surveyed reported plans for essential team members to telework during a COOP event, compared to 3 in GAO's previous survey. However, few documented that they made the necessary preparations to effectively use telework during such an event. For example, only 1 agency documented that it had communicated this expectation to its emergency team members. One reason for the low levels of preparations reported is that FEMA has not provided specific guidance on preparations needed to use telework during emergencies. Recently, FEMA disseminated guidance to agencies on incorporating pandemic influenza considerations into COOP planning. Although this guidance suggests the use of telework during such an event, it does not address the steps agencies should take when preparing to use telework during an emergency. Without specific guidance, agencies are unlikely to adequately prepare their telework capabilities for use during a COOP event. In addition, inadequate preparations could limit the ability of nonessential employees to contribute to agency missions during extended emergencies, including pandemic influenza. In its report released today, GAO recommends, among other things, that FEMA establish a time line for developing, in consultation with the OPM, guidance on preparations needed for using telework during a COOP event. In commenting on a draft of the report, DHS partially agreed with GAO's recommendation and stated that FEMA will coordinate with OPM in developing a time line for further telework guidance. DHS also stated that both FEMA and OPM have provided telework guidance. However, as GAO's report stated, present guidance does not address the preparations federal agencies should make for using telework during emergencies. On May 3 the White House announced the release of an Implementation Plan in support of the National Strategy for Pandemic Influenza. This plan calls on OPM to work with DHS and other agencies to revise existing telework guidance and issue new guidance on human capital planning and COOP. The plan establishes an expectation that these actions will be completed within 3 months. If the forthcoming guidance does not require agencies to make necessary preparations for telework, agencies are unlikely to take all the steps necessary to ensure that employees will be able to effectively use telework to perform essential functions in extended emergencies, such as a pandemic influenza.
In August 2014, we reported that, on the basis of our review of land-use agreement data for fiscal year 2012, VA does not maintain reliable data on the total number of land-use agreements and VA did not accurately estimate the revenues those agreements generate. According to the land- use agreement data provided to us from VA’s Capital Asset Inventory (CAI) system—the system VA utilizes to record land-use agreements— VA reported that it had over 400 land-use agreements generating over $24.8 million in estimated revenues for fiscal year 2012. However, when one of VA’s administrations—the Veterans Health Administration (VHA)— initiated steps to verify the accuracy and validity of the data it originally provided to us, it made several corrections to the data that raised questions about their accuracy, validity, and completeness. Examples of these corrections include the following: at one medical center, one land-use agreement was recorded 37 times, once for each building listed in the agreement; and VHA also noted that 13 agreements included in the system should have been removed because those agreements were terminated prior to fiscal year 2012. At the three VA medical centers we reviewed, we also found examples of errors in the land-use agreement data. Examples of these errors include the following: VHA did not include 17 land-use agreements for the medical centers in New York and North Chicago, collectively. VHA incorrectly estimated the revenues it expected to collect for the medical center in West Los Angeles. VHA revised its estimated revenues from all land-use agreements in fiscal year 2012 from about $700,000 to over $810,000. However, our review of VA’s land-use agreements at this medical center indicated that the amount that should have been reflected in the system was approximately $1.5 million. VA policy requires that CAI be updated quarterly until an agreement ends. VA’s approach on maintaining the data in CAI relies heavily on data being entered timely and accurately by a staff person in the local medical center; however, we found that VA did not have a mechanism to ensure that the data in CAI are updated quarterly as required and that the data are accurate, valid, and complete. By implementing a mechanism that will allow it to assess whether medical centers have timely entered the appropriate land-use agreement data into CAI, and working with the medical centers to correct the data, as needed, VA would be better positioned to reliably account for land-use agreements and the associated revenues that they generate. In our August 2014 report, we also found weaknesses in the billing and collection processes for land-use agreements at three selected VA medical centers due primarily to ineffective monitoring. Inadequate billing: We found inadequate billing practices at all three medical centers we visited. Specifically, we found that VA had billed partners in 20 of 34 revenue-generating land-use agreements for the correct amount; however, the partners in the remaining 14 agreements were not billed for the correct amount. On the basis of our analysis of the agreements, we found that VA underbilled by almost $300,000 of the approximately $5.3 million that was due under the agreements, a difference of about 5.6 percent. For most of these errors, we found that VA did not adjust the revenues it collected for inflation. We also found that the West Los Angeles medical center inappropriately coded the billing so that the proceeds of its sharing agreements, which totaled over $500,000, were sent to its facilities account rather than the medical-care appropriations account that benefits veterans, as required. VA officials stated that the department did not perform systematic reviews of the billings and collections practices at the three medical centers, which we discuss in more detail later. A mechanism for ensuring transactions are promptly and accurately recorded could help VA collect revenues that its sharing partners owe. Opportunities for improved collaboration: At New York and North Chicago, we found that VA could improve collaboration among key internal staff, which could enhance the collections of proceeds for its land-use agreements. For example, at the New York site, the VA fiscal office created spreadsheets to improve the revenue collection for more than 20 agreements. However, because the contracting office failed to inform the fiscal office of the new agreements, the fiscal office did not have all of the renewed contracts or amended agreements that could clearly show the rent due. According to a VA fiscal official at the New York office, repeated requests were made to the contracting office for these documents; however, the contracting office did not respond to these requests by the time of our visit in January 2014. By taking additional steps to foster a collaborative environment, VHA could improve its billing and collection practices. No segregation of duties: On the basis of a walkthrough of the billing and collections process we conducted during our field visits, and an interview with a West Los Angeles VA official, we found that West Los Angeles did not properly segregate duties. Specifically, the office responsible for monitoring agreements also bills the invoices, receives collections, and submits the collections to the agent cashier for deposit. Because of the lack of appropriate segregation of duties at West Los Angeles, the revenue-collection process has increased vulnerability to potential fraud and abuse. This assignment of roles and responsibilities for one office is not typical of the sites we examined. At the other medical centers we visited, these same activities were separated amongst a few offices, as outlined in VA’s guidance on deposits. VA headquarters officials informed us that program officials located at VA headquarters do not perform any systematic review to evaluate the medical centers’ processes related to billing and collections at the local level. VA officials further informed us that VHA headquarters also lacks critical data—the actual land-use agreements—that would allow it to routinely monitor billing and collection efforts for land-use agreements across the department. One VA headquarters official told us that the agency is considering the merits of dispatching small teams of staff from program offices located at VA’s headquarters to assist the local offices with activities such as billing and collections. However, as of May 2014, VA had not implemented this proposed action or any other mechanism for monitoring the billing and collections activity at the three medical centers. Until VA performs systematic reviews, VA will lack assurance that the three selected medical centers are taking all required actions to bill and collect revenues generated from land-use agreements. In our August 2014 report, we found that VA did not effectively monitor many of its land-use agreements at the New York and West Los Angeles medical centers. We found problems with unenforced agreement terms, expired agreements, and instances where land-use agreements did not exist. Examples include the following: In West Los Angeles, VA waived the revenues in an agreement with a nonprofit organization—$250,000 in fiscal year 2012 alone—due to financial hardship. However, VA policy does not allow revenues to be waived. In New York, one sharing partner—a local school of medicine—with seven expired agreements remained on the property and occupied the premises without written authorization during fiscal year 2012. Our review of VA’s policy on sharing agreements showed that VA did not have any specific guidance on how to manage agreements before they expired, including the renewal process. In New York, we observed more antennas on the roof of a VA facility than the New York medical center had recorded in CAI. After we brought this observation to their attention, New York VA officials researched the owners of these antennas and could not find written agreements or records of payments received for seven antennas. According to New York VA officials, now that they are aware of the antennas, they will either establish agreements with the tenants or disconnect the antennas. The City of Los Angeles has used 12 acres of VA land for recreational use since the 1980s without a signed agreement or payments to VA. An official said that VA cannot negotiate agreements in this case due to an ongoing lawsuit brought on behalf of homeless veterans about its land-use agreement authority. We found that VA had not established mechanisms to monitor the various agreements at the West Los Angeles and New York medical centers. VA officials stated that they had not performed systematic reviews of these agreements and had not established mechanisms to enable them to do so. Without a mechanism for accessing land-use agreements to perform needed monitoring activities, VA lacks reasonable assurance that the partners are meeting the agreed-upon terms, agreements are renewed as appropriate, and agreements are documented in writing, as required. This is particularly important if sharing partners are using VA land for purposes that may increase risk to VA’s liability (e.g., an emergency situation that might occur at the park and fields in the city of Los Angeles). Finally, with lapsed agreements, VA not only forgoes revenue, but it also misses opportunities to provide additional services to veterans in need of assistance and to enhance its operations. Our August 2014 report made six recommendations to the Secretary of Veterans Affairs to improve the quality of the data collected on specific land-use agreements (i.e., sharing, outleases, licenses, and permits), enhance the monitoring of its revenue process and monitoring of agreements, and improve the accountability of VA in this area. Specifically, we recommended that VA develop a mechanism to independently verify the accuracy, validity, and completeness of VHA data for land-use agreements in CAI; develop mechanisms to monitor the billing and collection of revenues for land-use agreements to help ensure that transactions are promptly and accurately recorded at the three medical centers; develop mechanisms to foster collaboration between key offices to improve billing and collections practices at the New York and North Chicago medical centers; develop mechanisms to access and monitor the status of land-use agreements to help ensure that agreement terms are enforced, agreements are renewed as appropriate, and all agreements are documented in writing as required, at the New York and West Los Angeles selected medical centers; develop a plan for the West Lost Angeles medical center that identifies the steps to be taken, timelines, and responsibilities in implementing segregation of duties over the billing and collections process; and develop guidance on managing expiring agreements at the three medical centers. After reviewing our draft report, VA concurred with all six of our recommendations. VA’s comments are provided in full in our August 2014 report. In November 2014, VA provided us an update on the actions it is taking to respond to these recommendations in our August 2014 report. These actions include (1) drafting CAI changes to improve data integrity and to notify staff of expiring or expired agreements, (2) updating guidance and standard operating procedures for managing land-use agreements and training staff on the new guidance, and (3) transitioning oversight and operations of the West Los Angeles land-use agreement program to the regional level. If implemented effectively, these actions should improve the quality of the data collected on specific land-use agreements, enhance the monitoring of VA’s revenue process and agreements, and improve accountability for these agreements. Chairman Coffman, Ranking Member Kuster, and members of the subcommittee, this concludes my prepared remarks. I look forward to answering any questions that you may have at this time. For further information on this testimony, please contact Stephen Lord at (202) 512-6722 or lords@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Individuals making key contributions to this testimony include Matthew Valenta, Assistant Director; Carla Craddock; Marcus Corbin; Colin Fallon; Olivia Lopez; and Shana Wallace. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.
VA manages one of the nation's largest federal property portfolios. To manage these properties, VA uses land-use authorities that allow VA to enter into various types of agreements for the use of its property in exchange for revenues or in-kind considerations. GAO was asked to examine VA's use of land-use agreements. This report addresses the extent to which VA (1) maintains reliable data on land-use agreements and the revenue they generate, (2) monitors the billing and collection processes at selected VA medical centers, and (3) monitors land-use agreements at selected VA medical centers. GAO analyzed data from VA's database on its land-use agreements for fiscal year 2012, reviewed agency documentation, and interviewed VA officials. GAO also visited three medical centers to review the monitoring of land-use agreements and the collection and billing of the associated revenues. GAO selected medical centers with the largest number of agreements or highest amount of estimated revenue. The site visit results cannot be generalized to all VA facilities. According to the Department of Veterans Affairs' (VA) Capital Asset Inventory system—the system VA utilizes to record land-use agreements and revenues—VA had hundreds of land-use agreements with tens of millions of dollars in estimated revenues for fiscal year 2012, but GAO's review raised questions about the reliability of those data. For example, one land-use agreement was recorded 37 times, once for each building listed in the agreement, 13 agreements terminated before fiscal year 2012 had not been removed from the system, and more than $240,000 in revenue from one medical center had not been recorded. VA relies on local medical center staff to enter data timely and accurately, but lacks a mechanism for independently verifying the data. Implementing such a mechanism and working with medical centers to make corrections as needed would better position VA to reliably account for its land-use agreements and the associated revenues they generate. GAO found weaknesses in the billing and collection processes for land-use agreements at three selected VA medical centers due primarily to ineffective monitoring. For example, VA incorrectly billed its sharing partners for 14 of 34 agreements at the three centers, which resulted in VA not billing $300,000 of the nearly $5.3 million owed. In addition, at the New York center, VA had not billed a sharing partner for several years' rent that totaled over $1 million. VA began collections after discovering the error; over $200,000 was outstanding as of April 2014. VA stated that it did not perform systematic reviews of the billing and collection practices at the three centers and had not established mechanisms to do so. VA officials at the New York and North Chicago centers stated that information is also not timely shared on the status of agreements with offices that perform billing due to lack of collaboration. Until VA addresses these issues, VA lacks assurance that it is collecting the revenues owed by its sharing partners. VA did not effectively monitor many of its land-use agreements at two of the centers. GAO found problems with unenforced agreement terms, expired agreements, and instances where land-use agreements did not exist. Examples include the following: In West Los Angeles, VA waived the revenues in an agreement with a nonprofit organization—$250,000 in fiscal year 2012 alone—due to financial hardship. However, VA policy does not allow revenues to be waived. In New York, one sharing partner—a local School of Medicine—with seven expired agreements remained on the property and occupied the premises without written authorization during fiscal year 2012. The City of Los Angeles has used 12 acres of VA land for recreational use since the 1980s without a signed agreement or payments to VA. An official said that VA cannot negotiate agreements due to an ongoing lawsuit brought on behalf of homeless veterans about its land-use agreement authority. VA does not perform systematic reviews and has not established mechanisms to do so, thus hindering its ability to effectively monitor its agreements and use of its properties. GAO is making six recommendations to VA including recommendations to improve the quality of its data, foster collaboration between key offices, and enhance monitoring. VA concurred with the recommendations.
As our past work has found, climate-related and extreme weather impacts on physical infrastructure such as buildings, roads, and bridges, as well as on federal lands, increase federal fiscal exposures. Infrastructure is typically designed to withstand and operate within historical climate patterns. However, according to NRC, as the climate changes, historical patterns do not provide reliable predictions of the future, in particular, those related to extreme weather events.may underestimate potential climate-related impacts over their design life, which can range up to 50 to 100 years. Federal agencies responsible for the long-term management of federal lands face similar impacts. Climate- Thus, infrastructure designs related impacts can increase the operating and maintenance costs of infrastructure and federal lands or decrease the infrastructure’s life span, leading to increased fiscal exposures for the federal government that are not fully reflected in the budget. Key examples from our recent work include (1) Department of Defense (DOD) facilities, (2) other large federal facilities such as National Aeronautics and Space Administration (NASA) centers, and (3) federal lands such as National Parks. DOD manages a global real-estate portfolio that includes over 555,000 facilities and 28 million acres of land with a replacement value that DOD estimates at close to $850 billion. Within the United States, the department’s extensive infrastructure of bases and training ranges— critical to maintaining military readiness—extends across the country, including Alaska and Hawaii. DOD incurs substantial costs for infrastructure, with a base budget for military construction and family housing totaling more than $9.8 billion in fiscal year 2014. As we reported in May 2014, this infrastructure is vulnerable to the potential impacts of climate change, including increased drought and more frequent and severe extreme weather events in certain locations. In its 2014 Quadrennial Defense Review, DOD stated that the impacts of climate change may increase the frequency, scale, and complexity of future missions, while undermining the capacity of domestic installations to support training activities. For example, in our May 2014 report on DOD infrastructure adaptation, we found that drought contributed to wildfires at an Army installation in Alaska that delayed certain units’ training (see fig. 1). systems in training and decreased the realism of the training. GAO-14-446. Adaptation is defined as adjustments to natural or human systems in response to actual or expected climate change. The federal government owns and operates hundreds of thousands of non-defense buildings and facilities that a changing climate could affect. For example, NASA’s real property holdings include more than 5,000 buildings and other structures such as wind tunnels, laboratories, launch pads, and test stands. In total, these NASA assets—many of which are located in vulnerable coastal areas—represent more than $32 billion in current replacement value. Our April 2013 report on infrastructure adaptation showed the vulnerability of Johnson Space Center and its mission control center, often referred to as the nerve center for America’s human space program. As shown in figure 3, the center is located in Houston, Texas, near Galveston Bay and the Gulf of Mexico. Johnson Space Center’s facilities—conservatively valued at $2.3 billion—are vulnerable to storm surge and sea level rise because of their location on the Gulf Coast. The federal government manages nearly 30 percent of the land in the United States for a variety of purposes, such as recreation, grazing, timber, and habitat for fish and wildlife. Specifically, federal agencies manage natural resources on about 650 million acres of land, including 401 national park units and 155 national forests. As we reported in May 2013, these resources are vulnerable to changes in the climate, including increases in air and water temperatures, wildfires, and drought; forests stressed by drought becoming more vulnerable to insect infestations; rising sea levels; and reduced snow cover and retreating glaciers. In addition, various species are expected to be at risk of becoming extinct due to the loss of habitat critical to their survival. Many of these changes have already been observed on federally managed lands and waters and are expected to continue, and one of the areas where the federal government’s fiscal exposure is expected to increase is in its role as the manager of large amounts of land and other natural resources. According to USGCRP’s May 2014 National Climate Assessment, hotter and drier weather and earlier snowmelt mean that wildfires in the West start earlier in the spring, last later into the fall, and burn more acres. Appropriations for the federal government’s wildland fire management activities have tripled, averaging over $3 billion annually in recent years, up from about $1 billion in fiscal year 1999. As we have previously reported, improved climate-related technical assistance to all levels of government can help limit federal fiscal exposures. Existing federal efforts encourage a decentralized approach to such assistance, with federal agencies incorporating climate-related information into their planning, operations, policies, and programs and establishing their own methods for collecting, storing, and disseminating climate-related data. Reflecting this approach, technical assistance from the federal government to state and local governments also exists in an uncoordinated confederation of networks and institutions. As we reported in our February 2013 high-risk update, the challenge is to develop a cohesive approach at the federal level that also informs action at the state and local levels. The Executive Office of the President and federal agencies have many efforts underway to increase the resilience of federal infrastructure and programs. For example, executive orders issued in 2009 and 2013 directed agencies to create climate change adaptation plans which integrate consideration of climate change into their operations and overall mission objectives, including the costs and benefits of improving climate adaptation and resilience with real-property investments and construction of new facilities. Recognizing these and many other emerging efforts, our prior work shows that federal decision makers still need help understanding how to build resilience into their infrastructure and planning processes. For example, in our May 2014 report, we found that DOD requires selected infrastructure planning efforts for existing and future infrastructure to account for climate change impacts, but its planners did not have key information necessary to make decisions that account for climate and We recommended that DOD provide further information to related risks. installation planners and clarify actions that account for climate change in planning documents. DOD concurred with our recommendations. GAO-14-446. even with the creation of strategic policy documents and high-level agency guidance. The federal government invests tens of billions of dollars annually in infrastructure projects prioritized and supervised by state and local governments. In total, the United States has about 4 million miles of roads and 30,000 wastewater treatment and collection facilities. According to a 2010 Congressional Budget Office report, total public spending on transportation and water infrastructure exceeds $300 billion annually, with roughly 25 percent of this amount coming from the federal government However, the and the rest coming from state and local governments. federal government plays a limited role in project-level planning for transportation and wastewater infrastructure, and state and local efforts to consider climate change in infrastructure planning have occurred primarily on a limited, ad hoc basis. The federal government has a key interest in helping state and local decision makers increase their resilience to climate change and extreme weather events because uninsured losses may increase the federal government’s fiscal exposure through federal disaster assistance programs. Congressional Budget Office, Public Spending on Transportation and Water Infrastructure, Pub. No. 4088 (Washington, D.C.: November 2010). the national gross domestic product by about $7.8 billion.shows Louisiana State Highway 1 leading to Port Fourchon. We found in April 2013, that infrastructure decision makers have not systematically incorporated potential climate change impacts in planning for roads, bridges, and wastewater management systems because, among other factors, they face challenges identifying and obtaining available climate change information best suited for their projects.when good scientific information is available, it may not be in the actionable, practical form needed for decision makers to use in planning and designing infrastructure. Such decision makers work with traditional Even engineering processes, which often require very specific and discrete information. Moreover, local decision makers—who, in this case, specialize in infrastructure planning, not climate science—need assistance from experts who can help them translate available climate change information into something that is locally relevant. In our site visits to several locations where decision makers overcame these challenges— including Louisiana State Highway 1—state and local officials emphasized the role that the federal government could play in helping to increase local resilience. Any effective adaptation strategy must recognize that state and local governments are on the front lines in both responding to immediate weather-related disasters and in preparing for the potential longer-term impacts associated with climate change. We reported in October 2009, that insufficient site-specific data—such as local temperature and precipitation projections—complicate state and local decisions to justify the current costs of adaptation efforts for potentially less certain future benefits. We recommended that the appropriate entities within the Executive Office of the President develop a strategic plan for adaptation that, among other things, identifies mechanisms to increase the capacity of federal, state, and local agencies to incorporate information about current and potential climate change impacts into government decision making. USGCRP’s April 2012 strategic plan for climate change science recognizes this need, by identifying enhanced information management and sharing as a key objective. According to this plan, USGCRP is pursuing the development of a global change information system to leverage existing climate-related tools, services, and portals from federal agencies. In our April 2013 report, we concluded that the federal government could help state and local efforts to increase their resilience by (1) improving access to and use of available climate-related information, (2) providing officials with improved access to technical assistance, and (3) helping officials consider climate change in their planning processes. As a result, we recommended, among other things, that the Executive Director of USGCRP or other federal entity designated by the Executive Office of the President work with relevant agencies to identify for decision makers the “best available” climate-related information for infrastructure planning and update this information over time, and to clarify sources of local assistance for incorporating climate-related information and analysis into infrastructure planning, and communicate how such assistance will be provided over time. These entities have not directly responded to our recommendations, but the President’s June 2013 Climate Action Plan and November 2013 Executive Order 13653 drew attention to the need for improved technical assistance. For example, the Executive Order directs numerous federal agencies, supported by USGCRP, to work together to develop and provide authoritative, easily accessible, usable, and timely data, information, and decision-support tools on climate preparedness and resilience. In addition, on July 16, 2014, the President announced a series of actions to help state, local, and tribal leaders prepare their communities for the impacts of climate change by developing more resilient infrastructure and rebuilding existing infrastructure stronger and smarter. We have work under way assessing the strengths and limitations of governmentwide options to meet the climate-related information needs of federal, state, local, and private sector decision makers. We also have work under way exploring, among other things, the risks extreme weather events and climate change pose to public health, agriculture, public transit systems, and federal insurance programs. This work may help identify other steps the federal government could take to limit its fiscal exposure and make our communities more resilient to extreme weather events. Chairman Murray, Ranking Member Sessions, and Members of the Committee, this concludes my prepared statement. I would be pleased to answer any questions you have at this time. If you or your staff members have any questions about this testimony, please contact me at (202) 512-3841 or gomezj@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. Alfredo Gomez, Director; Michael Hix, Assistant Director; Jeanette Soares; Kiki Theodoropoulos; and Joseph Dean Thompson made key contributions to this testimony. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.
Certain types of extreme weather events have become more frequent or intense according to the United States Global Change Research Program, including prolonged periods of heat, heavy downpours, and, in some regions, floods and droughts. While it is not possible to link any individual weather event to climate change, the impacts of these events affect many sectors of our economy, including the budgets of federal, state, and local governments. GAO focuses particular attention on government operations it identifies as posing a “high risk” to the American taxpayer and, in February 2013, added to its High Risk List the area Limiting the Federal Government's Fiscal Exposure by Better Managing Climate Change Risks . GAO's past work has identified a variety of fiscal exposures—responsibilities, programs, and activities that may explicitly or implicitly expose the federal government to future spending. This testimony is based on reports GAO issued from August 2007 to May 2014, and discusses (1) federal fiscal exposures resulting from climate-related and extreme weather impacts on critical infrastructure and federal lands, and (2) how improved federal technical assistance to all levels of government can help reduce climate-related fiscal exposures. GAO is not making new recommendations but has made numerous recommendations in prior reports on this topic, which are in varying states of implementation by the Executive Office of the President and federal agencies. Climate change and related extreme weather impacts on infrastructure and federal lands increase fiscal exposures that the federal budget does not fully reflect. Investing in resilience—actions to reduce potential future losses rather than waiting for an event to occur and paying for recovery afterward—can reduce the potential impacts of climate-related events. Implementing resilience measures creates additional up-front costs but could also confer benefits, such as a reduction in future damages from climate-related events. Key examples of vulnerable infrastructure and federal lands GAO has identified include: Department of Defense (DOD) facilities. DOD manages a global real-estate portfolio that includes over 555,000 facilities and 28 million acres of land with a replacement value DOD estimates at close to $850 billion. This infrastructure is vulnerable to the potential impacts of climate change and related extreme weather events. For example, in May 2014, GAO reported that a military base in the desert Southwest experienced a rain event in August 2013 in which about 1 year's worth of rain fell in 80 minutes. The flooding caused by the storm damaged more than 160 facilities, 8 roads, 1 bridge, and 11,000 linear feet of fencing, resulting in an estimated $64 million in damages. Other large federal facilities. The federal government owns and operates hundreds of thousands of other facilities that a changing climate could affect. For example, the National Aeronautics and Space Administration (NASA) manages more than 5,000 buildings and other structures. GAO reported in April 2013 that, in total, these NASA assets—many of which are in coastal areas vulnerable to storm surge and sea level rise—represent more than $32 billion in current replacement value. Federal lands. The federal government manages nearly 30 percent of the land in the United States—about 650 million acres of land—including 401 national park units and 155 national forests. GAO reported in May 2013 that these resources are vulnerable to changes in the climate, including the possibility of more frequent and severe droughts and wildfires. Appropriations for federal wildland fire management activities have tripled since 1999, averaging over $3 billion annually in recent years. GAO has reported that improved climate-related technical assistance to all levels of government can help limit federal fiscal exposures. The federal government invests tens of billions of dollars annually in infrastructure projects that state and local governments prioritize, such as roads and bridges. Total public spending on transportation and water infrastructure exceeds $300 billion annually, with about 25 percent coming from the federal government and the rest from state and local governments. GAO's April 2013 report on infrastructure adaptation concluded that the federal government could help state and local efforts to increase their resilience by (1) improving access to and use of available climate-related information, (2) providing officials with improved access to technical assistance, and (3) helping officials consider climate change in their planning processes.
The following information provides details about our agents’ experiences and observations entering the United States from Mexico at border crossings in California and Texas and at two crossings in Arizona. California: On February 9, 2006, two agents entered California from Mexico on foot. One of the agents presented as identification a counterfeit West Virginia driver’s license and the other presented a counterfeit Virginia driver’s license. The CBP officers on duty asked both agents if they were U.S. citizens and both responded that they were. The officers also asked the agents if they were bringing anything into the United States from Mexico and both answered that they were not. The CBP officers did not request any other documents to prove citizenship, and allowed both agents to enter the United States. Texas: On February 23, 2006, two agents crossed the border from Mexico into Texas on foot. When the first agent arrived at the checkpoint, a CBP officer asked him for his citizenship information; the agent responded that he was from the United States. The officer also asked if the agent had brought back anything from Mexico. The agent responded that he had not, and the officer told him that he could enter the Unites States. At this point, the agent asked the CBP officer if he wished to see any identification. The officer replied “OK, that would be good.” The agent began to remove his counterfeit Virginia driver’s license from his wallet and the inspector said “That’s fine, you can go.” The CBP officer never looked at the driver’s license. When the second agent reached the checkpoint, another CBP officer asked him for his citizenship information and he responded that he was from the United States. The CBP officer asked the agent if he had purchased anything in Mexico and the agent replied that he had not. He was then asked to show some form of identification and he produced a counterfeit West Virginia driver’s license. The CBP inspector briefly looked at the driver’s license and then told the agent he could enter the United States. Arizona, first crossing: On March 14, 2006, two agents arrived at the border crossing between Mexico and Arizona in a rental vehicle. Upon request, the agents gave the CBP officer a counterfeit West Virginia driver’s license and counterfeit Virginia driver’s license as identification. As the CBP officer reviewed the licenses, he asked the agents if they were U.S. citizens and they responded that they were. The officer also asked if the agents had purchased anything in Mexico and they said they had not. The CBP officer then requested that agents open the trunk of their vehicle. The agents heard the inspector tap on several parts of the side of the vehicle first with his hand and again with what appeared to be a wand. The officer closed the trunk of the vehicle, returned the agents’ driver’s licenses, and allowed them to enter the United States. Arizona, second crossing: On March 15, 2006, two agents again entered Arizona from Mexico on foot at a different location than the previous day. One of the agents carried a counterfeit West Virginia driver’s license and a counterfeit West Virginia birth certificate. The other carried a counterfeit Virginia driver’s license and a counterfeit New York birth certificate. As the agents were about to cross the border, another agent who had crossed the border earlier using his genuine identification phoned to inform them that the CBP officer on duty had swiped his Virginia driver’s license through a scanner. Because the counterfeit driver’s licenses the agents were carrying had fake magnetic strips, the agents decided that in the event they were questioned about their licenses, they would tell the CBP officers that the strips had become demagnetized. When the agents entered the checkpoint area, they saw that they were the only people crossing the border at that time. The agents observed three CBP officers on duty; one was manning the checkpoint and the other two were standing a short distance away. The officer manning the checkpoint was sitting at a cubicle with a computer and what appeared to be a card scanner. The agents engaged this officer in conversation to distract him from scanning their driver’s licenses. After a few moments, the CBP officer asked the agents if they were both U.S. citizens and they said that they were. He then asked if they had purchased anything in Mexico and they said no. He then told them to have a nice day and allowed them to enter the United States. He never asked for any form of identification. The following information provides details about our agents’ experiences and observations entering the United States from Canada at Michigan, New York, Idaho, and Washington border crossings. Michigan: On May 1, 2006, two agents drove in a rental vehicle to a border crossing in Michigan. When asked for identification by the CBP officer on duty, the agents presented a counterfeit West Virginia driver’s license and a counterfeit Virginia driver’s license. As the CBP officer examined the licenses, he asked the agents if they were U.S. citizens and they responded that they were. The CBP officer then asked if the agents had birth certificates. One agent presented a counterfeit New York birth certificate and the other presented a counterfeit West Virginia birth certificate. The agents observed that the CBP officer checked the birth certificates against the driver’s licenses to see if the dates and names matched. The CBP officer then asked the agents if they had purchased anything in Canada and they responded that they had not. The officer also asked what the agents were doing in Canada and they responded that they had been visiting a casino in Canada. The CBP officer then returned the agents’ documentation and allowed them to enter the United States. New York, first crossing: On May 3, 2006, two agents entered New York in a rental vehicle from Canada. The agents handed the CBP officer on duty counterfeit driver’s licenses from West Virginia and Virginia. The CBP officer asked for the agents’ country of citizenship and the agents responded that they were from the United States. The CBP officer also asked the agents why they had visited Canada. The agents responded that they had been gambling in the casinos. The CBP officer told the agents to have a nice day and allowed them to enter the United States. New York, second crossing: On the same date, the same two agents crossed back into Canada and re-entered New York at a different location. The agents handed the CBP officer at the checkpoint the same two counterfeit driver’s licenses from West Virginia and Virginia. The officer asked the agents what they were doing in Canada and they replied that they been gambling at a casino. The officer then asked the agents how much money they were bringing back into the country and they told him they had approximately $325, combined. The officer next asked the agent driving the car to step out of the vehicle and open the trunk. As the agent complied, he noticed that the officer placed the two driver’s licenses on the counter in his booth. The officer asked the agent whose car they were driving and the agent told him that it was a rental. A second officer then asked the agent to stand away from the vehicle and take his hands out of his pockets. The first officer inspected the trunk of the vehicle, which was empty. At this point, the officer handed back the two driver’s licenses and told the agents to proceed into the United States. Idaho: On May 23, 2006, two agents drove in a rental vehicle to a border crossing in Idaho. The agents handed the CBP officer on duty a counterfeit West Virginia driver’s license and a counterfeit Virginia driver’s license. As the CBP officer examined the licenses, he asked the agents if they were U.S. citizens and they responded that they were. The CBP officer then asked if the agents had birth certificates. One agent presented a counterfeit New York birth certificate and the other presented a counterfeit West Virginia birth certificate. The agents observed that the CBP officer checked the birth certificates against the driver’s licenses to see if the dates and names matched. The officer also asked what the agents were doing in Canada and they responded that they had been sightseeing. The CBP officer then returned the agents’ documentation and allowed them to enter the United States. Washington: On May 24, 2006, two agents drove in a rental vehicle to a border crossing checkpoint in Washington. When the agents arrived at the border, they noticed that no one was at the checkpoint booth at the side of the road. Shortly thereafter, a CBP officer emerged from a building near the checkpoint booth and asked the agents to state their nationality. The agents responded that they were Americans. The CBP officer next asked the agents where they were born, and they responded New York and West Virginia. The agents then handed the CBP officers their counterfeit West Virginia and Virginia driver’s licenses. The officer looked at the licenses briefly and asked the agents why they had visited Canada. The agents responded that they had a day off from a conference that they were attending in Washington and decided to do some sightseeing. The CBP officer returned the agents’ identification and allowed them to enter the United States. We conducted a corrective action briefing with officials from CBP on June 9, 2006, about the results of our investigation. CBP agreed its officers are not able to identify all forms of counterfeit identification presented at land border crossings. CBP officials also stated that they fully support the newly promulgated Western Hemisphere Travel Initiative, which will require all travelers, including U.S. citizens, within the Western Hemisphere to have a passport or other secure identification deemed sufficient by the Secretary of Homeland Security to enter or reenter the United States. The current timeline proposes that the new requirements will apply to all land border crossings beginning on December 31, 2007. The proposed timeline was developed pursuant to the Intelligence Reform and Terrorism Prevention Act of 2004. The act requires the Secretary of Homeland Security, in consultation with the Secretary of State, to implement a plan no later than January 1, 2008, to strengthen the border screening process through the use of passports and other secure documentation in recognition of the fact that additional safeguards are needed to ensure that terrorists cannot enter the United States. However, the Senate recently passed a bill to extend the implementation deadline from January 1, 2008, to June 1, 2009. Additionally, the Senate bill would also authorize the Secretary of State, in consultation with the Secretary of Homeland Security, to develop a travel document known as a Passport Card to facilitate travel of U.S. citizens to Canada, Mexico, the countries located in the Caribbean, and Bermuda. We did not assess whether this initiative would be fully implemented by either the January 2008 or June 2009 deadline or whether it would be effective in preventing terrorists from entering the United States. The results of our current work indicate that (1) CBP officers at the nine land border crossings tested did not detect the counterfeit identification we used and (2) people who enter the United States via land crossings are not always asked to present identification. Furthermore, our periodic tests since 2002 clearly show that CBP officers are unable to effectively identify counterfeit driver’s licenses, birth certificates, and other documents. This vulnerability potentially allows terrorists or others involved in criminal activity to pass freely into the United States from Canada or Mexico with little or no chance of being detected. It will be critical that the new initiative requiring travelers within the Western Hemisphere to present passports or other accepted documents to enter the United States address the vulnerabilities shown by our work. Mr. Chairman and Members of the Committee, this concludes my statement. I would be pleased to answer any questions that you may have at this time. For further information about this testimony, please contact Gregory D. Kutz at (202) 512-7455 or kutzg@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this testimony. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.
Currently, U.S. citizens are not required to present a passport when entering the United States from countries in the Western Hemisphere. However, U.S. citizens are required to establish citizenship to a CBP officer's satisfaction. On its Web site, U.S. Customs and Border Protection (CBP) advises U.S. citizens that an officer may ask for identification documents as proof of citizenship, including birth certificates or baptismal records and a photo identification document. In 2003, we testified that CBP officers were not readily capable of identifying whether individuals seeking entry into the United States were using counterfeit identification to prove citizenship. Specifically, our agents were able to easily enter the United States from Canada and Mexico using fictitious names and counterfeit driver's licenses and birth certificates. Later in 2003 and 2004, we continued to be able to successfully enter the United States using counterfeit identification at land border crossings, but were denied entry on one occasion. Because of Congress's concerns that these weaknesses could possibly be exploited by terrorists or others involved in criminal activity, Congress requested that we assess the current status of security at the nation's borders. Specifically, Congress requested that we conduct a follow-up investigation to determine whether the vulnerabilities exposed in our prior work continue to exist. Agents successfully entered the United States using fictitious driver's licenses and other bogus documentation through nine land ports of entry on the northern and southern borders. CBP officers never questioned the authenticity of the counterfeit documents presented at any of the nine crossings. On three occasions--in California, Texas, and Arizona--agents crossed the border on foot. At two of these locations--Texas and Arizona--CBP allowed the agents entry into the United States without asking for or inspecting any identification documents. After completing our investigation, we briefed officials from CBP on June 9, 2006. CBP agreed that its officers are not able to identify all forms of counterfeit identification presented at land border crossings and fully supports a new initiative that will require all travelers to present a passport before entering the United States. We did not assess whether this initiative would be effective in preventing terrorists from entering the United States or whether it would fully address the vulnerabilites shown by our work.
Over the past two decades—from 1991 through 2012—there was a substantial increase in the number of FLSA lawsuits filed, with most of the increase occurring in the period from fiscal year 2001 through 2012. As shown in figure 1, in 1991, 1,327 lawsuits were filed; in 2012, that number had increased over 500 percent to 8,148. FLSA lawsuits can be filed by DOL on behalf of employees or by private individuals. Private FLSA lawsuits can either be filed by individuals or on behalf of a group of individuals in a type of lawsuit known as a “collective action”. The court will generally certify whether a lawsuit meets the requirements to proceed as a collective action. The court may deny certification to a proposed collective action or decertify an existing collective action if the court determines that the plaintiffs are not “similarly situated” with respect to the factual and legal issues to be decided. In such cases, the court may permit the members to individually file private FLSA lawsuits. Collective actions can serve to reduce the burden on courts and protect plaintiffs by reducing costs for individuals and incentivizing attorneys to represent workers in pursuit of claims under the law. They may also protect employers from facing the burden of many individual lawsuits; however, they can also be costly to employers because they may result in large amounts of damages. For fiscal year 2012, we found that an estimated 58 percent of the FLSA lawsuits filed in federal district court were filed individually, and 40 percent were filed as collective actions. An estimated 16 percent of the FLSA lawsuits filed in fiscal year 2012 (about a quarter of all individually-filed lawsuits), however, were originally part of a collective action that was decertified (see fig. 2). Federal courts in most states experienced increases in the number of FLSA lawsuits filed between 1991 and 2012, but large increases were concentrated in a few states, including Florida, New York, and Alabama. Of all FLSA lawsuits filed since 2001, more than half were filed in these three states, and in 2012, about 43 percent of all FLSA lawsuits were filed in Florida (33 percent) or New York (10 percent). In both Florida and New York, growth in the number of FLSA lawsuits filed was generally steady, while changes in Alabama involved sharp increases in fiscal years 2007 and 2012 with far fewer lawsuits filed in other years (see fig. 3). Each spike in Alabama coincided with the decertification of at least one large collective action, which likely resulted in multiple individual lawsuits. For example, in fiscal year 2007, 2,496 FLSA lawsuits (about one-third of all FLSA lawsuits) were filed in Alabama, up from 48 FLSA lawsuits filed in Alabama in fiscal year 2006. In August 2006, a federal district court in Alabama decertified a collective action filed by managers of Dollar General stores. In its motion to decertify, the defendant estimated the collective to contain approximately 2,470 plaintiffs. In fiscal year 2012, an estimated 97 percent of FLSA lawsuits were filed against private sector employers, and an estimated 57 percent of FLSA lawsuits were filed against employers in four industry areas: accommodations and food services; manufacturing; construction; and “other services”, which includes services such as laundry services, domestic work, and nail salons. Almost one-quarter of all FLSA lawsuits filed in fiscal year 2012 (an estimated 23 percent) were filed by workers in the accommodations and food service industry, which includes hotels, restaurants, and bars. At the same time, almost 20 percent of FLSA lawsuits filed in fiscal year 2012 were filed by workers in the manufacturing industry. In our sample, most of the lawsuits involving the manufacturing industry were filed by workers in the automobile manufacturing industry in Alabama, and most were individual lawsuits filed by workers who were originally part of one of two collective actions that had been decertified. FLSA lawsuits filed in fiscal year 2012 included a variety of different types of alleged FLSA violations and many included allegations of more than one type of violation. An estimated 95 percent of the FLSA lawsuits filed in fiscal year 2012 alleged violations of the FLSA’s overtime provision, which requires certain types of workers to be paid at one and a half times their regular rate for any hours worked over 40 during a workweek. Almost one-third of the lawsuits contained allegations that the worker or workers were not paid the federal minimum wage. We also identified more specific allegations about how workers claimed their employers violated the FLSA. For example, nearly 30 percent of the lawsuits contained allegations that workers were required to work “off-the-clock” so that they would not need to be paid for that time. In addition, the majority of lawsuits contained other FLSA allegations, such as that the employer failed to keep proper records of hours worked by the employees, failed to post or provide information about the FLSA, as required, or violated requirements pertaining to tipped workers such as restaurant wait staff (see fig. 4). An estimated 14 percent of FLSA lawsuits filed in federal district court in fiscal year 2012 included an allegation of retaliation. limitations for filing an FLSA claim is 2 years (3 years if the violation is “willful”), New York state law provides a 6-year statute of limitations for filing state wage and hour lawsuits. A longer statute of limitations may increase potential financial damages in such cases because more pay periods are involved and because more workers may be involved. Adding a New York state wage and hour claim to an FLSA lawsuit in federal court could expand the potential damages, which, according to several stakeholders, may influence decisions about where and whether to file a lawsuit. In addition, according to multiple stakeholders we interviewed, because Florida lacks a state overtime law, those who wish to file a lawsuit seeking overtime compensation generally must do so under the FLSA. Ambiguity in applying the law and regulations. Ambiguity in applying the FLSA statute or regulations—particularly the exemption for executive, administrative, and professional workers—was cited as a factor by a number of stakeholders. In 2004, DOL issued a final rule updating and revising its regulations in an attempt to clarify this exemption and provided guidance about the changes, but a few stakeholders told us there is still significant confusion among employers about which workers should be classified as exempt under these categories. Industry trends. As mentioned previously, about one-quarter of FLSA lawsuits filed in fiscal year 2012 were filed by workers in the accommodations and food service industry. Nationally, service jobs, including those in the leisure and hospitality industry, increased from 2000 to 2010, while most other industries lost jobs during that period. Federal judges in New York and Florida attributed some of the concentration of such litigation in their districts to the large number of restaurants and other service industry jobs in which wage and hour violations are more common than in some other industries. An academic who focuses on labor and employment relations told us that changes in the management structure in the retail and restaurant industry may have contributed to the rise in FLSA lawsuits. For example, frontline managers who were once exempt have become nonexempt as their nonmanagerial duties have increased as a portion of their overall duties. We also reviewed DOL’s annual process for determining how to target its enforcement and compliance assistance resources. The agency targets industries for enforcement that, according to its recent enforcement data, have a higher likelihood of FLSA violations, along with other factors. In addition, according to WHD internal guidance, the agency’s annual enforcement plans should contain strategies to engage related stakeholders in preventing such violations. For example, if a WHD office plans to investigate restaurants to identify potential violations of the FLSA, it should also develop strategies to engage restaurant trade associations about FLSA-related issues so that these stakeholders can help bring about compliance in the industry. However, DOL does not compile and analyze relevant data, such as information on the subjects or the number of requests for assistance it receives from employers and workers, to help determine what additional or revised guidance employers may need to help them comply with the In developing its guidance on the FLSA, WHD does not use a FLSA.systematic approach that includes analyzing this type of data. In addition, WHD does not have a routine, data-based process for assessing the adequacy of its guidance. For example, WHD does not analyze trends in the types of FLSA-related questions it receives. This type of information could be used to develop new guidance or improve the guidance WHD provides to employers and workers on the requirements of the FLSA. Because of these issues, we recommended that WHD develop a systematic approach for identifying areas of confusion about the requirements of the FLSA that contribute to possible violations and improving the guidance it provides to employers and workers in those areas. This approach could include compiling and analyzing data on requests for guidance on issues related to the FLSA, and gathering and using input from FLSA stakeholders or other users of existing guidance through an advisory panel or other means. While improved DOL guidance on the FLSA might not affect the number of lawsuits filed, it could increase the efficiency and effectiveness of its efforts to help employers voluntarily comply with the FLSA. A clearer picture of the needs of employers and workers would allow WHD to more efficiently design and target its compliance assistance efforts, which may, in turn, result in fewer FLSA violations. WHD agreed with our recommendation that the agency develop a systematic approach for identifying and considering areas of confusion that contribute to possible FLSA violations to help inform the development and assessment of its guidance. WHD stated that it is in the process of developing systems to further analyze trends in communications received from stakeholders such as workers and employers and will include findings from this analysis as part of its process for developing new or revised guidance. In closing, while there has been a significant increase in FLSA lawsuits over the last decade, it is difficult to determine the reasons for the increase. It could suggest that FLSA violations have become more prevalent, that FLSA violations have been reported and pursued more frequently than before, or a combination of the two. It is also difficult to determine the effect that the increase in FLSA lawsuits has had on employers and their ability to hire workers. However, the ability of workers to bring such suits is an integral part of FLSA enforcement because of the limits on DOL’s capacity to ensure that all employers are in compliance with the FLSA. Chairman Walberg, Ranking Member Courtney, and members of the Committee, this completes my prepared statement. I would be happy to respond to any questions you may have. For further information regarding this statement, please contact Andrew Sherrill at (202) 512-7215 or sherrilla@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this statement. GAO staff who made key contributions to this testimony include Betty Ward-Zukerman (Assistant Director), Catherine Roark (Analyst in Charge), David Barish, James Bennett, Sarah Cornetto, Joel Green, Kathy Leslie, Ying Long, Sheila McCoy, Jean McSween, and Amber Yancey-Carroll. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.
The FLSA sets federal minimum wage and overtime pay requirements applicable to millions of U.S. workers and allows workers to sue employers for violating these requirements. Questions have been raised about the effect of FLSA lawsuits on employers and workers and about WHD's enforcement and compliance assistance efforts as the number of lawsuits has increased. This statement examines what is known about the number of FLSA lawsuits filed and how WHD plans its FLSA enforcement and compliance assistance efforts. It is based on the results of a previous GAO report issued in December 2013. In conducting the earlier work, GAO analyzed federal district court data from fiscal years 1991 to 2012 and reviewed selected documents from a representative sample of lawsuits filed in federal district court in fiscal year 2012. GAO also reviewed DOL's planning and performance documents, interviewed DOL officials, as well as stakeholders, including federal judges, plaintiff and defense attorneys who specialize in FLSA cases, officials from organizations representing workers and employers, and academics. Substantial increases occurred over the last decade in the number of civil lawsuits filed in federal district court alleging violations of the Fair Labor Standards Act of 1938, as amended (FLSA). Federal courts in most states experienced increases in the number of FLSA lawsuits filed, but large increases were concentrated in a few states, including Florida and New York. Many factors may contribute to this general trend; however, the factor cited most often by stakeholders GAO interviewed—including attorneys and judges—was attorneys' increased willingness to take on such cases. In fiscal year 2012, an estimated 97 percent of FLSA lawsuits were filed against private sector employers, often from the accommodations and food services industry, and 95 percent of the lawsuits filed included allegations of overtime violations. The Department of Labor's Wage and Hour Division (WHD) has an annual process for planning how it will target its enforcement and compliance assistance resources to help prevent and identify potential FLSA violations. In planning its enforcement efforts, WHD targets industries that, according to its recent enforcement data, have a higher likelihood of FLSA violations. WHD, however, does not have a systematic approach that includes analyzing relevant data, such as the number of requests for assistance it receives from employers and workers, to develop its guidance, as recommended by best practices previously identified by GAO. In addition, WHD does not have a routine, data-based process for assessing the adequacy of its guidance. For example, WHD does not analyze trends in the types of FLSA-related questions it receives from employers or workers. According to plaintiff and defense attorneys GAO interviewed, more FLSA guidance from WHD would be helpful, such as guidance on how to determine whether certain types of workers are exempt from the overtime pay and other requirements of the FLSA. In its December 2013 report, GAO recommended that the Secretary of Labor direct the WHD Administrator to develop a systematic approach for identifying and considering areas of confusion that contribute to possible FLSA violations to help inform the development and assessment of its guidance. WHD agreed with the recommendation and described its plans to address it.
In an effort to promote and achieve various U.S. foreign policy objectives, Congress has expanded trade preference programs in number and scope over the past 3 decades. The purpose of these programs is to foster economic development through increased trade with qualified beneficiary countries while not harming U.S. domestic producers. Trade preference programs extend unilateral tariff reductions to over 130 developing countries. Currently, the United States offers the Generalized System of Preferences (GSP) and three regional programs, the Caribbean Basin Initiative (CBI), the Andean Trade Preference Act (ATPA), and the African Growth and Opportunity Act (AGOA). Special preferences for Haiti became part of CBI with enactment of the Haitian Hemispheric Opportunity through Partnership Encouragement (HOPE) Act in December 2006. The regional programs cover additional products but have more extensive criteria for participation than the GSP program. Eight agencies have key roles in administering U.S. trade preference programs. Led by the United States Trade Representative (USTR), they include the Departments of Agriculture, Commerce, Homeland Security, Labor, State, and Treasury, as well as the U.S. International Trade Commission (ITC). U.S. imports from countries benefiting from U.S. preference programs have increased significantly over the past decade. Total U.S. preference imports grew from $20 billion in 1992 to $110 billion in 2008. Most of this growth in U.S. imports from preference countries has taken place since 2000. This accelerated growth suggests an expansionary effect of increased product coverage and liberalized rules of origin for least- developed countries (LDC) under GSP in 1996 and for African countries under AGOA in 2000. In particular, much of the growth since 2000 is due to imports of petroleum from certain oil producing nations in Africa, accounting for 79.5 percent of total imports from Sub-Saharan Africa in 2008. For example, in that same year, U.S. imports from the oil producing countries of Nigeria grew by 16.2 percent, Angola by 51.2 percent, and the Republic of Congo by 65.2 percent. There is also evidence that leading suppliers under U.S. preference programs have “arrived” as global exporters. For example, based on a World Trade Organization (WTO) study in 2007, the three leading non-fuel suppliers of U.S. preference imports—India, Thailand, and Brazil—were among the top 20 exporters in the world, and were also major suppliers to the U.S. market. Exports from these three countries also grew faster than world exports as a whole. However, these countries have not reached World Bank “high income” level criteria, as they range from “low” to “upper middle” levels of income. GSP—the longest standing U.S. preference program—expires December 31, 2009, as do ATPA benefits. At the same time, legislative proposals to provide additional, targeted benefits for the poorest countries are pending. Preference programs entail a number of difficult policy trade-offs. For example, the programs are designed to offer duty-free access to the U.S. market to increase beneficiary trade, but only to the extent that access does not harm U.S. industries. U.S. preference programs provide duty-free treatment for over half of the 10,500 U.S. tariff lines, in addition to those that are already duty-free on a most favored nation basis. But they also exclude many other products from duty-free status, including some that developing countries are capable of producing and exporting. GAO’s analysis showed that notable gaps in preference program coverage remain, particularly in agricultural and apparel products. For 48 GSP-eligible countries, more than three-fourths of the value of U.S. imports that are subject to duties (i.e., are dutiable) are not included in the programs. For example, just 1 percent of Bangladesh’s dutiable exports to the United States and 4 percent of Pakistan’s are eligible for GSP. Although regional preference programs tend to have more generous coverage, they sometimes feature “caps” on the amount of imports that can enter duty- free, which may significantly limit market access. Imports subject to caps under AGOA include certain meat products, a large number of dairy products, many sugar products, chocolate, a range of prepared food products, certain tobacco products, and groundnuts (peanuts), the latter being of particular importance to some African countries. A second, related, trade-off involves deciding which developing countries can enjoy particular preferential benefits. A few LDCs in Asia are not included in the U.S. regional preference programs, although they are eligible for GSP-LDC benefits. Two of these countries—Bangladesh and Cambodia—have become major exporters of apparel to the United States and have complained about the lack of duty-free access for their goods. African private-sector representatives have raised concerns that giving preferential access to Bangladesh and Cambodia for apparel might endanger the nascent African apparel export industry that has grown up under AGOA. Certain U.S. industries have joined African nations in opposing the idea of extending duty-free access for apparel from these countries, arguing these nations are already so competitive in exporting to the United States that in combination they surpass U.S. free trade agreement partners Mexico and those in CAFTA, as well as those in the Andean/AGOA regions. This trade-off concerning what countries to include also involves decisions regarding the graduation of countries or products from the programs. The original intention of preference programs was to provide temporary trade advantages to particular developing countries, which would eventually become unnecessary as countries became more competitive. Specifically, the GSP program has mechanisms to limit duty-free benefits by “graduating” countries that are no longer considered to need preferential treatment, based on income and competitiveness criteria. Since 1989, at least 28 countries have been graduated from GSP, mainly as a result of “mandatory” graduation criteria such as high income status or joining the European Union. Five countries in the Central American and Caribbean region were recently removed from GSP and CBI/CBTPA when they entered into free trade agreements with the United States. In addition to country graduation, the United States GSP program also includes a process for ending duty-free access for individual products from a given country by means of import ceilings—Competitive Needs Limitations (CNL). These ceilings are reached when eligible products from GSP beneficiaries exceed specified value and import market share thresholds (LDCs and AGOA beneficiaries are exempt). Amendments to the GSP in 1984 gave the President the power to issue (or revoke) waivers for CNL thresholds under certain circumstances, for example through a petition from an interested party, or when total U.S. imports from all countries of a product are small or “de minimis.” In 2006 Congress passed legislation affecting when the President should revoke certain CNL waivers for so called “super competitive” products. In 2007, the President revoked eight CNL waivers. Policymakers face a third trade-off in setting the duration of preferential benefits in authorizing legislation. Preference beneficiaries and U.S. businesses that import from them agree that longer and more predictable renewal periods for program benefits are desirable. Private-sector and foreign government representatives have stated that short program renewal periods discourage longer-term productive investments that might be made to take advantage of preferences, such as factories or agribusiness ventures. Members of Congress have recognized this argument with respect to Africa and, in December 2006, Congress renewed AGOA’s third-country fabric provisions until 2012 and AGOA’s general provisions until 2015. However, some U.S. officials believe that periodic program expirations can be useful as leverage to encourage countries to act in accordance with U.S. interests such as global and bilateral trade liberalization. Furthermore, making preferences permanent may deepen resistance to U.S. calls for developing country recipients to lower barriers to trade in their own markets. Global and bilateral trade liberalization is a primary U.S. trade policy objective, based on the premise that increased trade flows will support economic growth for the United States and other countries. Spokesmen for countries that benefit from trade preferences have told us that any agreement reached under the Doha round of global trade talks at the WTO must, at a minimum, provide a significant transition period to allow beneficiary countries to adjust to the loss of preferences. GAO found that preference programs have proliferated over time and have become increasingly complex, which has contributed to a lack of systematic review. In response to differing statutory requirements, agencies involved in implementing trade preferences pursue different approaches to monitoring the various criteria set for these programs. We observed advantages to each approach but individual program reviews appeared disconnected and resulted in gaps. For example, some countries that passed review under regional preference programs were later subject to GSP complaints. Moreover, we found that there was little to no reporting on the impact of these programs. To address these issues, GAO recommended that USTR periodically review beneficiary countries, in particular those that have not been considered under GSP or regional programs. Additionally, we recommended that USTR should periodically convene relevant agencies to discuss the programs jointly. In our March 2008 report, we also noted that even though there is overlap in various aspects of trade preference programs, Congress generally considers these programs separately, partly because they have disparate termination dates. As a result, we suggested that Congress should consider whether trade preference programs’ review and reporting requirements may be better integrated to facilitate evaluating progress in meeting shared economic development goals. In response to the recommendations discussed above, USTR officials told us that the relevant agencies will meet at least annually to consider ways to improve program administration, to evaluate the programs’ effectiveness jointly, and to identify any lessons learned. USTR has also changed the format of its annual report to discuss the preference programs in one place. In addition, we believe that Congressional hearings in 2007 and 2008 and again today are responsive to the need to consider these programs in an integrated fashion. In addition to the recommendations based on GAO analysis, we also solicited options from a panel of experts convened by GAO in June 2009 to discuss ways to improve the competitiveness of the textile and apparel sector in AGOA beneficiary countries. While the options were developed in the context of AGOA, many of these may be applicable to trade preferences programs in general. Align Trade Capacity Building with Trade Preferences Programs: Many developing countries have expressed concern about their inability to take advantage of trade preferences because they lack the capacity to participate in international trade. AGOA is the only preference program for which authorizing legislation refers to trade capacity building assistance; however, funding for this type of assistance is not provided under the Act. In the course of our research on the textile and apparel inputs industry in Sub-Saharan African countries, many experts we consulted considered trade capacity building a key component for improving the competitiveness of this sector. Modify Rules of Origin among Trade Preference Program Beneficiaries and Free Trade Partners: Some African governments and industry representatives of the textile and apparel inputs industry in Sub-Saharan African countries suggested modifying rules of origin provisions under other U.S. trade preference programs or free trade agreements to provide duty-free access for products that use AGOA textile and apparel inputs. Similarly, they suggested simplifying AGOA rules of origin to allow duty-free access for certain partially assembled apparel products with components originating outside the region. Create Non-Punitive and Voluntary Incentives: Some of the experts we consulted believe that the creation of non-punitive and voluntary incentives to encourage the use of inputs from the United States or its trade preference partners could stimulate investment in beneficiary countries. One example of the incentives discussed was the earned import allowance programs currently in use for Haiti and the Dominican Republic. Such an incentive program allows producers to export certain amounts of apparel to the U.S., duty free, made from third-country fabric, provided they import specified volumes of U.S. fabric. Another proposal put forth by industry representatives was for a similar “duty credit” program for AGOA beneficiaries. A simplified duty credit program would create a non-punitive incentive for use of African regional fabric. For example, a U.S. firm that imports jeans made with African origin denim would earn a credit to import a certain amount of jeans from Bangladesh, duty free. However, some experts indicated that the application of these types of incentives should be considered in the context of each trade preference program, as they have specific differences that may not make them applicable across preference programs. While these options were suggested by experts in the context of a discussion on the African Growth and Opportunity Act, many of these options may be helpful in considering ways to further improve the full range of preference programs as many GSP LDCs face many of the same challenges as the poorer African nations. Some of the options presented would require legislative action while others could be implemented administratively. Mr. Chairman, thank you for the opportunity to summarize the work GAO has done on the subject of preference programs. I would be happy to answer any questions that you or other members of the subcommittee may have. For further information on this testimony, please contact Loren Yager at (202) 512-4347, or by e-mail at yagerl@gao.gov. Juan Gobel, Assistant Director; Gezahegne Bekele; Ken Bombara; Karen Deans; Francisco Enriquez; R. Gifford Howland; Ernie Jackson; and Brian Tremblay made key contributions to this statement. This is a work of the U.S. government and is not subject to copyright protection in the United States. The published product may be reproduced and distributed in its entirety without further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately.
U.S. trade preference programs promote economic development in poorer nations by providing duty-free export opportunities in the United States. The Generalized System of Preferences, Caribbean Basin Initiative, Andean Trade Preference Act, and African Growth and Opportunity Act unilaterally reduce U.S. tariffs for many products from over 130 countries. However, two of these programs expire partially or in full this year, and Congress is exploring options as it considers renewal. This testimony describes the growth in preference program imports, identifies policy trade-offs, and summarizes the Government Accountability Office (GAO) recommendations and options suggested by a panel of experts on the African Growth and Opportunity Act (AGOA). The testimony is based on studies issued in September 2007, March 2008, and August 2009. For those studies, GAO analyzed trade data, reviewed trade literature and program documents, interviewed U.S. officials, did fieldwork in nine countries, and convened a panel of experts. Total U.S. preference imports grew from $20 billion in 1992 to $110 billion in 2008, with most of this growth taking place since 2000. The increases from preference program countries primarily reflect the addition of new eligible products, increased petroleum imports from some African countries, and the rapid growth of exports from countries such as India, Thailand, and Brazil. Preference programs give rise to three critical policy trade-offs. First, opportunities for beneficiary countries to export products duty free must be balanced against U.S. industry interests. Some products of importance to developing countries, notably agriculture and apparel, are ineligible by statute as a result. Second, some developing countries, such as Bangladesh and Cambodia, are not included in U.S. regional preference programs; however, there is concern that they are already competitive in marketing apparel to the United States and that giving them greater duty-free access could harm the apparel industry in Africa and elsewhere. Third, Congress faces a trade-off between longer preference program renewals, which may encourage investment, and shorter renewals, which may provide leverage to encourage countries to act in accordance with U.S. interests such as trade liberalization. GAO reported in March 2008 that preference programs have proliferated and become increasingly complex, which has contributed to a lack of systematic review. Moreover, we found that there was little to no reporting on the impact of these programs. In addition, GAO solicited options from a panel of experts in June 2009 for improving the competitiveness of the textile and apparel sector in AGOA countries. Options they suggested included aligning trade capacity building with trade preference programs, modifying rules of origin to facilitate joint production among trade preference program beneficiaries and free trade partners, and creating non-punitive and voluntary incentives to encourage the use of inputs from the United States or its trade preference partners to stimulate investment in beneficiary countries.
Annual vaccination is the primary method for preventing influenza, which is associated with serious illness, hospitalizations, and even deaths among people at high risk for complications of the disease, such as pneumonia. Senior citizens are particularly at risk, as are individuals with chronic medical conditions. The Centers for Disease Control and Prevention (CDC) estimates that influenza epidemics contribute to approximately 20,000 deaths and 110,000 hospitalizations in the United States each year. Here in Oregon, and throughout the nation, influenza and pneumonia rank as the fifth leading cause of death among persons 65 years of age and older. Producing the influenza vaccine is a complex process that involves growing viruses in millions of fertilized chicken eggs. This process, which requires several steps, generally takes at least 6 to 8 months from January through August each year. Each year’s vaccine is made up of three different strains of influenza viruses, and, typically, each year one or two of the strains is changed to better protect against the strains that are likely to be circulating during the coming flu season. The Food and Drug Administration (FDA) and its advisory committee decide which strains to include based on CDC surveillance data, and FDA also licenses and regulates the manufacturers that produce the vaccine. Only three manufacturers—two in the United States and one in the United Kingdom—produced the vaccine used in the United States during the 2000-01 flu season. Like other pharmaceutical products, flu vaccine is sold to thousands of purchasers by manufacturers, numerous medical supply distributors, and other resellers such as pharmacies. These purchasers provide flu shots at physicians’ offices, public health clinics, nursing homes, and less traditional locations such as workplaces and various retail outlets. CDC has recommended October through mid-November as the best time to receive a flu shot because the flu season generally peaks from December through early March. However, if flu activity peaks late, as it has in 10 of the past 19 years, vaccination in January or later can still be beneficial. To address our study questions, we interviewed officials from the Department of Health and Human Services (HHS), including CDC, FDA, and the Health Care Financing Administration (HCFA), as well as flu vaccine manufacturers, distributors, physician associations, flu shot providers, and others. We surveyed 58 physician group practices nationwide to learn about their experiences and interviewed health department officials in all 50 states. Although the eventual supply of vaccine in the 2000-01 flu season was about the same as the previous year’s—about 78 million doses— production delays of about 6 to 8 weeks limited the amount that was available during the peak vaccination period. During the period when supply was limited and demand was higher, providers who wanted to purchase vaccine from distributors with available supplies often faced rapidly escalating prices. By December, as vaccine supply increased and demand dropped, prices declined. Last fall, fewer than 28 million doses were available by the end of October, compared with more than 70 million doses available by that date in 1999. Two main factors contributed to last year’s delay. The first was that two manufacturers had unanticipated problems growing one of the two new influenza strains introduced into the vaccine for the 2000-01 flu season. Because manufacturers must produce a vaccine that includes all three strains selected for the year, delivery was delayed until sufficient quantities of this difficult strain could be produced. The second factor was that two of the four manufacturers producing vaccine the previous season shut down parts of their facilities because of FDA concerns about compliance with good manufacturing practices, including issues related to safety and quality control. One of these manufacturers reopened its facilities and eventually shipped its vaccine, although much later than usual. The other, which had been expected to produce 12 to 14 million doses, announced in September 2000 that it would cease production altogether and, as a result, supplied no vaccine. These vaccine production and compliance problems did not affect every manufacturer to the same degree. Consequently, when a purchaser received vaccine depended to some extent on which manufacturer’s vaccine it had ordered. Purchasers that contracted only with the late- shipping manufacturers were in particular difficulty. For example, health departments and other public entities in 36 states, including Oregon, banded together under a group purchasing contract and ordered nearly 2.6 million doses from the manufacturer that, as it turned out, experienced the greatest delays from production difficulties. Some of these public entities, which ordered vaccine for high-risk people in nursing homes or clinics, did not receive most of their vaccine until December, according to state health officials. Because supply was limited during the usual vaccination period, distributors and others who had supplies of the vaccine had the ability— and the economic incentive—to sell their supplies to the highest bidders rather than filling lower-priced orders they had already received. Most of the physician groups and state health departments we contacted reported that they waited for delivery of their original lower-priced orders, which often arrived in several partial shipments from October through December or later. Those who purchased vaccine in the fall found themselves paying much higher prices. For example, one physicians’ practice in our survey ordered flu vaccine from a supplier in April 2000 at $2.87 per dose. When none of that vaccine had arrived by November 1, the practice placed three smaller orders in November with a different supplier at the escalating prices of $8.80, $10.80, and $12.80 per dose. On December 1, the practice ordered more vaccine from a third supplier at $10.80 per dose. The four more expensive orders were delivered immediately, before any vaccine had been received from the original April order. Demand for influenza vaccine dropped as additional vaccine became available after the prime period for vaccinations had passed. In all, roughly one-third of the total distribution was delivered in December or later. Part of this additional supply resulted from actions taken by CDC in September, when it appeared there could be a shortfall in production. At that point, CDC contracted with one of the manufacturers to extend production into late December for 9 million additional doses. Despite efforts by CDC and others to encourage people to seek flu shots later in the season, providers still reported a drop in demand in December. The unusually light flu season also probably contributed to the lack of interest. Had a flu epidemic hit in the fall or early winter, the demand for influenza vaccine would likely have remained high. As a result of the waning demand, manufacturers and distributors reported having more vaccine than they could sell. Manufacturers reported shipping about 9 percent less than in 1999, and more than 7 million of the 9 million additional doses produced under the CDC contract were never shipped at all. In addition, some physicians’ offices, employee health clinics, and other organizations that administered flu shots reported having unused doses in December and later. In a typical year, there is enough vaccine available in the fall to give a flu shot to anyone who wants one. However, when the supply is not sufficient, there is no mechanism currently in place to establish priorities and distribute flu vaccine first to high-risk individuals. Indeed last year, mass immunizations in nonmedical settings, normally undertaken to promote vaccinations, created considerable controversy as healthy persons received vaccine in advance of those at high risk. In addition, manufacturers and distributors that tried to prioritize their vaccine shipments encountered difficulties doing so. Flu shots are generally widely available in a variety of settings, ranging from the usual physicians’ offices, clinics, and hospitals to retail outlets such as drugstores and grocery stores, workplaces, and other convenience locations. Millions of individuals receive flu shots through mass immunization campaigns in nonmedical settings, where organizations, such as visiting nurse agencies under contract, administer the vaccine. The widespread availability of flu shots may help increase immunization rates overall, but it generally does not lend itself to targeting vaccine to high- priority groups. The timing of some of the mass immunization campaigns last fall generated a great deal of controversy. Some physicians and public health officials were upset when their local grocery stores, for example, were offering flu shots to everyone when they, the health care providers, were unable to obtain vaccine for their high-risk patients. Examples of these situations include the following: A radio station in Colorado sponsored a flu shot and a beer for $10 at a local restaurant and bar—at the same time that the public health department and the community health center did not have enough vaccine. One grocery store chain in Minnesota participated in a promotion offering a discounted flu shot for anyone who brought in three soup can labels. Flu shots were available for purchase to all fans attending a professional football game. CDC took some steps to try to manage the anticipated vaccine delay by issuing recommendations for vaccinating high-risk individuals first. In July 2000, CDC recommended that mass immunization campaigns, such as those open to the public or to employee groups, be delayed until early to mid-November. CDC issued more explicit voluntary guidelines in October 2000, which stated that vaccination efforts should be focused on persons aged 65 and older, pregnant women, those with chronic health conditions that place them at high risk, and health care workers. The October guidelines also stated that while efforts should be made to increase participation in mass immunization campaigns by high-risk persons and their household contacts, other persons should not be turned away. Some organizations that conducted mass immunizations said they generally did not screen individuals who came for flu shots in terms of their risk levels. Some said they tried to target high-risk individuals and provided information on who was at high risk, but they let each person decide whether to receive a shot. Their perspective was that the burden lies with the individual to determine his or her own level of risk, not with the provider. Moreover, they said that the convenience locations provide an important option for high-risk individuals as well as others. Health care providers in both traditional and nontraditional settings told us that it is difficult to turn someone away when he or she requests a flu shot. The manufacturers and distributors we interviewed reported that it was difficult to determine which of their purchasers should receive priority vaccine deliveries in response to CDC’s recommendations to vaccinate high-risk individuals first. They did not have plans in place to prioritize deliveries to target vaccine to high-risk individuals because there generally had been enough vaccine in previous years and thus there had been little practical need for this type of prioritization. When they did try to identify purchasers serving high-risk individuals, the manufacturers and distributors often found they lacked sufficient information about their customers to make such decisions, and they also were aware that all types of vaccine providers were likely to serve at least some high-risk individuals. As a result, manufacturers reported using various approaches in distributing their vaccine, including making partial shipments to all purchasers as a way to help ensure that more high-risk persons could be vaccinated. Others made efforts to ship vaccine first to nursing homes, where they could be identified, and to physicians’ offices. All of the manufacturers and distributors we talked to said that once they distributed the vaccine it would be up to the purchasers and health care providers to target the available vaccine to high-risk groups. Immunization statistics are not yet available to show how successful these ad hoc distribution strategies may have been in reaching high-risk groups, but there may be cause for concern. Some state health officials reported that nursing homes often purchase their flu vaccine from local pharmacies, and some distributors considered pharmacies to be lower priority for deliveries. In addition, many physicians reported that they felt they did not receive priority for vaccine delivery, even though nearly two- thirds of seniors—one of the largest high-risk groups—generally get their flu shots in medical offices. The experience of the 58 physicians’ practices we surveyed seemed consistent with this reported lack of priority: as a group, they received their shipments at about the same delayed rate that vaccine was generally available on the market. Ensuring an adequate and timely supply of vaccine, already a difficult task given the complex manufacturing process, has become even more difficult as the number of manufacturers has decreased. Now, a production delay or shortfall experienced by even one of the three remaining manufacturers can significantly affect overall vaccine availability. Looking back, we are fortunate that the 2000-01 flu season arrived late and was less severe than normal because we lacked the vaccine last October and November to prepare for it. Had the flu hit early with normal or greater severity, the consequences could have been serious for the millions of Americans who were unable to get their flu shots on time. This raises the question of what more can be done to better prepare for possible vaccine delays and shortages in the future. We need to recognize that flu vaccine production and distribution are private-sector responsibilities, and as such options are somewhat limited. HHS has no authority to directly control flu vaccine production and distribution, beyond FDA’s role in regulating good manufacturing practices and CDC’s role in encouraging appropriate public health actions. Working within these constraints, HHS undertook several initiatives in response to the problems experienced during the 2000-01 flu season. For example, the National Institutes of Health, working with FDA and CDC, conducted a clinical trial on the feasibility of using smaller doses of vaccine for healthy adults. If smaller doses offer acceptable levels of protection, this would be one way to stretch limited vaccine supplies. Final results from this work are expected in fall 2001. In addition, for the upcoming flu season CDC and its advisory committee extended the optimal period for getting a flu shot until the end of November, to encourage more people to get shots later in the season. HHS is also working to complete a plan for a national response to a severe worldwide influenza outbreak, called a pandemic. While the plan itself would likely be applied only in cases of public health emergencies, we believe that the advance preparations by manufacturers, distributors, physicians, and public health officials to implement the plan could provide a foundation to assist in dealing with less severe problems, such as those experienced last year. We believe it would be helpful for HHS agencies to take additional actions in three areas. Progress in these areas could prove valuable in managing future flu vaccine disruptions and targeting vaccine to high-risk individuals. First, because vaccine production and distribution are private- sector responsibilities, CDC needs to work with a wide range of private entities to prepare for potential problems in the future. CDC can take an ongoing leadership role in organizing and supporting efforts to bring together all interested parties to formulate voluntary guidelines for vaccine distribution in the event of a future vaccine delay or shortage. In March 2001, CDC co-sponsored a meeting with the American Medical Association that brought together public health officials, vaccine manufacturers, distributors, physicians, and other providers to discuss flu vaccine distribution, including ways to target vaccine to high-risk groups in the event of a future supply disruption. This meeting was a good first step, and continued efforts should be made to achieve consensus among the public- and private-sector entities involved in vaccine production, distribution, and administration.
Until the 2001 flu season, the production and distribution of influenza vaccine generally went smoothly. Last year, however, several people reported that they wanted but could not get flu shots. In addition, physicians and public health departments could not provide shots to high-risk patients in their medical offices and clinics because they had not received vaccine they ordered many months in advance, or because they were being asked to pay much higher prices for vaccine in order to get it right away. At the same time, there were reports that providers in other locations, even grocery stores and restaurants, were offering flu shots to everyone--including younger, healthier people who were not at high risk. This testimony discusses the delays in production, distribution, and pricing of the 2000-2001 flu vaccine. GAO found that manufacturing difficulties during the 2000-2001 flu season resulted in an overall delay of about six to eight weeks in shipping vaccine to most customers. This delay created an initial shortage and temporary price spikes. There is no system in place to ensure that high-risk people have priority for receiving flu shots when supply is short. Because vaccine purchases are mainly done in the private sector, federal actions to help mitigate any adverse effects of vaccine delays or shortages need to rely to a great extent on collaboration between the public and private sectors.

Dataset Card for "govreport-4096"

More Information needed

Downloads last month
2
Edit dataset card