Policies and procedures matter!

There was an interesting article online about a recent audit of the Charlotte Douglas International Airport. No fraud or deliberate mismanagement was uncovered by the auditors but they did find insufficient oversight of contracts, grants, procurement, etc. The interim aviation director, Brent Cagle, summed up the audit best by describing how it hurts the airport’s credibility, “it erodes confidence…and we need to restore that.”

One of the audit’s findings, though, blew me away:

There are no formal, documented policies and procedures at Charlotte Douglas for important functions such as project management, bidder selection on contracts, grant compliance reporting and change orders on contracts. McGladrey [the external auditor] said the lack of such written policies ‘increases risk of errors and omissions.'”

Shocking!

Continue reading

Safeguarding sensitive information

The Uniform Guidance for federal grant management places a greater emphasis on safeguarding personally identifiable information than earlier versions of grant management regulations. Non-federal organizations (private and public) need to update their policies and procedures manuals to reflect this new requirement if they don’t already have an existing policy. Below is language The Grant Doctors developed for its policies and procedures manual template.

Please feel free to modify it for your organization’s specific circumstances. Don’t simply cut-and-paste it into your policies and procedures manual, then forget about it. Read it, digest it, understand it, customize it and use it.

Continue reading

State Auditor Finds Fault With Everett’s Handling of Police Hiring Grant

September 30, 2013

The State Auditor released a finding today as a result of an audit conducted on Federal funds used to pay for police officers in the City of Everett. The finding and the city’s response are below.

The United States Department of Justice awarded the City a COPS Hiring Program grant in 2009. The City may use the funds over three years to pay the salary of entry level officers or re-assigned officers working on specific community safety programs created under the terms of the grant. In 2012 the City spent $233,461 to pay for the third year of salaries and benefits for new officers hired, although not assigned, to these specific programs.

Read the complete story here.

Audit finds federal money meant to fight crime in Atlanta misspent

Tuesday, Sept. 24, 2013
WSB-TV Atlanta

ATLANTA — Federal money meant to fight crime in the City of Atlanta was misspent and mismanaged by city leaders, according to a federal audit by the U.S. Department of Justice Office of the Inspector General.

Auditors said they also ran into roadblocks gaining documentation to verify where federal grant monies for the city’s Weed and Seed program was going. The objective of City of Atlanta’s Weed and Seed program, which was funded through federal grants, was to prevent and control crime in neighborhoods including Mechanicsville, Pittsburgh, English Avenue and Vine City.

“The city’s Weed and Seed director sometimes did not respond to us for weeks or provided incomplete or incorrect information. Some of our questions pertaining to a payment to a former city employee were never answered,” the federal report stated.
The City of Atlanta received $1.12 million in federal grants from 2007-2012.

Read the complete story.

HUD audit questions Milwaukee nonprofit’s account of spending

By Georgia Pabst of the Journal Sentinel
Sept. 23, 2013

A federal audit has found that a Milwaukee nonprofit that administers a variety of programs to assist the poor and homeless did not properly administer $1.7 million in federal grants.

The audit was conducted by the U.S. Department of Housing and Urban Development Office of Inspector General in response to an anonymous complaint alleging misuse of grant money by Community Advocates, according to the 31-page report.

The audit, dated Sept. 17, faults the agency for not ensuring that supportive housing program money that assists the homeless was used for eligible activities. It also found that the agency did not maintain documentation to support the required matching contributions.

The agency also failed to maintain a financial management system that separately tracked the source and use of American Recovery and Reinvestment Act funds and lacked sufficient documentation to support the allocation of operating costs, the audit said.

Read the complete story.

Lowell Housing Authority barred from no-bid union labor

Audit revealed failure to seek cost estimates
By Lyle Moran, 09/22/2013

LOWELL — The federal government has barred the Lowell Housing Authority from performing construction projects with no-bid union labor, known as force-account labor, for the foreseeable future.

The U.S. Department of Housing and Urban Development told the LHA that it had to stop using federal capital funds on force-account labor projects due to findings in an audit completed by HUD’s Office of the Inspector General.

In the audit released publicly in early September, HUD’s inspector general found the LHA failed to seek cost estimates or keep detailed records so it could not ensure that more than $9.2 million spent on 14 force-account projects from 2008 to 2012 was cost-effective.

Read the entire story here.

City out of compliance with federal law for second straight year

by KEVAN MOORE, Bremerton Patriot Staff Writer
Sep 18, 2013

The City of Bremerton is set to be slapped with two findings by the Washington State Auditor’s Office.

For the second year in a row, the city failed to comply with the Davis-Bacon Act, a federal law designed to ensure laborers are paid prevailing wages while working on public projects.

In addition, state auditors found that the city’s Community Development Block Grant program was not administered properly. Specifically, four of the seven loans that auditors looked at no longer qualified to be deferred and the city should have collected $23,120. Those loans included two to a borrower who passed away in 1997 and one involving a home that was sold in 2008.

Read the entire story here.

SIG compliance

I received a note from a colleague, working with an LEA, asking if there have been any audits by the US Department of Education (ED) finding LEAs out of compliance with the School Improvement Grant’s (SIG) terms and conditions. Apparently, the superintendent of this LEA is drastically changing how the grant is being implemented-to the point that the work being performed no longer resembles what was described in their application. My colleague advised the superintendent about needing approval before making significant changes to the project; the superintendent’s position is that no matter what he does, “they won’t take [the grant] away.”

Unfortunately, and realistically, the superintendent might be right (in his thoughts, not his actions). SIG funds are granted to SEAs that turn around and grant funds to LEAs through a competitive process. It’s on the SEAs to monitor the LEAs compliance. As we know, most SEAs have too few program staff to effectively monitor all of their grantees. Unless and SEA can regularly send people on site to compare an LEA’s application to their actual implementation, the SEAs rely upon annual progress reports to be an accurate reflection of the grant’s implementation. The US Department of Education conducts monitoring visits with the SEAs but ED will visit only a few of the larger LEAs for their on site focus groups and documentation reviews. Smaller LEAs fly under the radar; odds are changes will not be immediately discovered.

Just because one might not get caught, doesn’t justify one’s actions. Let’s assume the changes made by the superintendent above are permissible, his LEA still needs approval from the SEA before implementing the changes. Obtaining prior approval is not complicated. State and federal funders want to approve change requests when the change(s) benefit all parties (i.e., grantor, grantee and beneficiary). Take the extra step-a couple Emails, a couple phone calls-and receive prior approval when it’s required.