The Center for Public Integrity, a non-profit research group headquartered in Washington, DC, released a report this week entitled "Phone fund for schools, libraries riddled with fraud." The report has already become the source of a story in The New York Times. A copy of the report is available as a Bulletin on the E-Rate Central Web site.
The report is well worth reading by applicants and service providers alike because it pulls together a number of developments on questionable practices that have been reported in this newsletter in recent months including the results of SLD and FCC audits, the recent SLD warning associated with the denial of funding to an IBM customer, and the criminal indictment of Connect2. While the report starts with a sensational tone - indicating that the program is "honeycombed with fraud and financial shenanigans" - it makes it clear that the referenced problems were identified and are being addressed by the program administrators.
One particularly interesting aspect of the center's work is a series of attachments representing portions of E-rate audit reports (for FY 1999 and FY 2000) obtained under a Freedom of Information Act request. The general format of these reports is instructive because they indicate the primary line of inquiry that has been taken in earlier on-site audits. Specifically:
(1) General Procedures: The auditors started with a review of an applicant's funding requests from the Form 470s and Form 471s through the Program Integrity Assurance reviews and Funding Commitment Decision Letters. Basically the auditors were asking: (a) what was the applicant asking for; (b) how did they ask for it; and (c), what did the SLD agree to fund?
(2) Understanding the Business: The auditors then discussed the entire E-rate process with an applicant to determine how the technology plan was created and validated, how the application forms were completed and structured, and what controls were in place to monitor the expenditures and E-rate claims.
(3) Technology Plan: The auditors verified that the technology plan established clear goals and strategies, and that the plan had been formally approved.
(4) Competitive Bid Process: The auditors asked about the applicant's competitive bidding to determine how vendors were selected and whether the process was adequate for choosing the most cost effective suppliers.
(5) Supported Payments: The auditors compared many of the actual service bills with the amounts shown on the E-rate invoices (BEARs or supplier invoices). They also checked vendor authorizations on BEARs, verified that the equipment and services matched the original Item 21 attachments, and confirmed that the applicant paid the non-discounted amounts.
(6) Site Visits: The auditors physically verified that all funded equipment existed in the locations specified in the applications, that it was being used for educational purposes, and that proper inventory controls were in place.
|