Browse our range of publications including performance and financial statement audit reports, assurance review reports, information reports and annual reports.
The audit scope covered development of the R2R Program, management of the initial R2R Program and changes made to the Program funding conditions and administrative guidance for Auslink Roads to Recovery. The scope did not include management of Auslink Roads to Recovery. The audit objectives were to: · assess the efficiency and effectiveness of the management of the initial R2R Program; and · identify any opportunities for improvements to management of the Program.
Parliamentary Committees, particularly Senate Estimates Committees, have for many years taken an interest in the use of consultants by Australian government agencies. In this context, and having regard to the extent of expenditure by FMA Act agencies on consultants, the objective of this audit was to assess the accuracy and completeness of Australian government agencies' reporting of expenditure on consultants.
This audit is a part of the ANAO's protective security audit coverage. The objective of this audit was to determine whether agencies audited had developed and implemented sound IT security management principles and practices supported by an IT security control framework, in accordance with Australian Government policies and guidelines. The audit at each agency examined the framework for the effective management and control of IT security, including the management of IT operational security controls and, where applicable, was based on the Australian Government protective security and information and communications technology (ICT) security guidelines that were current at that time.
The objectives of the audit were to assess agency performance in relation to compiling their Internet listings as required by the Senate Order and the appropriateness of the use of confidentiality provisions in Commonwealth contracts. The audit involved a detailed examination in seven agencies of the processes used to compile their Internet listings and the use of confidentiality provisions in contracts.