Administrative Integrity of the Social Security Program: Hearing Before the Subcommittee on Social Security of the Committee on Finance, United States Senate, Ninety-sixth Congress, First Session, April 9, 1979

Pirmais vāks

No grāmatas satura

Atlasītās lappuses

Citi izdevumi - Skatīt visu

Bieži izmantoti vārdi un frāzes

Populāri fragmenti

5. lappuse - Mr. Chairman and members of the Subcommittee: I am grateful for this opportunity to appear before you today.
53. lappuse - This concludes my prepared statement. We will be glad to answer any questions you or other members of the Subcommittee may have.
41. lappuse - Hearings Before the Subcommittee on Oversight of the House Committee on Ways and Means, 101st Cong., 2d Sess.
49. lappuse - SSA's Program for Reviewing the Disability of Persons With Mental Impairments (Apr. 7, 1983); and testimony before the Subcommittee on Social Security, House Committee on Ways and Means on SSA's Program for Reviewing the Continuing Eligibility of Disabled Persons (June 30, 1983).
48. lappuse - Office, before the Subcommittee on Oversight, House Committee on Ways and Means, on profitability of the property/casualty insurance industry, Washington, DC, April 28, 1986.
52. lappuse - ... access to agency facilities, records, and payment systems. SSA records contain private, personal information necessary to support present and future Social Security benefits, and thus constitute a valuable national resource that must be safeguarded against alteration, destruction, abuse, or misuse. To assure the Congress, the public and beneficiaries that these records are properly safeguarded, adequate management support and an aggressive security program must be maintained. Since 1976 we have...
32. lappuse - In the supplemental security income and Aid to Families with Dependent Children programs, similar quality assurance systems have helped us to greatly reduce payment errors over the last few years.
45. lappuse - ... failed to (1) use audit trail features within the system, (2) incorporate user identification control techniques within the system, and (3) always lock terminals during non-working hours.
27. lappuse - That simplicity has given way over the years to an extremely complex series of computation methods and interacting conditions that make benefit computations highly error prone.

Bibliogrāfiskā informācija