ReliAscent is proud to feature another special guest blog from one of our valued Federal Contracting Industry partners, TSheets.Read the Full Blog Here
DCAA COMPLIANCE BLOG
Your Source for DCAA News and Government Contracting Information
Time Tracking for DCAA Compliance: Work Smarter, Not Harder, With Automated Time Tracking (TSheets Guest Blog)
Posted by Angie O'Hara on Tue, Feb 21, 2017 @ 09:30 AM
I think everyone has heard of the issues of major corporation computers being hacked into and information stolen. The first big example I remember on this was last year during the holiday season when the Target stores computer was hacked and identity information of some 40 million customers was exposed. In June this year, P.F. Chang’s restaurant reported that transactions from September 2013 until now were also potentially stolen. UPS announced in August that 100,000 transactions from January thru August of 2014 were potentially opened, exposing not only credit card information but names, addresses and e-mail addresses. At the end of August, Home Depot reported their computer was hacked into and credit card transactions at their stores from the period of April thru August of 2014 were exposed.
So what is my point? All of these companies are retail outlets and it makes sense that computer hackers might look to these systems to steal information. I think there are two points. First, this seems to be a recent trend that we haven’t seen before. It means that we need to be more vigilant in our efforts to keep computers and data on those computers secure. Everyone talks about security and confidentiality of data but these large corporations were caught by surprise and smaller businesses that don’t have the resources of a large company are vulnerable as well, perhaps to a larger extent. The second point is this trend has made it’s way into the government contractor market as well. In August, a Department of Homeland Security contractor had a computer breach. This contractor was providing background checks for the DHS and potentially exposed a number of DHS employee’s information. The FBI is currently investigating this. Again, last month it was announced that there was a breach in the Deltek computer system used for timekeeping. This breach exposed many defense contractor’s data. The contractors may see erroneous entries in their personal account or changes in balances. This breach occurred back in March but only recently has been publicized. The FBI is also investigating this breach. It is rumored that an arrest has been made in this case.Read the Full Blog Here
Posted by Mike Anderson on Fri, Jan 17, 2014 @ 10:51 AM
There is usually no argument that timekeeping and labor recording are the most important part of government contracting. We have written many blogs on the subject. One thing that is perhaps not clear is the retention of records relating to this labor recording. If you are using a manual timekeeping system, there is usually no issue with keeping timecards. I think most people have a hard time discarding paper records.
This week I was having a conversation with a new client about how to properly set-up and use an automated timekeeping system. Since this is one of the most important elements for many government contractors (and probably the number one DCAA audit finding related to labor recording and/or distribution) I thought it would be a good idea to share these ideas. While I was discussing the operation of an automated timekeeping (web based timekeeping) system this week, the same guidelines apply to a manual timekeeping system.