This is in response to your letter of June 23, 2015 requesting that the U.S. Equal Employment Opportunity Commission (EEOC) Office of Inspector General (OIG) analyze
non-career officials' involvement, if any, in the EEOC's Freedom of Information Act (FOIA) response process for the period of January 1, 2007 to the present. Specifically,
News Stand
-
Report Title: Congressional Request to Analyze EEOC Non-Career Officials' Involvement in Agency FOIA ProgramTags:
-
Report Title: EEOC Among Several Federal Agencies to Receive Settlement from Global Computer Enterprises, Inc. (GCE)
GCE to settle $9 million in civil claims to the United States stemming from allegations that it concealed its utilization of prohibited employees on software services contracts with the federal government.
For the complete story regarding EEOC’s settlement with Global Computer Enterprises, Inc. please visit http://www.justice.gov/usao-edva/pr/it-software-services-contractor-and-its-president-agree-pay-9-million-settle-civil
Tags: -
Report Title: OIG Strategic Framework 2015 - 2017
The Office of Inspector General (OIG) outlines the vision and priorities that guide the office as we carry out our mission to protect the integrity of EEOC programs and operations and the health and welfare of the people they serve through its Strategic Framework. A Strategic Framework is a comprehensive picture of the organization's strategy. It clarifies how individual efforts and team projects can be connected to achieve the best outcome.
Tags: -
Report Title: Bicameral Task Force on Climate Change
We are pleased to respond to your request for information regarding how the U. S.
Equal Employment Opportunity Commission (EEOC) is carrying out policies to address
climate change.Tags: -
Report Title: OIG Fraud Alert
“Phishing” is a general term for criminals’ creation and use of e-mails and websites – designed
to look like e-mails and websites of well known legitimate businesses, financial institutions, and
government agencies – in order to deceive Internet users into disclosing their bank and financial
account information, or other personal data such as usernames and passwords. The “phishers”
then take that information and use it for criminal purposes, such as identity theft and fraud.Tags: