Image
              
DUE TO A LAPSE IN GOVERNMENT FUNDING, ALL NON-EXCEPTED OIG EMPLOYEES ARE FURLOUGHED AND MUST CEASE ALL OIG WORK-RELATED ACTIVITIES.
This website will not be monitored or updated until full operations resume.
Your interest in the efficiency of Postal Service programs is important to us. Our Hotline remains operational, and you may still submit your concern and it will be reviewed.
You may also submit FOIA requests, however we cannot respond until the government reopens.
| Report Title | Date | Report Type | Category | |
|---|---|---|---|---|
Image 
               
 | 
                                                                                        Wireless Assessment | Audit Reports | Security, Technology | |
Image 
               
 | 
                                                                                        Management of Suppliers’ Contractual Performance | Audit Reports | Human Resources | |
Image 
               
 | 
                                                                                        State of Cybersecurity | Audit Reports | Technology | |
Image 
               
 | 
                                                                                        U.S. Postal Inspection Service’s Prosegur Contract | Audit Reports | Technology, Security | |
Image 
               
 | 
                                                                                        U.S. Postal Service Knowledge Continuity | Audit Reports | Human Resources | |
Image 
               
 | 
                                                                                        Supplier Qualifications | Audit Reports | Human Resources | |
Image 
               
 | 
                                                                                        U.S. Postal Service Recognition and Awards Program | Audit Reports | Human Resources | |
Image 
               
 | 
                                                                                        The Role of the Postal Service in Identity Verification | White Papers | Technology, Security | |
Image 
               
 | 
                                                                                        Workplace Environment Tracking System User Access | Audit Reports | Security, Technology | |
Image 
               
 | 
                                                                                        Mitigation of Findings Identified During Assessment and Authorization Process | Audit Reports | Security, Technology |