Welcome!

News Feed Item

New SBA "Safe Harbor" Policy Could Encourage More Contracting Fraud

PETALUMA, Calif., Aug. 11, 2014 /PRNewswire-USNewswire/ -- The American Small Business League (ASBL) is reporting that the Small Business Administration (SBA) is taking public comment on a new policy that would create a "safe harbor from fraud penalties" for large businesses that misrepresent themselves as small businesses to illegally receive federal small business contracts.

The SBA's "safe harbor from fraud penalties" is being strongly opposed by Chambers of Commerce around the country, Veterans business groups, Tea Party groups and the American Small Business League.

Every year for a decade the SBA Office of Inspector General has named the diversion of federal small business contracts to large businesses as the number one problem at the SBA. The SBA has consistently refused to adopt any policies to halt the rampant fraud.

The SBA even denied the widely reported fraud calling it a "myth" in a 2007 press release titled "Myth vs. Fact".

NBC, CBS, ABC, CNN, MSNBC and CNBC have all reported on the fraud and abuse at the SBA.

As early as 1995 the SBA Inspector General uncovered large businesses were continuing to misrepresent themselves as small business to illegally land federal small business contracts, even after they had lost formal size standard protests. The SBA Inspector General recommended the SBA produce a list of fraudulent firms and circulate it among federal agencies to halt the fraud.

The SBA declined the Inspector General's recommendation's responding that, "the risks outweighed the benefits" of producing such a list.

In 2003 an investigation by the Government Accountability Office (GAO) found over 5,000 large businesses were receiving federal small business contracts.

An investigation commissioned by the SBA Office of Advocacy found large businesses were continuing to receive federal small business contracts as a result of "vendor deception".

A 2005 investigation by the SBA Inspector General found large businesses were committing contracting fraud by making "false certifications" and "improper certifications".

Report 5-14 from the SBA Inspector General found the SBA was reporting awards to large businesses as small business awards in its own procurements. One of the firms the SBA reported, as a small business was Buhrmann NV, a firm located in Holland with over 26,000 employees around the world in 28 countries.

An investigation by the General Accounting Office essentially accused the SBA of encouraging fraud. GAO Report 10-108 stated, "By failing to hold firms accountable, SBA and contracting agencies have sent a message to the contracting community that there is no punishment or consequences for committing fraud…"

Individuals can send comments to the SBA on the "safe harbor from fraud penalties" policy by going to the proposed rule on the Federal Register website and clicking on "Submit a formal comment" in the upper right hand corner. The comment period will end on August 25, 2014.

SOURCE American Small Business League

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Enterprises are universally struggling to understand where the new tools and methodologies of DevOps fit into their organizations, and are universally making the same mistakes. These mistakes are not unavoidable, and in fact, avoiding them gifts an organization with sustained competitive advantage, just like it did for Japanese Manufacturing Post WWII.
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
DevOps with IBMz? You heard right. Maybe you're wondering what a developer can do to speed up the entire development cycle--coding, testing, source code management, and deployment-? In this session you will learn about how to integrate z application assets into a DevOps pipeline using familiar tools like Jenkins and UrbanCode Deploy, plus z/OSMF workflows, all of which can increase deployment speeds while simultaneously improving reliability. You will also learn how to provision mainframe syste...
CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term.
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
"DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at @DevOpsSUMMIT and CloudEXPO tell the world how they can leverage this emerging disruptive trend."
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...