Changeflow GovPing Government & Legislation How to Report Grant Fraud and Protect Funding
Routine Notice Added Final

How to Report Grant Fraud and Protect Funding

Favicon for www.grants.gov Grants.gov
Published
Detected
Email

Summary

Grants.gov published guidance reminding federal financial assistance recipients of their fraud-reporting obligations under federal law. Recipients and subrecipients must report suspected award-related waste, fraud, and abuse to their awarding agency's Office of Inspector General. The guidance also outlines cybersecurity best practices including zero-trust policies, role-based access controls, and the principle of least privilege.

“Recipients and subrecipients must advise affected parties on their protections when reporting fraud.”

Published by Grants.gov on grantsgovprod.wordpress.com . Detected, standardized, and enriched by GovPing. Review our methodology and editorial standards .

About this source

GovPing monitors Grants.gov for new government & legislation regulatory changes. Every update since tracking began is archived, classified, and available as free RSS or email alerts — 3 changes logged to date.

What changed

Grants.gov issued guidance reminding federal financial assistance recipients of their obligations under federal law to report suspected fraud. The document cites 2 CFR Part 200.303, requiring recipients to implement effective internal controls as outlined in GAO's Green Book or COSO's Internal Control Integrated Framework. Recipients must inform employees in writing of their fraud-reporting rights and protections.

Federal grant recipients and subrecipients should review their internal control frameworks, ensure employees are trained on fraud-awareness policies, and establish clear procedures for reporting suspected waste, fraud, and abuse to the appropriate Office of Inspector General. Organizations should also assess their cybersecurity posture against the recommended best practices including zero-trust architecture, role-based access controls, and least-privilege access.

Archived snapshot

Apr 22, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

Safeguarding Federal funds and maintaining a secure cyber environment is of the utmost importance to awarding agencies. Recipients are a crucial part of safeguarding funds. Security is everyone’s responsibility, and an effective cyber security strategy helps prevent and identify fraud. Your diligence is key. We encourage you to share this information within your organization.

Each year, the Federal government awards trillions in Federal financial assistance. The vast majority of these funds are used according to the terms of the award and support critical activities across the Nation and in your local communities. Yet award-making agencies, recipients, and the general public are often preyed upon by fraudulent actors who use a variety of tactics to steal funding and other resources from the government and recipients.

Recipient organizations are an important partner in addressing these threats.

The Recipient’s Role

  • Institute Robust Internal Controls.  Recipients and their employees are critical in fighting waste, fraud, and abuse related to taxpayer-funded programs. It is in everyone’s best interest to ensure Federal funds are used properly.

  • Report Suspected Waste, Fraud, and Abuse.  Federal law mandates that all Federal contractors, subcontractors, grantees, subgrantees, or personal services contractors must report suspected fraud and inform their employees in writing of the rights and remedies of reporting suspected fraud provided under Federal law.

    • Where to Report . Anyone may report suspected award-related waste, fraud, and abuse to their awarding agency Office of Inspector General.
    • Reporting Protections.  Recipients and subrecipients must advise affected parties on their protections when reporting fraud.
  • Increase Fraud and Security Awareness. In addition to internal controls,an educated workforce is the most important tool we have to prevent fraud. Train users to be aware of and understand policies, procedures, and best practices, including ensuring employees take and pass required security awareness and other training courses. This helps reduce human error, negligence, and misconduct. These additional materials may help you and your organization:

  • Strengthen Security and Mitigate Risk. The digital landscape is rife with cyber threats. The following best practices are essential to a proactive defense:

    • Set Role-Based Access Controls. To manage system user access, accounts, and permissions, first identify each user’s roles and needs. Roles can be categorized based on functions and responsibilities, and user needs can be specific requirements and expectations of each role. Setting user role-based access controls will help define the appropriate user access and permissions.
    • Adopt a Zero-Trust Policy.  A zero-trust policy means that individuals and devices are considered potential threats and should be treated accordingly.  When working under the zero-trust policy, system administration employees should be able to identify and verify the identity of all users and devices, detect and respond to potential security risks, and consistently authenticate and authorize access to resources. It is also essential to identify any abnormal behaviors while tracking activities and risk levels.
    • Follow the Principle of Least Privilege. The Principle of Least Privilege ensures users have the minimum access and permissions to perform their tasks. Practicing this principle helps reduce the risk of unauthorized access, data breaches, and vulnerabilities. To implement this, review and audit each user’s current access and permissions regularly and deactivate or restrict any unnecessary privileges that are not consistent with set role-based access controls.
    • Inventory, Update, and Audit User Accounts. Regularly inventory, update, and audit accounts. Establish a schedule and a process for evaluating and modifying user access and permissions based on your network’s feedback, reports, audits, and role-based access controls. This ensures user access is current and allows system administration employees to identify accounts that should be deactivated quickly.

Share this post:

- Facebook

Related

CFR references

2 CFR 200.303

Get daily alerts for Grants.gov

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from Grants.gov.

What's AI-generated?

The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.

Last updated

Classification

Agency
Grants.gov
Published
February 12th, 2024
Instrument
Notice
Branch
Executive
Legal weight
Non-binding
Stage
Final
Change scope
Minor

Who this affects

Applies to
Government agencies Nonprofits Educational institutions
Industry sector
9211 Government & Public Administration
Activity scope
Grant fraud reporting Internal controls implementation Cybersecurity best practices
Geographic scope
United States US

Taxonomy

Primary area
Government Contracting
Operational domain
Compliance
Topics
Anti-Money Laundering Cybersecurity Financial Services

Get alerts for this source

We'll email you when Grants.gov publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!