Tuesday, November 09, 2010

Risk of corruption in bureaucracy, an Australian report analyses

THE Australian bureaucracy, known for its high efficiency and delivery, is also fraught with corruption charges though the nature of such acts is quite different from that of India.
According to a report published by The Canberra Times recently, the Commission for Public Administration’s annual Over the Horizon report says the bureaucracy investigated 20 incidents of alleged fraud and graft in 2009-10, up from 12 in 2008. What is interesting is the nature of corruption. The report found the greatest risk to the public service's integrity was staff fraud, such as false pay claims, theft and misuse of office equipment and fuel cards. Significantly, many of such aspects like photocopying for personal use or personal phone calls etc. are often ignored from the purview of corruption in India.
In Australia, three public servants were referred to police for such acts. It was also mentioned that corrupt bureaucrats pose a greater danger to Canberra taxpayers than fraudulent members of the public.
Also Read

SC to examine appointment files of PJ Thomas
The Supreme Court on Monday decided to examine the file on appointment of new CVC PJ Thomas, a 1973 batch Kerala cadre retired IAS. Thomas’ name figured in a charge sheet in a criminal case decades ago. A bench of Chief Justice SH Kapadia said they would like to see the file while acting on a petition questioning the new Central Vigilance Commissioner's integrity and challenging his appointment.

Hackers lure Indian bureaucrats with porn sites
Hackers from China, Pakistan and Nigeria are reportedly taking advantages of some Indian bureaucrats’ soft corner to watch pornographic materials during office hours. The hackers mostly use porn attachments to lure officials and staff to click on those with the intention of taking away sensitive materials. Recently, Indian home ministry’s cyber security wing has asked bureaucrats not to click on any external links on their emails as that could be the route for hackers to steal sensitive information stored in office computers.

No comments:

Post a Comment