Source · Select Committees · Public Accounts Committee
Recommendation 5
5
Poor data and legacy IT are a barrier to effective oversight of its arm’s-length bodies.
Conclusion
Poor data and legacy IT are a barrier to effective oversight of its arm’s-length bodies. There are real risks to departments as a result of aging IT systems, including threats to resilience and inconsistencies in data presentation and comparability. Legacy IT systems can also lead to issues in identifying and collecting the right data, which is crucial to understanding the costs and benefits of different delivery approaches, and for departments to be able to manage their ALBs effectively. In addition to operational risk, legacy IT systems can also give rise to increased financial costs. This committee’s report on the challenges in using data across government found that aging IT systems make extracting data expensive and sometimes impossible. We therefore welcome HM Treasury’s commitment to considering the risks posed by legacy IT as part of the next Spending Review. Government’s delivery through arm’s-length bodies 7 Recommendation: HM Treasury should write to us as soon as possible after the Spending Review to outline how bids to resolve systemic legacy IT issues have been addressed as part of Spending Review 2021.
Government Response
Acknowledged
HM Government
Acknowledged
5.1 The government agrees with the Committee’s recommendation. Target implementation date: Winter 2021 5.2 HM Treasury will write to the Committee setting out how the 2021 Spending Review process and decisions are addressing legacy IT issues. These decisions have been informed by work that the Cabinet Office’s Central Digital and Data Office and Government Security Group undertook with departments and HM Treasury spending teams to identify digital, data and technology challenges and areas to prioritise funding in the 2021 Spending Review. The government is investing £2.6 billion in cyber and legacy IT over the 2021 Spending Review period, with a particular emphasis on improving the government’s own cyber security.