Case Study Of The Supplemental Nutrition Assistance System

Great Essays
B. USDA/FNS--what?
The USDA/FNS has been mentioned a few times through this point. You may have questions as to what they do. Here is an overview of what they do. The Supplemental Nutrition Assistance Program is a fully federally funded program through the United Stated Department of Agriculture/Food and Nutrition Service (USDA/FNS). SNAP is administered through each state under the policies prescribed by FNS. In other words, they are directly responsible for making sure that SNAP (and other programs) are being run the way it needs to be run.
USDA/FSN is responsible for the follow programs:
• National School Lunch Program (Including School Breakfast Program)
Child and Adult Care Food Program
• Summer Food Service Program
• Food Distribution
…show more content…
The State would like to have a faster turnaround time, as older information is harder to pursue. By having quicker investigations, State hopes to yield more results to demonstrate to FNS that the State is making this a priority. Currently, the State cannot investigate all clients received by FNS; therefore, the State is currently attempting to make the process less cumbersome and quicker, so that more cases can be reviewed, in order to obtain better results.
Procedures:
FNS sends client information (RIDS) from disqualified stores to FSSA/Benefit Recovery.
1. Clients shopping at disqualified retailers are sent to Benefit Recovery by FNS. Spreadsheets should be loaded to the shared Integrity folder.
2. Spreadsheets need to be combined and sorted. This will be done by FSSA Auditor. These spreadsheets will also be on the Integrity folder.
3. Information will reduced according through the following steps:
• The Auditor will eliminate all clients who fall below a predefined threshold. o Definition of Threshold: The established threshold amount (to be either $100 or $250, depending on results) will be based on the total dollar amount from the FNS report only (other suspicious transactions will not be taken into consideration).
• Auditor match remaining data with disqualified/ineligible clients in ICES o Definition of “disqualified/ineligible”: Aliens, drug felons, students (on a case-by-case basis), permanent

Related Documents

  • Improved Essays

    3.12) Merging Donors Merge donors when you find two donors that are the same person. When merging donors you select two different donors. One will be the “From Donor” and the other will be the “To Donor”. All of the records for the “From Donor” will be linked to the “To Donor”. The “From Donor” will be set to hidden and will no longer show up on the donor list.…

    • 1965 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    According to the USDA, “The Food and Nutrition Service works with State agencies, nutrition educators, neighborhoods, and faith-based organizations to ensure that those eligible for nutrition assistance can make informed decisions about applying for the program and can access benefits”(fns.usda.gov). As we can see here, these programs take everything into consideration. Benjamin W. Chrisinger writes, “Nearly 48% of SNAP households have at least 1 employed person, 56% have children, and 45% have at least 1 person with a disability. The median annual income for a SNAP household is about $18,500, nearly $35,000 less than the national median” (Journal of Nutrition Education and Behavior). Low income families are the ones who are most eligible to participate in this program.…

    • 763 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The ability to spend money for general welfare, regulate interstate commerce, establish bankruptcy laws, establish courts, establish highways, take private property for public purposes with compensation, and the power to tax (p.56). These powers are both enjoyed by federal and state government. When you hear April 15th, the last day to file your taxes without a penalty should come to mind. Some states charge state taxes in addition to Federal taxes that are being charged already. This is a prime example of the concurrent powers in action.…

    • 772 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    It should also be assigned to any random user that needs to access the hospitals website and database. All of the hospitals log files should be checked and saved in a separate and safe database. The log files give good detail of an attack or an attack attempt, if any. If anything suspicious is noted on the hospitals’ log files, an investigation should commence immediately. All application extensions and unused modules should be disabled and removed.…

    • 2212 Words
    • 9 Pages
    Improved Essays
  • Great Essays

    Once the source of activation is identified or eliminated. We will shut off the system and conduct a thorough analysis of all data systems and files. The IT Officer will notify the IT office to do a quick back up of the facilities data servers in case of total loss. Justification of Disaster Response Protocols These protocols are emplaced to ensure that even in a disaster data is safe and recoverable. If there is a need to replace the network equipment the data has been secured at an offsite location for data restore.…

    • 1211 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Tip Top Invoicing Sheet

    • 1166 Words
    • 5 Pages

    New Tip Top customers will need to be setup in QuickBooks. I will enter customer’s name, phone number, email address, company address and credit terms that will be taken from the invoicing sheet. Some invoicing sheets will need to be scanned and emailed to Tammy for correction and/or clarification. I will need to make notes in them. When the credit terms don’t appear on the invoicing sheet I will have to email Tammy at Tip Top to find out from her before giving the invoicing sheet to Neela for review.…

    • 1166 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Amazon could control the number of people using one Prime account by deploying Information Technology (IT) controls and application controls which include computerized steps within a software and related manual procedures to control the processing of various types of transactions. One of the IT controls to control this risk is to have application controls that put into effect one-address policy that allows only one shipping address for each account, and if the holder of the account moves and needs to update the shipping address, proof of the new address must be provided, audit procedure is to monitor and assure that IT controls are functioning. One problem with sharing a Prime account with friends and extended family members is that they all have access to each other’s credit cards and they all can use each other’s credit cards for purchases. To control this, transaction-level controls can be used such as authorization. For each credit card on the account, the credit card holder may register his/her significant other and authorize that person to use the credit card, only the credit card holder and his/her significant other can use the credit card for purchases, audit procedure is to verify that only persons registered on the account are using…

    • 1957 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    Three-Step Change Model

    • 1266 Words
    • 5 Pages

    The process is performed by identifying defects in the system and eradicating theses defects. Target can use the six-sigma process to the variation of employee performance, store process and corporate process at their multiple locations. Also, since target manufactures some of its own goods this process can be used to reduce the defects of its merchandise. Target can also use the best practice of internal benchmarking. This would involve comparing data internally to a set of standards.…

    • 1266 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    O Reilly's Supply Chain

    • 1065 Words
    • 5 Pages

    For example, my company utilizes reorder points which means that when an item drops below a certain point, another item is automatically reordered. In addition, this method also takes delivery lead-times into consideration. On the other hand, with our system there is always room for human error. For instance, when I worked in MRO, we were required to retrieve the requested item and write down the MRO identification number on an inventory pull pad. However, there were plenty of times when someone would leave their inventory pad on a shelf somewhere and just grab a new one.…

    • 1065 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Food Recall Case Study

    • 1289 Words
    • 6 Pages

    20.2 Deciding whether to recall or withdraw 20.3 The overview of recall process 20.4 Notification procedures Government The food recall plan should include a list of government officers to be notified of the food recall. This includes FSANZ and the relevant home state action officers. It should also contain current contact lists. Distributors, wholesalers, retailers To ensure that the distribution of the food product is stopped and arrangements are put in place to retrieve it, the food business needs to notify its customers of the recall and provide detailed recall information. The recall plan should include current contact lists (including contact person, telephone, fax and email details) for suppliers, distributors, wholesalers and retailers and…

    • 1289 Words
    • 6 Pages
    Improved Essays