The Marion City Auditor: Caught in the Crosshairs of Finance and Politics
Click for Concise Version (Highly Recommended to Read in Full)
The Marion City Auditor’s office, led by Miranda Meginness since November 2021, is embroiled in controversy marked by financial irregularities, penalties, and political clashes. This report examines whether Meginness is solely responsible or a scapegoat for systemic issues and a politically charged environment. Public records, audits, council proceedings, and statements reveal inherited problems, alleged missteps, and partisan dynamics, eroding public trust and costing taxpayers.
The Auditor’s role is crucial for Marion’s financial stability, involving meticulous record management, expenditure oversight, and budget balancing. The office handles millions annually, disbursing tax dollars to various county entities.
Meginness inherited an office already facing “four years of a lot of stuff that’s come down the pike (dealing with the auditor’s office) that hasn’t looked too good.” Her tenure has seen multiple attempts by the City Council to express no confidence and remove her. This article explores allegations of “political games” and “scapegoating,” drawing parallels to other Ohio municipalities, aiming to uncover truths and their impact on governance.
Lingering Questions: Unanswered Allegations in Marion’s Financial Scandal
Despite mounting evidence of software vulnerabilities and potentially illegal practices within Marion’s financial systems, a critical question persists: why did the new administration seemingly continue these problematic operations?
Former City Auditor Robert Landon III consistently raised alarms about the software during his tenure. He repeatedly called for forensic accountants and openly criticized “band-aid” solutions to deep-seated issues. Data released by Marion Watch, drawing from state audits, corroborated Landon’s concerns, revealing extensive financial irregularities.
Even more troubling, Mr. Landon reported that his office was informed by the software vendor that certain error prevention mechanisms had been disabled. While the specifics of who ordered this and when it was implemented remain undisclosed, the evidence strongly suggests these crucial IT safeguards were removed during the Schertzer/Carr Administration.
This raises serious questions about continuity of malfeasance, accountability, and the integrity of Marion’s financial management.
Lets look closer at the Silent Sabotage of the Marion City Auditor’s Office!
The “Silent Sabotage” of Marion’s Finances: A Systemic Breakdown
Recurring financial discrepancies, like erroneous data entry and penalties, suggest a systemic issue beyond individual auditors. These errors, such as incorrect income tax remittances and late filings, should be impossible with standard financial management systems designed for data integrity.
“Silent sabotage” manifests in consistent failures to remit income taxes, late W-2/1099 filings, and persistent bank reconciliation issues. Modern financial systems prevent such errors through mandatory fields, dropdowns, real-time alerts, and robust internal controls. The repeated fines indicate a lack of, or circumvention of, these globally recognized IT best practices. Experts confirm that prolonged, undetected misdirection of funds points to systemic IT infrastructure and internal control flaws.
What the Law Says about Alteration of Financial Software:
Modifying financial software to disable security measures (e.g., exact length checks for account numbers) is highly problematic and likely illegal in Ohio.
Key Ohio Laws and Principles:
- Ohio Data Protection Act (ORC Chapter 1354): Requires “covered entities” (including city municipalities) to maintain comprehensive written information security programs with administrative, technical, and physical safeguards. Disabling security measures directly undermines these safeguards, leading to potential tort liability.
- Ohio Revised Code Chapter 1347 (Personal Information Systems): Outlines duties for state/local agencies to protect personal information from unauthorized modification, use, or disclosure.
- Fraud and Related Offenses (ORC Chapter 2913): Modifying software with intent to defraud or facilitate unauthorized access could lead to charges of Forgery, Tampering with Records, or Unauthorized Use of Property/Computer Misuse.
Federal Laws (Applicable to many financial institutions):
- Gramm-Leach-Bliley Act (GLBA): Requires financial institutions to safeguard sensitive data; disabling security features violates this.
- Sarbanes-Oxley Act (SOX): For public companies, SOX mandates strict internal controls for financial reporting; weakening software security undermines these.
- PCI DSS (Payment Card Industry Data Security Standard): For credit card information, PCI DSS requires specific security controls, including data integrity measures.
- Computer Fraud and Abuse Act (CFAA): Criminalizes unauthorized access to computer systems, especially with intent to defraud.
Why it’s likely illegal: Disabling security measures is a breach of duty, reckless/negligent behavior, facilitates fraud/error, and violates numerous compliance requirements, leading to significant legal and financial liability.
Marion Watch Investigation: Demanding User Credentials
Marion Watch’s communications with elected officials revealed that a “city employee demands user credentials just in case IT needs to troubleshoot under their names.” This practice is highly irregular and likely illegal, confirmed by IT and legal professionals.
Why It’s Highly Irregular Information Technology Practice:
- Violation of the Principle of Least Privilege: IT technicians should have their own auditable administrator accounts, not user credentials. This creates a massive security hole.
- Breach of Segregation of Duties: Sharing credentials allows IT to potentially bypass financial controls and manipulate transactions under another user’s name, negating accountability.
- Compromises Audit Trails and Accountability: Actions performed using shared credentials appear to be done by the original user, destroying audit trail integrity and making accountability impossible.
- Increases Risk of Fraud and Embezzlement: Shared credentials create opportunities for internal fraud, where a rogue IT employee could manipulate financial data.
- Weakens Cybersecurity Posture: This practice undermines password policies, multi-factor authentication, and user access reviews, making the system vulnerable.
- Lack of Professionalism and Proper IT Protocols: Professional IT departments use secure methods for access, never asking for or using another user’s password.
Applicable Laws That May Be Broken:
- Ohio Data Protection Act (ORC Chapter 1354): Requesting and using shared passwords directly undermines technical and administrative safeguards, demonstrating a failure to protect nonpublic information and potentially leading to tort liability.
- Ohio Revised Code Chapter 1347 (Personal Information Systems): ORC 1347.15 (B)(9) requires individual password/authentication measures. Sharing credentials makes tracking individual access impossible, violating security and auditability. ORC 1347.15 (H)(1) prohibits knowingly accessing confidential personal information in violation of agency rules.
- Ohio Revised Code 2913.04 (Unauthorized Use of Property – Computer, Cable, or Telecommunication Property): Using another user’s credentials beyond the scope of authorized access could be construed as unauthorized access.
- Federal Laws (GLBA, SOX, etc.): Disabling or circumventing security measures like individual user credentials and robust audit trails directly violates the intent and requirements of these federal acts, potentially leading to investigation and penalties.
- Public Trust and Ethics: Such practices compromise public funds and data, eroding trust and causing reputational damage.
A Chronicle of Fiscal Mismanagement: From Carr to Meginness
Marion’s Auditor’s office has a nearly two-decade history of financial woes, indicating a systemic vulnerability rather than isolated incidents. This “hot potato” position has seen each incumbent inherit unresolved fiscal complexities.
Key Financial Discrepancies and Penalties (2019-Present):
- 2002 / Daniel A. Carr: Delinquency of $255.44.
- 2005-2006 / County-level: Systemic weaknesses, including erroneous classifications, exceeding budgets, and understated expenditures.
- 2007 / Kathy Sherer: Overpaid Deputy Auditor by $1,173.48.
- 2019 / Former Auditor: $22,500 in penalties for late W-2/1099 filings.
- Jan 2020 – Oct 2021 / Robert Landon III: $154,399 in penalties due to erroneous IRS income tax remittance, undetected for seven months.
- Nov 2021 – Present / Miranda Meginness: Up to $394,240 in potential fines for failure to comply with IRS 1095-C regulations.
- Nov 2021 – Present / Miranda Meginness: $84,215 in other late payment fines and fees.
- Nov 2021 – Present / Miranda Meginness: Approximately $54,000 in unnecessary interest from fire truck purchase.
- Nov 2021 – Present / Miranda Meginness: Admitted misappropriation of funds and hiding an IRS penalty (undisclosed amount, serious misconduct).
This history shows that financial challenges are deeply rooted, suggesting systemic issues beyond individual leadership.
Financial Missteps and Mounting Scrutiny
Meginness’s tenure is overshadowed by substantial financial penalties. Councilman Aaron Rollins estimates potential costs over $500,000 due to IRS non-compliance and late fees. Councilman Ayers Ratliff accused her of providing “false information” regarding a fire truck purchase, causing $54,000 in “unnecessary interest.”
Crucially, Meginness “admitted to misappropriation of funds and coding an expense in a way that would hide the payment of an IRS penalty.” While she claimed no malicious intent, Ratliff asserted she “falsified ordinances and paid bills that were not appropriate… and attempted to cover them up… with false documentation,” attributing it to “incompetence.” This signifies a profound breach of financial integrity.
Legal Ramifications of Data Falsification
Meginness’s admitted actions could fall under several ORC statutes:
- Falsification (ORC 2921.13): Knowingly making false statements to mislead public officials or in required reports.
- Tampering with Records (ORC 2921.12): Altering or concealing records to impair their evidentiary value, or using false records to mislead officials.
- Theft in Office (ORC 2921.41): Unauthorized use or personal benefit from public funds, leading to permanent disqualification from public office.
- False Reports to Taxation Department (ORC 5703.26): Knowingly preparing false reports for taxation.
Such violations can lead to civil actions for damages, recovery of illegally spent funds, and attorney’s fees. They erode public trust and damage the city’s financial reputation.
Bank reconciliation issues, some dating back to 2020, continued to challenge Meginness’s office. External advisors, including Robert Hinkle (Ohio Auditor of State) and Greg Blate (Veritas Solutions Group LLC), advised her to stay and “finish the project,” recognizing the need for continuity to resolve complex, multi-year issues.
The financial costs burden taxpayers and damage the city’s reputation, potentially affecting future funding. The public nature of these disputes highlights a challenge for Marion: balancing accountability with political realities.
The Political Chessboard: Allegations of Games and Scapegoating
Meginness faces repeated political challenges. An August 2023 no-confidence vote failed (4-4), but a January 2024 vote passed decisively (8-1), reflecting increased council disapproval. Councilman Ayers Ratliff is a vocal critic, alleging poor performance and “false information” regarding the fire truck.
Political intrigue deepened when Meginness initially resigned (December 2023) for a Mayor-elect Collins’ offer of “transit director,” then rescinded (January 2024) after advice from Hinkle and Blate to “stay and finish the project.” Ratliff publicly alleged Collins “bullied and intimidated” her resignation.
Meginness remains defiant, acknowledging “mistakes” but emphasizing efforts to navigate challenges and hoping to “reestablish good working relationships.”
The political climate is further complicated by Ratliff’s civil rights lawsuit against Marion County Prosecutor Ray Grogan, alleging “politically motivated” prosecution. This suggests deep political animosity in Marion.
This environment is not unique. Bucyrus, Ohio, saw a Council Clerk’s resignation due to a “hostile and retaliatory environment.” Meginness describes Marion City Hall as “tense” and “hostile,” feeling “scolded” and like a “pariah,” with “rumors” and feeling “on an island.” She suggested ageism and noted her internal auditor was “poached by the mayor,” reinforcing her belief she’s a “scapegoat” for systemic problems.
The Auditor’s office is a focal point of political conflict. Financial difficulties are used as ammunition, potentially hindering objective problem-solving. This supports the “scapegoat” narrative, as Meginness may bear the brunt of broader dysfunction.
Voices from the Fray: Quotes and Perspectives
Public discourse shows conflicting perspectives:
- Auditor Miranda Meginness: Acknowledges “mistakes” and “four years of a lot of stuff that’s come down the pike,” expressing hope for renewed relationships.
- Councilman Ayers Ratliff: Accused Meginness of “false information” and Mayor Collins of “bullying and intimidating” her resignation.
- Council President Todd Schneider: Acknowledges public frustration but expresses confidence in Meginness’s ability despite mistakes.
- Councilman Jason Schaber: Expressed bewilderment at Meginness rescinding resignation, sensing something “doesn’t feel right.”
- Councilman Mike Neff: Questioned Meginness’s “job performance,” advocating for her transit director role.
- External Entities (Robert Hinkle, Greg Blate): Advised Meginness to stay and “finish the project,” offering a counter-narrative to council criticisms and implicitly supporting her continuity to resolve inherited issues.
This “narrative battleground” confuses the public. Meginness’s framing of inherited problems contrasts with council’s direct criticisms. External validation supports Meginness, strengthening the “scapegoat” argument. This highlights how facts are interpreted through partisan lenses, hindering constructive solutions.
Conclusion: Accountability, Politics, and the Path Forward for Marion
The Marion City Auditor’s office faces ongoing turmoil from complex factors. While Auditor Miranda Meginness admitted “misappropriation of funds and coding an expense in a way that would hide the payment of an IRS penalty,” evidence suggests she inherited significant challenges. Persistent bank reconciliation issues (dating to 2020) and IRS fines from previous administrations (Landon, Carr) indicate deep, systemic financial vulnerabilities.
The recurring errors in financial data entry and reporting highlight a profound failure in the city’s financial IT infrastructure and adherence to modern data integrity standards. Experts confirm such errors should be prevented by robust controls and automated processes, underscoring a systemic breakdown.
Intense political opposition, including no-confidence votes and alleged mayoral pressure to resign, further suggests Meginness may be a scapegoat for systemic issues and political maneuvering. External advice to remain in office to complete reforms implicitly contradicts the council’s push for her removal. Councilman Ratliff’s civil rights lawsuit against the prosecutor further reveals pervasive political animosity.
The broader context of hostile municipal work environments in Ohio reinforces that Marion’s challenges are not unique. Meginness’s experiences of a “tense” and “hostile” City Hall, “rumors,” alleged “bullying,” and the “poaching” of her internal auditor suggest pervasive political gamesmanship.
The prolonged turmoil, compounded by substantial taxpayer costs, threatens public trust. Despite Marion’s “Strongest Town” recognition for financial sustainability, the Auditor’s office presents a stark contradiction.
To break this cycle, Marion must prioritize reforms: strengthening internal financial controls, fostering transparent communication, and de-politicizing administrative roles. The continued involvement of the Ohio Auditor of State and Veritas Solutions Group is crucial for objective assessment and impartial reforms. Success depends on all stakeholders’ commitment to long-term fiscal health over political expediency, restoring public confidence in Marion’s municipal government. Without this, the Auditor’s office may remain a battleground, with the city’s finances and public trust as casualties.

The Marion City Auditor’s office, currently under the leadership of Miranda Meginness, has become a nexus of controversy, characterized by significant financial irregularities, mounting penalties, and intense political friction. Allegations of mismanagement, substantial IRS fines, and a contentious relationship with the City Council have painted a picture of an office in perpetual crisis. This report aims to delve deeply into the complexities of Meginness’s tenure, investigating whether she bears sole responsibility for the office’s persistent challenges or if she has been strategically positioned as a convenient scapegoat amidst pre-existing systemic issues and a politically charged environment. A thorough examination of public records, financial audits, council proceedings, and direct statements from key figures reveals a tangled web of inherited problems, alleged operational missteps, and pronounced partisan dynamics. These factors have collectively eroded public trust, incurred substantial financial costs for Marion taxpayers, and highlighted fundamental questions about the city’s governance and accountability mechanisms.
The Marion City Auditor functions as the municipality’s chief fiscal officer, a position of paramount importance. This role is foundational to Marion’s financial stability and its commitment to public accountability.
Responsibilities include meticulous management of financial records, rigorous oversight of all expenditures, and ensuring the city’s budget remains balanced. The Auditor’s office is tasked with accounting for millions of dollars received annually by various departments and issuing payments for all county obligations, including the distribution of tax dollars to townships, villages, cities, school districts, and library systems.
Auditor Miranda Meginness’s tenure, which began with her appointment in November 2021, has been notably tumultuous. She assumed leadership of an office already grappling with significant challenges. Her time in office has been marked by a continuous stream of controversies, which she herself acknowledged as “four years of a lot of stuff that’s come down the pike (dealing with the auditor’s office) that hasn’t looked too good”. This period has seen multiple attempts by the City Council to express no confidence in her performance and even to remove her from office, reflecting a deep-seated questioning of her capabilities. This article will meticulously explore the allegations of “political games” and the “use of auditors as scapegoats” within Marion’s municipal landscape, drawing parallels to similar issues in other Ohio municipalities. By dissecting the financial issues and the political dynamics, the aim is to uncover the underlying truths and assess their profound impact on the city’s governance and its residents. We will also meticulously detail standard information technology (IT) practices that are recognized globally as standard.
Lingering Questions: Unanswered Allegations in Marion’s Financial Scandal
Despite mounting evidence of software vulnerabilities and potentially illegal practices within Marion’s financial systems, a critical question persists: why did the new administration seemingly continue these problematic operations? According to multiple officials Mayor Collins has taken several measures to strengthen the backend of the city’s software, and ensure that safeguards were put into place to correct these issues, but in doing so the city has uncovered more and ever increasingly severe safeguard bypasses.
Former City Auditor Robert Landon III As a city councilor and or Auditor consistently raised alarms about the software during his tenure. He repeatedly called for forensic accountants and openly criticized “band-aid” solutions to deep-seated issues. Data released by Marion Watch, drawing from state audits, corroborated Landon’s concerns, revealing extensive financial irregularities.
Even more troubling, Mr. Landon reported that his office was informed by the software vendor that certain error prevention mechanisms had been disabled. While the specifics of who ordered this and when it was implemented remain undisclosed, the evidence strongly suggests these crucial IT safeguards were removed during the Schertzer/Carr Administration by an official that was not an IT expert. It is claimed by these officials that the current IT expert in the City of Marion allowed this to happen, and may have had a hand in implementation of this unauthorized access. They also indicated that this individual no longer works for the city. Also important is the fact that the servers that house the Marion City Auditor’s software is housed in the auditor’s office, and that IT staff who work for governments at any level are required to know the laws that govern the IT aspect of an office or offices that they serve in their professional capacity.
This raises serious questions about continuity of malfeasance, accountability, and the integrity of Marion’s financial management.
Lets look closer at the Silent Sabotage of the Marion City Auditor’s Office!
Meginness was recently interviewed by Scott Spears, and her words echoed with Marion Watch as we noticed many eerily familiar circumstances concerning this office and the overall political battlefield in Marion that we witnessed firsthand. However, multiple officials have stated that some of what she said during the interview were blatantly not true. We will save that for a future publication and focus on the technical aspects and background information therein.
The “Silent Sabotage” of Marion’s Finances: A Systemic Breakdown
The recurring financial discrepancies within Marion’s Auditor’s office, particularly the erroneous entry of financial data and subsequent penalties, point to a deeper, systemic issue that extends beyond the capabilities of any single auditor. As our investigation reveals, the nature of these errors suggests a fundamental breakdown in financial IT practices that, according to experts nationwide and in other countries, should be impossible with globally standard system safeguards in place. These safeguards are vendor standard safeguards present in all financial software out of the box. Marion Watch has always found it suspicious that these reconciliation issues began so suddenly, and this suspicion is echoed by multiple current and past elected officials.
With non IT professionals having backend and unrestricted administrative access to the system, the entire official narrative must now be called into question.
The concept of “silent sabotage” – a pervasive irritant that, in a different context, reinforced stereotypes of inefficiency – finds an unsettling parallel in Marion’s financial administration. The consistent failure to correctly remit income taxes to the IRS, late filings of W-2s and 1099s, and persistent bank reconciliation issues are not merely isolated incidents. These are the types of errors that modern financial management systems, designed with robust data integrity principles, are specifically built to prevent.
Experts in financial IT and data management emphasize that accurate data entry is paramount, and systems should be designed to enforce this accuracy. Best practices include implementing mandatory fields, limiting free-text inputs, using drop-down menus for common entries, and enabling real-time error alerts. “Validation tools can instantly flag missing or incorrect entries. These real-time alerts allow employees to correct mistakes before they become larger issues,” states one source on data entry best practices.
Furthermore, robust internal controls, regular reconciliation, and the strategic utilization of technology are critical to avoiding financial reporting risks. Data integrity, encompassing “the maintenance and assurance of data accuracy and consistency over its entire lifecycle,” is essential for accurate financial reporting, regulatory compliance, and fraud prevention.
The fact that Marion has repeatedly incurred significant fines due to “erroneously remitted” payments or “failure to file forms in a timely manner” strongly suggests that these globally recognized IT best practices for data validation and error prevention have either been absent, poorly implemented, or consistently circumvented. As one expert notes, “even the best systems can’t fix bad data. If numbers are entered wrong at the start, you’re setting yourself up for problems down the line”.
The sheer volume and complexity of financial data handled by public institutions necessitate automated processes and continuous monitoring to flag discrepancies The persistence of these issues in Marion indicates a deeper structural flaw in its financial IT infrastructure or its adherence to fundamental data integrity principles.
What the Law Says about Alteration of Financial Software:
According to multiple sources it is likely highly illegal and would have severe consequences in the state of Ohio for financial software to be modified to disable built-in security measures like exact length checks for account number error prevention. This would undermine statutory data protection requirements, open the door to fraud, and expose the institution to significant legal and financial liability.
Marion Watch sent communications to multiple elected officials on 7/19/25, including the current Marion City Auditor and have heard back from a few. Several claim that a “city employee not an IT expert” required employees to disclose user credentials just in case IT needs to troubleshoot under their names. We will now explore why this is highly forbidden in the IT sector, and likely illegal. Marion Watch has confirmed this with our own team who have more than 20 years of experience in complex IT systems, other IT experts in several states, and legal professionals in multiple states. The public can verify this with appropriately worded search engine queries.
Key Ohio Laws and Principles:
- Ohio Data Protection Act (Ohio Revised Code Chapter 1354): This act is particularly relevant. It establishes requirements for “covered entities” (which would include most financial institutions and businesses handling personal information) to implement and maintain a “comprehensive written information security program.” This program must include administrative, technical, and physical safeguards to protect nonpublic information and information systems.
- Directly Relevant: Disabling built-in security measures like exact length checks for account numbers directly undermines “technical safeguards” designed to “protect against any threats or hazards to the security or integrity of nonpublic information and the information system” and “protect against unauthorized access and acquisition of the information that is likely to result in a material risk of identity theft or other fraud.”
- Consequences: Failure to comply with the Ohio Data Protection Act can lead to liability in tort actions. While it provides an “affirmative defense” for entities that do comply, actively disabling security measures would eliminate any such defense.
- Ohio Revised Code Chapter 1347 (Personal Information Systems): This chapter outlines duties for state and local agencies that maintain personal information systems. While it primarily applies to government entities, its principles of protecting personal information from unauthorized modification, destruction, use, or disclosure are broadly applicable and reflect a general legal expectation of data security.
- Fraud and Related Offenses (Ohio Revised Code Chapter 2913): If modifying the software is done with the intent to defraud or facilitate unauthorized access to financial accounts, it could fall under various fraud statutes, including:
- Forgery: If the modification allows for the creation of false financial instruments or records.
- Tampering with Records: If the modification is intended to alter or falsify financial records.
- Unauthorized Use of Property/Computer Misuse: Modifying software without authorization could be considered unauthorized use or misuse of the financial institution’s property or computer systems.
- Federal Laws (Applicable to many financial institutions): Many financial institutions in Ohio are also subject to federal laws that mandate robust security measures, such as:
- Gramm-Leach-Bliley Act (GLBA): Requires financial institutions to explain their information-sharing practices and to safeguard sensitive data. Disabling security features would be a direct violation of the safeguarding requirement.
- Sarbanes-Oxley Act (SOX): For public companies, SOX imposes strict requirements on internal controls for financial reporting. Deliberately weakening software security would undermine these controls.
- PCI DSS (Payment Card Industry Data Security Standard): If the financial software handles credit card information, PCI DSS mandates specific security controls, including robust data integrity measures. Disabling such checks would be a major non-compliance issue.
- Computer Fraud and Abuse Act (CFAA): This federal law criminalizes unauthorized access to computers and computer systems, especially if done with intent to defraud or obtain information.
Why it’s likely illegal:
Disabling built-in security measures in financial software, especially those designed for error prevention like exact length measures for account numbers, would almost certainly be considered:
- A breach of duty: Financial institutions have a legal and ethical duty to protect customer data and maintain the integrity of financial transactions. Deliberately weakening security is a serious breach of this duty.
- Reckless or negligent behavior: Even if not done with malicious intent, disabling such measures could be seen as reckless disregard for the security of financial data, leading to civil liability in case of a breach or error.
- Facilitating fraud or error: Such a modification would directly increase the risk of fraudulent transactions, data breaches, or costly errors, which could lead to significant financial losses for the institution and its customers.
- Violation of compliance requirements: As noted above, numerous state and federal regulations specifically mandate strong security controls for financial data.
Why It’s Highly Irregular Information Technology Practice for IT to require user logins for troubleshooting purposes.
- Violation of the Principle of Least Privilege:
- Best Practice: Users, including IT personnel, should only have the minimum access rights necessary to perform their job functions. An IT technician troubleshooting a system does not need the actual user’s financial software login credentials. They should have their own IT administrator accounts with appropriate, auditable access.
- Irregularity: Demanding user credentials grants IT access far beyond what’s needed for troubleshooting, creating a massive security hole.
- Breach of Segregation of Duties:
- Best Practice: In financial systems, the principle of segregation of duties dictates that no single person should have control over an entire transaction or process from beginning to end. This prevents fraud and error. For example, the person who initiates a payment shouldn’t be the same person who approves it or logs the final transaction.
- Irregularity: If an IT employee has a user’s financial software credentials, they could potentially bypass financial controls and manipulate transactions under the guise of that legitimate user. This completely negates segregation of duties.
- Compromises Audit Trails and Accountability:
- Best Practice: All actions taken within a financial system should be logged with the specific user account that performed the action. This creates an audit trail, essential for financial transparency, accountability, and fraud detection.
- Irregularity: If IT “troubleshoots under their names” (meaning, using the Auditor’s credentials), then any actions taken by IT appear to have been taken by the Auditor. This completely destroys the integrity of the audit log, making it impossible to determine who did what, when, or why. If an error or fraudulent activity occurs, proving who was responsible becomes extremely difficult, if not impossible.
- Increases Risk of Fraud and Embezzlement:
- Best Practice: User credentials are like keys to a vault. They should be protected fiercely. Sharing them is akin to handing out keys to everyone.
- Irregularity: When IT has access to user credentials, it creates an opportunity for internal fraud. A rogue IT employee could use these credentials to access and manipulate financial data, transfer funds, or commit other financial crimes, leaving the Auditor as the falsely implicated party.
- Weakens Cybersecurity Posture:
- Best Practice: Organizations should implement strong password policies, multi-factor authentication, and user access reviews. A core tenet of cybersecurity is that passwords should never be shared.
- Irregularity: This practice undermines all modern cybersecurity efforts. It makes the entire system vulnerable to insider threats and external attacks, as a single compromised IT employee could then access multiple user accounts.
- Lack of Professionalism and Proper IT Protocols:
- Best Practice: Professional IT departments have secure methods for accessing systems for troubleshooting, such as elevated privileges via their own accounts, secure remote access tools, or direct physical access that is logged and monitored. They never ask for or use another user’s password.
- Irregularity: This practice indicates a serious lack of understanding of fundamental IT security protocols and professionalism.
Applicable Laws That May Be Broken
- Ohio Data Protection Act (Ohio Revised Code Chapter 1354):
- This act requires “covered entities” (which would include a city municipality handling sensitive financial and personal data) to implement and maintain a “comprehensive written information security program” with administrative, technical, and physical safeguards.
- Violation: Deliberately requesting and using shared passwords directly undermines technical and administrative safeguards. It demonstrates a failure to protect against unauthorized access, use, or disclosure of nonpublic information, as well as threats to the integrity of the information system. This could open the city to tort liability.
- Ohio Revised Code Chapter 1347 (Personal Information Systems):
- This chapter outlines duties for state and local agencies regarding personal information systems. Specifically, ORC 1347.15 (B)(9) requires “a password or other authentication measure be used to access confidential personal information that is kept electronically.” The implication is that these measures are individual and not to be shared.
- ORC 1347.15 (B)(1) also mandates rules regulating access to confidential personal information, including “a list of the valid reasons… for which only employees of the state agency may access confidential personal information.” Sharing credentials circumvents these access controls.
- Violation: Sharing user credentials makes it impossible to track individual access as required by these provisions, compromising the security and auditability of personal and financial information. ORC 1347.15 (H)(1) states, “No person shall knowingly access confidential personal information in violation of a rule of a state agency described in division (B) of this section.” If the city has a policy against password sharing (as it should), this would be a violation.
- Ohio Revised Code 2913.04 (Unauthorized Use of Property – Computer, Cable, or Telecommunication Property):
- This statute prohibits knowingly gaining access to, or attempting to gain access to, any computer, computer system, or computer network without the express or implied consent of, or beyond the scope of the express or implied consent of, the owner or other person authorized to give consent.
- Violation: While an IT employee might have general authorization to access systems for troubleshooting, using another user’s specific credentials beyond the scope of their own authorized access could be construed as unauthorized access, especially if it’s done to circumvent audit trails or proper access controls. If the Auditor is compelled to give up credentials, it might not be “implied consent” for that specific method of access.
- Federal Laws (GLBA, SOX, etc.):
- Gramm-Leach-Bliley Act (GLBA): Applies to financial institutions and requires them to have safeguards to protect customer financial information. A city auditor’s office handling public funds and potentially private financial data (e.g., vendor payments, tax records) would likely fall under GLBA’s scope.
- Sarbanes-Oxley Act (SOX): While primarily for publicly traded companies, its principles of strong internal controls over financial reporting are widely adopted in government accounting. Weakening access controls through shared passwords directly undermines these principles.
- Violation: Disabling or circumventing security measures like individual user credentials and robust audit trails is a direct violation of the intent and requirements of these federal acts, potentially leading to federal investigation, fines, and other penalties.
- Public Trust and Ethics: While not a specific law, city employees operate under a high standard of public trust. Practices that compromise the security and integrity of public funds and data erode this trust and can lead to severe reputational damage, even if no direct financial crime is proven.
The practice of a city employee demanding financial software user credentials “just in case it is needed to troubleshoot under their names” is deeply flawed from an IT security perspective and presents significant legal risks under Ohio and federal statutes. It indicates a severe breakdown in internal controls and a profound misunderstanding of data security principles.
A Chronicle of Fiscal Mismanagement: From Carr to Meginness
The financial woes plaguing Marion’s Auditor’s office are not a recent phenomenon but a deeply entrenched pattern spanning nearly two decades beginning around the time the city acquired new software during former Mayor Schertzer and Carr’s tenures. This history of recurring issues, from minor overpayments to significant IRS penalties, suggests a systemic vulnerability rather than isolated incidents tied to individual auditors. The office has, in essence, become a “hot potato” position, with each new incumbent inheriting a legacy of unresolved fiscal complexities.
Here is a chronological list of documented financial issues and findings within Marion’s Auditor’s office, demonstrating this long-standing pattern.
*This is only an example of issues, we strongly encourage you to read our article “Silent Sabotage” to gain a more in depth perspective:
- 2002 – Auditor Daniel A. Carr: Records show a delinquency of $255.44 associated with Daniel A. Carr from the year 2002. While the specific nature of this delinquency is not detailed, its presence on a public delinquency report indicates an early instance of financial irregularity.
- 2005-2006 – General County-level Issues: An audit covering January 1, 2005, to December 31, 2005, for Marion County revealed several systemic weaknesses. These included erroneous classifications of receipts, disbursements, and transfers in budgets, actual disbursements exceeding budgeted amounts for several funds, and inadequate procedures for tracking federal awards, leading to understated expenditures by $655,500 in 2006 and $232,400 in 2005. There were also issues with bank account collateralization, property tax examination, and documentation for credit card purchases.
- 2007 – Deputy Auditor Kathy Sherer: An audit for the period January 1, 2006, through December 31, 2006, found that former Deputy Auditor Kathy Sherer was overpaid by $1,173.48 in 2007, exceeding the maximum salary specified by City Ordinance 2002-100. This overpayment was not properly authorized or approved by Council, leading to a finding for recovery.
- 2019 – Former City Auditor Carr (Pre-Landon): An audit identified a $22,500 fine against a former city auditor for penalties resulting from late filings of information returns (W-2s and 1099s) to the IRS in 2019, after her departure. This indicates a recurring issue with IRS compliance that predates Robert Landon III’s tenure. This office had multiple issues as cited by the Ohio Auditor of State, and covered in 2019 and 2025 by Marion Watch’s Silent Sabotage piece.
- 2020-2021 – Auditor Robert Landon III: Landon’s tenure was marked by significant turmoil. State auditors issued a finding for recovery of $154,399 against him for failing to properly remit income taxes to the IRS. Beginning in June 2020, those withholdings were “erroneously remitted to the State of Ohio rather than the IRS, as required.” Due to a multitude of factors, including not reconciling bank statements, the error was not identified until January 2021 and resulted in $154,399 in late fee penalties and interest, which were paid by the city after Landon’s departure. This critical error, where federal tax withholdings were mistakenly sent to the state, highlights a profound failure in the city’s financial information technology systems and adherence to global IT standards. In modern financial management, such a mix-up should be virtually impossible. Standard IT practices for public sector financial systems, often enterprise resource planning (ERP) or specialized accounting software, incorporate robust controls designed to prevent precisely this type of error. These include mandatory fields and structured inputs that would prevent free-text entry for critical routing information, instead requiring selection from pre-configured, validated tax agency IDs or accounts. Real-time validation and error alerts are fundamental, immediately flagging if a tax ID or account number does not match the intended recipient (e.g., an IRS tax ID being entered for a state tax payment) or if the payment type is inconsistent with the designated recipient. Furthermore, principles of referential integrity ensure that linked data, such as employee federal tax withholdings, can only be routed to a corresponding valid federal tax authority. The fact that this erroneous remittance went undetected for seven months (June 2020 to January 2021) underscores the absence of these crucial real-time checks, automated reconciliation processes and adequate segregation of duties—where no single individual should have complete control over all key processing functions for financial transactions Experts globally confirm that such prolonged, undetected misdirection of funds is a clear indicator of a systemic breakdown in financial IT infrastructure and internal controls.
- 2021-Present – Auditor Miranda Meginness: Meginness inherited an office already in disarray. Her tenure has been characterized by “several hundred thousand dollars in fines levied by the IRS for failure to file forms in a timely manner”. Councilman Aaron Rollins estimated potential fines of up to $394,240 for non-compliance with IRS 1095-C regulations and an additional $84,215 for other late payment fines and fees. Furthermore, she faced accusations of providing “false information” regarding a fire truck purchase, allegedly leading to approximately $54,000 in “unnecessary interest”. Meginness herself acknowledged “review of issues with bank reconciliation held over from the previous auditor’s administration” dating back to 2020.
This extensive history demonstrates that the financial challenges in Marion’s Auditor’s office are not isolated to the current administration but are deeply rooted, suggesting systemic issues that transcend individual leadership.
Financial Missteps and Mounting Scrutiny
Auditor Meginness’s tenure has been significantly overshadowed by substantial financial penalties.
The Marion City Council has questioned her office’s performance due to “several hundred thousand dollars in fines levied by the IRS for failure to file forms in a timely manner”.
Councilman Aaron Rollins, a vocal critic, estimated that these issues could potentially cost taxpayers over $500,000. This includes potential fines of up to $394,240 for failure to comply with IRS regulations for 1095-C forms, and an additional $84,215 for other late payment fines and fees.
Another major point of contention and a source of “intense scrutiny” has been Meginness’s handling of a new fire truck purchase. Councilman Ayers Ratliff explicitly accused her of providing “false information… in numerous aspects of purchasing the fire truck as to interest (on the loan), payoff information, timing of purchasing, etc.”. Ratliff claimed this alleged misinformation resulted in approximately $54,000 in “unnecessary interest” for the city.
Crucially, Marion City Auditor Miranda Meginness has explicitly “admitted to misappropriation of funds and coding an expense in a way that would hide the payment of an IRS penalty,” as reported by Marion County Now.
While Meginness stated her actions were “not driven by malicious intent,” Councilman Ayers Ratliff emphasized the seriousness of her misconduct, asserting that she “falsified ordinances and paid bills that were not appropriate to be paid with public funds” and attempted to “cover them up in the system with false documentation.” He attributed these actions to “incompetence in Meginness’ office.” This admission and the subsequent accusations underscore a profound breach of financial integrity and transparency within the Auditor’s office.
Legal Ramifications of Data Falsification
This admission and the subsequent accusations underscore a profound breach of financial integrity and transparency within the Auditor’s office, carrying significant legal ramifications under Ohio law.
The act of “coding an expense in a way that would hide the payment of an IRS penalty” and allegedly “falsified ordinances and paid bills that were not appropriate to be paid with public funds” and attempting to “cover them up in the system with false documentation” could fall under several sections of the Ohio Revised Code (ORC).
Specifically, legal professionals we reached out to advised us that these actions may constitute:
- Falsification (ORC 2921.13): This statute prohibits knowingly making a false statement with the purpose to mislead a public official in performing their official function, or making a false statement in writing on a report or return required by law. Depending on the context and any associated financial gain or theft, falsification can range from a misdemeanor of the first degree to a felony of the third or fourth degree.
- Tampering with Records (ORC 2921.12): This statute makes it a felony of the third degree to alter, destroy, conceal, or remove any record or document with the purpose to impair its value as evidence in an official proceeding or investigation, or to make or use a false record with the purpose to mislead a public official. The alleged attempts to “cover them up in the system with false documentation” directly align with this.
- Theft in Office (ORC 2921.41): While Meginness claimed no malicious intent, “misappropriation of funds” could potentially lead to charges under this statute if it involved unauthorized use or personal benefit from public funds. A conviction for theft in office results in permanent disqualification from holding any public office, employment, or position of trust in Ohio.
- False Reports to Taxation Department (ORC 5703.26): This specifically prohibits knowingly making, presenting, aiding, or assisting in the preparation of a false or fraudulent report or statement required to be filed with a county auditor or the department of taxation.
For the City of Marion, the legal consequences extend beyond potential criminal charges for individuals. Such violations can lead to civil actions for damages incurred by the city, including recovery of illegally expended public money and attorney’s fees. More broadly, these incidents erode public trust, invite further scrutiny and audits from state authorities, and can damage the city’s financial reputation, potentially affecting its ability to secure funding or favorable terms for future projects.
The complex and long-standing issues with bank reconciliation procedures, some dating back to 2020, which arose suddenly, continued to be a significant operational challenge for Meginness’s office. This project’s completion was a key reason cited by external advisors for Meginness to remain in her role. City Council committee meeting documents from March 2025 also list an “Update: Auditor of State Project and Bank Reconciliation Project — 2022, 2023, and 2024 — Veritas (Auditor Meginness)”, confirming the ongoing nature and external involvement.
The Ohio Auditor of State’s office and Veritas Solutions Group LLC have been actively engaged in reviewing the city’s financial procedures. Robert Hinkle, Chief Deputy Auditor for the Ohio Auditor of State, and Greg Blate, Managing Director of Veritas, met with Meginness. Their advice for her to stay and “finish the project” suggests that these external entities recognize the need for continuity to resolve complex, multi-year financial issues. Multiple elected officials advised Marion Watch that this is not entirely true. Specifically, they called out the Mr. Blate’s advocacy for the auditor stating that this was never said. Furthermore, they advised that a lot of what was said on the Spears show were half truths or outright not true statements.
The financial issues are substantial and have a direct, negative impact on city finances and taxpayers. The magnitude of these financial penalties, combined with the public nature of the disputes and the need for external intervention, suggests a significant breakdown in financial oversight and accountability within the city. This not only burdens taxpayers but also damages the city’s financial reputation, potentially affecting its ability to secure favorable terms for future projects or even its credit rating. The alleged “lack of urgency” and “false statements” (as claimed by council members) are presented as direct causes of these financial penalties. The public nature of these disputes also contributes to a perception of instability and lack of transparency. This situation highlights a critical challenge for Marion: how to balance the need for financial accountability with the political realities of public office. The financial costs are not just numbers; they represent lost opportunities for city improvements, as Councilman Rollins suggests, and a potential erosion of citizen trust.
Table 1: Key Financial Discrepancies and Penalties Summary (2019-Present)
| Period/Auditor | Issue | Amount/Impact | |
| 2019 / Former Auditor Carr | Penalties for late W-2/1099 filings | $22,500 | |
| Jan 2020 – Oct 2021 / Robert Landon III | Erroneous IRS income tax remittance | $154,399 | |
| Nov 2021 – Present / Miranda Meginness | Failure to comply with IRS 1095-C regulations | Up to $394,240 | |
| Nov 2021 – Present / Miranda Meginness | Other late payment fines/fees | $84,215 | |
| Nov 2021 – Present / Miranda Meginness | Unnecessary interest from fire truck purchase | Approx. $54,000 | |
| Nov 2021 – Present / Miranda Meginness | Admitted misappropriation of funds & hiding IRS penalty | Undisclosed, but serious misconduct |
The Political Chessboard: Allegations of Games and Scapegoating
Auditor Meginness has faced repeated challenges to her position from the Marion City Council, illustrating a dynamic and shifting political landscape. In August 2023, a vote of no confidence regarding her job performance failed by a single vote, ending in a 4-4 deadlock. Council President Todd Schneider, a Democrat, cast the deciding vote against the measure. However, a subsequent vote on January 8, 2024, saw the City Council approve an ordinance proposing a vote of no confidence against Meginness by a decisive 8-1 margin. This stark shift indicates a significant increase in council’s collective disapproval and a hardening of positions against the Auditor.
Councilman Ayers Ratliff, a Democrat representing the 2nd Ward, has emerged as one of Meginness’s most vocal and persistent critics. He has consistently accused her of poor performance and, specifically regarding the fire truck purchase, of providing “false information… in numerous aspects of purchasing the fire truck as to interest (on the loan), payoff information, timing of purchasing, etc.”. His strong opposition has been a driving force behind the efforts to remove her.
The political intrigue deepened when Meginness initially informed city officials on December 11, 2023, of her intent to resign effective January 5, 2024, stating she had “accepted another position (transit director) within the City”. This offer came from then Mayor-elect Bill Collins, who stated he “would consider her for that position if she chose to resign”. However, Meginness dramatically rescinded her resignation on January 4, 2024, citing a “reassessment of the situation.” This has caused suspicion by most sources we have spoken with.
She stated that the “real turning point” was advice from Greg Blate, managing director of Veritas Solutions Group LLC, and Robert Hinkle, chief deputy auditor for the Ohio Auditor of State, who “both made comments about how I needed to stay and finish the project”.
Councilman Ratliff publicly alleged that Collins had “bullied and intimidated” Meginness into resigning, adding another layer to the political dynamics.
Despite the intense pressure and calls for her removal, Meginness has maintained a defiant yet conciliatory public stance. She declared, “as of right now, I have no intention of going anywhere. I have no intention of resigning again”. While acknowledging “mistakes” and apologizing for them, she emphasized her and her staff’s efforts to navigate the challenges, expressing hope to “reestablish good working relationships” with the council and “work past” the lack of confidence.
The political climate in Marion is further complicated by a civil rights lawsuit filed last week by Councilman Ayers Ratliff against Marion County Prosecutor Ray Grogan and several assistant prosecutors Ratliff’s lawsuit alleges “malicious and unjustifiable” and “politically motivated” prosecution after child rape charges against him were dismissed. His attorney claimed prosecutors pursued the case for “political reasons even though they knew the story to be false”.
Prosecutor Grogan, a Republican, dismissed the lawsuit as “meritless” and a “distraction” This high-profile legal battle, involving a key critic of Auditor Meginness, suggests a deeper undercurrent of political animosity and potentially tit-for-tat accusations within Marion’s governmental landscape, where accusations of political motivation are not isolated to the Auditor’s office.
This environment of political tension and alleged misconduct is not unique to Marion. In Bucyrus, Ohio, Council Clerk Miranda Wise recently submitted her resignation amid an “increasingly hostile and retaliatory environment.”
Councilwoman Clarissa Slater directly attributed this to “retaliation, hostility, and discrimination by Council President,” forcing the clerk’s resignation. This mirrors sentiments expressed by Auditor Meginness, who described Marion City Hall as a “tense” and “hostile work environment” where she felt “scolded” and like a “pariah,” often “left alone 100% of the time” outside of council meetings. She noted that “rumors circulate in that building like it’s a full-time job” and that she is “on an island” Meginness also suggested that her age (34) might be a factor in how she is treated by older male officials, stating, “I think if anything though, it’s an ageist problem”.
Furthermore, Meginness revealed that her internal auditor, Chelsea, was “poached by the mayor” to take the budget director position, an ironic move given the mayor’s public statements about “problems” and “issues” coming from the Auditor’s office. Meginness expressed frustration that the mayor did not directly inform her of this, stating, “the chances of getting the truth are slim” from him. She also feels she is being made a “scapegoat” for the city’s financial problems, a role she believes previous auditors also filled This broader pattern of alleged hostile work environments and political pressure within Ohio’s municipal governments suggests that the challenges faced by Marion’s Auditor are part of a larger, systemic issue in local governance.
The Auditor’s office is not merely facing financial problems but is also a site of intense political conflict and power struggles. The financial difficulties provide ammunition for political adversaries, who then use these issues to challenge the auditor’s legitimacy and push for her removal. The alleged attempt by the mayoral administration to move Meginness to another role (transit director) can be interpreted as a strategic move to gain control over the auditor’s office or to remove a perceived obstacle, regardless of her actual performance. This directly supports the notion of “political games.” The presence of political accusations and lawsuits among different city officials (e.g., Ratliff vs. Prosecutor Grogan) suggests a broader culture of political tension and potentially instability within Marion’s governance. This environment makes it challenging to address core financial issues objectively, as they become intertwined with political agendas, potentially hindering effective governance and diverting resources from critical city functions. This directly contributes to the narrative of the auditor being a “scapegoat,” as she may be bearing the brunt of a broader dysfunctional political system.
Voices from the Fray: Quotes and Perspectives
The public discourse surrounding Marion’s Auditor’s office is characterized by a range of perspectives, often conflicting, which collectively paint a picture of the challenges and political undercurrents at play. These direct statements from key figures illuminate the various interpretations of events and responsibilities.
Auditor Miranda Meginness has offered a nuanced perspective on the turmoil. She stated, “I understand council’s frustration… It’s been four years of a lot of stuff that’s come down the pike (dealing with the auditor’s office) that hasn’t looked too good. I do hope that at some point I’ll be able to sit down with every member of council and give them updates as they need them. I do hope we can work past (the lack of confidence city council has in the auditor’s office) and reestablish good working relationships”. She also humbly acknowledged, “I have made mistakes, and I’d like to apologize for them. Moving forward, I will continue to do my best to provide the most accurate information possible, as quickly as possible. I’d like to move past this and continue to work with council to do our best for the city”. These quotes reveal a mix of acknowledging challenges, expressing a desire for cooperation, and hinting at a longer history of issues that predate her tenure.
Councilman Ayers Ratliff, a consistent and fervent critic, has been unsparing in his accusations. He explicitly accused Meginness of providing “false information… in numerous aspects of purchasing the fire truck as to interest (on the loan), payoff information, timing of purchasing, etc.”. He also publicly asserted that Mayor Bill Collins “bullied and intimidated” Meginness into resigning, indicating his belief in political interference in the auditor’s office.
Council President Todd Schneider, despite the council’s frustrations, offered a more measured assessment of the situation. He observed, “I’ve watched this situation play out and I understand the frustration of city council… But we all make mistakes in our jobs, and when those mistakes play out in the public eye, in a public office, it’s very difficult for everyone involved. But I do have confidence in Miranda and in her ability to successfully execute the duties of city auditor”. His comments acknowledge the public nature of the challenges while still expressing support for Meginness’s capabilities, suggesting a desire to move beyond the current impasse.
Councilman Jason Schaber expressed bewilderment at Meginness’s decision to rescind her resignation, stating, “It doesn’t make any sense to me. Nothing out of the auditor’s office makes sense to me anymore… There is something there, but I can’t put my finger on what it could be. It doesn’t feel right. Time will tell”. This quote highlights the opacity and perceived lack of clarity surrounding the auditor’s office for some council members, contributing to a sense of unease and distrust.
Councilman Mike Neff directly questioned Meginness’s “job performance,” asserting that “she simply isn’t able to handle the finances of the city” and that “Marion cannot continue to allow her to mismanage the city’s finances.” He clearly advocated for her acceptance of the transit director position, viewing it as a beneficial outcome for both Meginness and the city.
In contrast to some council members, external entities have provided a different perspective. Robert Hinkle, Chief Deputy Auditor for the Ohio Auditor of State, and Greg Blate, Managing Director of Veritas Solutions Group LLC, played a pivotal role in Meginness’s decision to rescind her resignation. They “both made comments about how I needed to stay and finish the project (review of the city’s bank reconciliation procedures dating back to 2020) we have going on currently”. This is a claim that is described as half true by current and past officials.
These quotes reveal a “narrative battleground” where different stakeholders are actively shaping public perception. Meginness’s own statements, acknowledging “mistakes” but framing them within a context of “four years of a lot of stuff,” imply inherited problems. This contrasts sharply with the more pointed criticisms from council members like Ratliff and Neff, who attribute the financial woes directly to her performance.
Crucially, the external validation from the Ohio Auditor of State’s office and Veritas Solutions Group directly supports Meginness’s decision to stay, providing an authoritative counterpoint to the council’s push for her removal. This lends credibility to her position and implicitly challenges the argument that her removal is purely performance-based, thereby strengthening the argument that she might be a “scapegoat” for issues beyond her sole control. This clash of narratives can confuse the public, making it difficult for citizens to ascertain the true state of the city’s finances and who is genuinely accountable. It also highlights the challenge of governance in a highly politicized environment where facts can be interpreted through partisan lenses, potentially hindering constructive solutions.
Conclusion: Accountability, Politics, and the Path Forward for Marion
The comprehensive review of the Marion City Auditor’s office’s most recent events reveals a complex interplay of factors contributing to its ongoing turmoil. While Auditor Miranda Meginness has openly acknowledged making “mistakes” and explicitly admitted to “misappropriation of funds and coding an expense in a way that would hide the payment of an IRS penalty” the evidence strongly suggests that she is navigating a landscape burdened by inherited financial challenges. The persistent issues with bank reconciliation dating back to 2020 and the significant IRS fines incurred by her predecessor, Robert Landon III, which he inherited from Auditor Carr’s administration, indicate a pre-existing pattern of financial vulnerabilities within the office. However the sudden onset of this issue is highly suspicious and has raised concerns within the Marion Watch Citizen Action Network and our affiliates nationwide.
This historical context suggests that the problems are not solely attributable to Meginness but stem from deeper, systemic issues within the city’s financial administration, and lack of industry standard IT safeguards.
Crucially, the recurring nature of incorrect financial data entry and reporting, leading to substantial penalties, points to a profound failure in the city’s financial IT infrastructure and adherence to modern data integrity standards.
As confirmed by experts in financial systems and data management across the globe, the types of errors seen in Marion’s Auditor’s office—such as misdirected tax payments and late filings—should be prevented by the robust internal controls, validation tools, and automated processes that are standard practice in contemporary financial IT systems The persistence of these issues, dating back to at least 2006, as evidenced by the “silent sabotage” of Marion’s finances, underscores a systemic breakdown that transcends individual tenures.
The intense and escalating political opposition, including multiple votes of no confidence and the alleged pressure from Mayor Bill Collins to resign further supports the argument that Meginness may be, at least in part, serving as a convenient scapegoat for systemic issues and broader political maneuvering within Marion City Hall. The shift in the no-confidence vote from a narrow failure to an overwhelming approval indicates a significant change in political alignment or strategy, where financial issues are used as leverage in power struggles. Her decision to rescind her resignation, explicitly influenced by the Ohio Auditor of State and Veritas Solutions Group, suggests these external bodies see value in her continuity to complete critical financial reforms, implicitly contradicting the council’s desire for her removal and lending weight to the idea that her departure would hinder ongoing efforts to rectify long-standing financial discrepancies. The civil rights lawsuit filed last week by Councilman Ayers Ratliff, a key critic of Meginness, against the county prosecutor, alleging politically motivated prosecution further underscores a pervasive culture of political animosity and accusations of impropriety within Marion’s governmental structure.
This environment suggests that the Auditor’s office is not an isolated arena but rather a focal point in a wider web of political tensions.
The broader context of municipal governance in Ohio, as highlighted by the resignation of the Bucyrus Council Clerk due to a “hostile and retaliatory environment” reinforces the notion that the challenges in Marion are not unique.
Meginness’s own descriptions of a “tense” and “hostile work environment” within Marion City Hall, where she feels “scolded” and like a “pariah”, align with these external accounts. Her observations about pervasive “rumors”, the mayor’s alleged “bullying”, and the “poaching” of her internal auditor further suggest that political gamesmanship and workplace culture issues are pervasive in local government, complicating efforts to address core financial problems. Meginness’s belief that she is a “scapegoat” and that her age plays a role in her treatment adds another layer to the complex political landscape.
The protracted turmoil surrounding the Auditor’s office, compounded by the substantial financial costs borne by taxpayers due to penalties and alleged mismanagement, poses a significant threat to public trust in Marion’s governance. This persistent political infighting risks paralyzing effective financial oversight and decision-making, diverting essential resources and attention from critical city functions.
Despite Marion being recognized as a “2025 Strongest Town” for its commitment to “financial sustainability” and “transparent budgeting practices” the internal realities of its Auditor’s office present a stark contradiction, highlighting a concerning disconnect between aspirational public image and operational challenges. The financial costs are not merely abstract figures; they represent tangible losses that could have been invested in city improvements, eroding citizen confidence in the stewardship of public funds.
To break this cycle of financial error and political blame, Marion must prioritize fundamental reforms. This includes a resolute focus on strengthening internal financial controls, fostering transparent and constructive communication between city departments and the council, and actively working to de-politicize critical administrative roles. The continued involvement of the Ohio Auditor of State and Veritas Solutions Group offers a crucial avenue for establishing an objective assessment of the city’s financial health and implementing necessary, impartial reforms. However, the success of these efforts hinges on the genuine commitment of all stakeholders to embrace recommendations, prioritize long-term fiscal health over political expediency, and collectively work towards restoring public confidence in Marion’s municipal government.
Without a concerted effort to address both the systemic financial vulnerabilities and the underlying political dynamics, the Marion City Auditor’s office may continue to be a battleground, with the city’s financial well-being and public trust as the ultimate casualties.
Marion Watch will continue to uncover the truth and bring the truth from the darkness to the voters. We vow to use any and all resources to uncover the truth!
Works Cited
- “Avoiding Financial Reporting Risks: 10 Best Practices.” BCS ProSoft, www.bcsprosoft.com/financial-reporting-risk/.
- “Best Practices Data Entry: Avoid Disaster with These Tips!” Magellan Solutions, www.magellan-solutions.com/blog/best-practices-data-entry-guide/.
- “city of marion, ohio – basic financial statements for the year ended december 31, 2006.” Ohio Auditor of State, ohioauditor.gov/auditsearch/Reports/2008/City_of_Marion_06-Marion.pdf.
- “Controversy surrounds Marion City Auditor, initiative to remove her from office underway.” MarionCountyNow.com, marioncountynow.com/news/277772-controversy-surrounds-marion-city-auditor-initiative-to-remove-her-from-office-underway/.
- Crawford County Now, crawfordcountynow.com/.
- “Data Integrity and Analytics for Modern Compliance and Investigations.” Leaders League, www.leadersleague.com/en/news/data-integrity-and-analytics-for-modern-compliance-and-investigations.
- “Delinquency Report.” County Auditor Website, Marion County, Ohio, propertysearch.marioncountyohio.gov/DelinquencyReport.
- “Finance.” Marion County, OH, www.co.marion.oh.us/elected_offices/auditor/departments/finance/index.php.
- “Financial discrepancies and misconduct unearthed in Marion City..” MarionCountyNow.com, marioncountynow.com/news/277772-2/.
- “Fugitive Slave Advertisements and the Rebelliousness of Enslaved People in Georgia and Maryland, 1790-1810.” CORE, core.ac.uk/download/pdf/148790565.pdf.
- “GAO-25-108172, PROGRAM INTEGRITY: Agencies and Congress Can Take Actions to Better Manage Improper Payments and Fraud Risks.” U.S. Government Accountability Office, files.gao.gov/reports/GAO-25-108172/index.html.
- “The Importance of Reducing Errors in Data Entry.” MIP Fund Accounting, www.mip.com/blog/the-importance-of-reducing-errors-in-data-entry/.
- “Marion Auditor Resigns After Tax Mistake, Delayed Audit.” WOSU Public Media, www.wosu.org/politics/2021-10-15/marion-auditor-resigns-after-tax-mistake-delayed-audit.
- “Marion City Auditor.” The City of Marion, Ohio, www.marionohio.us/auditor.
- “Marion City Auditor – Reports.” The City of Marion, Ohio, www.marionohio.us/auditor/reports.
- “Marion City Auditor Miranda Meginness reconsiders resignation: continues role amid controversy.” MarionCountyNow.com, marioncountynow.com/news/277772-marion-city-auditor-miranda-meginness-reconsiders-resignation-continues-role-amid-controversy/.
- “Marion City Council approves vote of no confidence against Auditor Meginness.” MarionCountyNow.com, marioncountynow.com/news/277772-marion-city-council-approves-vote-of-no-confidence-against-auditor-meginness/.
- “Marion City Council Committee Meetings.” The City of Marion, Ohio, www.marionohio.us/node/4676.
- “Marion City Council’s vote of no confidence against auditor fails – what happened?” Yahoo News, news.yahoo.com/marion-city-councils-vote-no-130918806.html.
- “Marion Claims National Spotlight as 2025 Strongest Town.” Downtown Marion, www.downtownmarion.com/post/marion-claims-national-spotlight-as-2025-strongest-town.
- “Marion councilmember files civil rights lawsuit against prosecutor over dismissed child rape case.” WBNS-10TV, www.10tv.com/article/news/local/marion-councilmember-files-civil-rights-lawsuit-against-prosecutor-dismissed-child-rape-case/530-7aad507e-ac21-4bfc-a58a-83657b0f8fe9.
- “Marion councilmember sues prosecutor, others over dismissed child rape charges.” YouTube, https://www.youtube.com/watch?v=XZ9sjWJFtBY.
- “MARION COUNTY, OHIO.” IIS Windows Server, cms3.revize.com/revize/marioncountyoh/Documents/Elected%20Offices/Auditor/Departments/Finance/Financial%20Forms/2023%20ACFR%20Marion%20County.pdf.
- “Marion County, Missouri Years Ended December 31, 2006 and 2005.” Missouri State Auditor, auditor.mo.gov/press/2007-88.pdf.
- “Ohio Revised Code – Section 2921.12 Tampering with evidence.” Ohio Laws, codes.ohio.gov/assets/laws/revised-code/authenticated/29/2921/2921.12/1-1-1974/2921.12-1-1-1974.pdf.
- “Ohio Revised Code Search.” Ohio Laws, codes.ohio.gov/ohio-revised-code/search?pageSize=25&sort=BestMatch&keywords=library+financial+gain&start=251.
- “Press Release.” Ohio Auditor of State, ohioauditor.gov/news/pressreleases/Details/5948.
- “Principles of Data Integrity.” Business & Finance Solutions, UCLA, www.finance.ucla.edu/corporate-accounting/principles-of-data-integrity.
- “Section 130.10 (2921.13, 4509.102) FALSIFICATION.” American Legal Publishing’s Code Library, codelibrary.amlegal.com/codes/springdale/latest/spring_oh/0-0-0-6701.
- “Section 2921.13 | Falsification – in theft offense – to purchase firearm.” Ohio Laws, codes.ohio.gov/ohio-revised-code/section-2921.13.
- “Section 5703.26 – Ohio Revised Code.” Ohio Laws, codes.ohio.gov/ohio-revised-code/section-5703.26.
- “What is Data Integrity?” IBM, www.ibm.com/think/topics/data-integrity.
- “What is Data Integrity?” SolveXia, www.solvexia.com/glossary/data-integrity.
- Scott Spears 7/18/25, https://www.facebook.com/share/p/16dgmYpFbk/.
- “Computer Fraud and Abuse Act (18 U.S. Code § 1030).” Cornell Law School Legal Information Institute. Accessed. https://www.law.cornell.edu/uscode/text/18/1030
- “Gramm-Leach-Bliley Act.” Federal Trade Commission. Accessed. https://www.ftc.gov/business-guidance/privacy-security/gramm-leach-bliley-act
- ISO/IEC 27000 family of standards. International Organization for Standardization (ISO) and International Electrotechnical Commission (IEC). Accessed. (Specific standards like ISO/IEC 27001, 27002, 27005 are part of this family and provide detailed guidance). https://www.iso.org/isoiec-27001-information-security.html
- National Institute of Standards and Technology (NIST). NIST Cybersecurity Framework, Special Publications (SP 800 Series), and other cybersecurity guidance. Accessed. https://csrc.nist.gov/publications
- “Ohio Data Protection Act.” Ohio Revised Code, Chapter 1354. Ohio Legislative Service Commission. Accessed. https://codes.ohio.gov/ohio-revised-code/chapter-1354
- “Ohio Revised Code.” Ohio Laws. Ohio Legislative Service Commission. Accessed. https://codes.ohio.gov/
- “Payment Card Industry Data Security Standard (PCI DSS).” PCI Security Standards Council. Accessed. https://www.pcisecuritystandards.org/
- “Sarbanes-Oxley Act of 2002.” Congress.gov. Accessed. https://www.congress.gov/bill/107th-congress/house-bill/3763


