recommended reading

GSA Hopes Better Data Can Drive Travel and Conference Savings

isak55/Shutterstock.com

The General Services Administration thinks it can pare down the $15 billion the government spends annually on travel services but it needs better data first, according to contracting documents.

Information on government travel costs is currently dispersed among multiple charge card databases, airfare and hotel booking systems and conference registries.

GSA has been trying to make this mass of data more comprehensible since 2006, including by developing the governmentwide travel data service GSA Travel MIS. Government travel is still dogged by inefficiencies, though, and the people scheduling that travel often have poor insight into the cheapest flight, hotel and mileage options and the best way to maximize worker productivity during travel, according to the request for information initially posted in mid-August.

“Stakeholders tasked with the various portions of the travel management function are often forced to utilize incomplete and non-standardized datasets through what are generally unreliable and uncalibrated tools,” GSA said.

The agency is asking industry for insight about how it can pool all its travel information into a standardized database. The plan is for agencies to query that database to figure out the best government-negotiated rates for certain trips, identify where money is being spent inefficiently and point out wasteful spending by traveling employees.

GSA may use that information to develop one or more contract solicitations for new travel data management tools, the agency said.

GSA is especially interested in trimming airfare, hotel and rental car costs but may request information about train, bus and boat travel too, the agency said.

Standardized travel data may also be used to inform decision making about other government priorities, GSA said, such as reducing the government’s carbon footprint and better responding to Freedom of Information Act requests. 

(Image via isak55/Shutterstock.com)

Threatwatch Alert

Stolen credentials

Hackers Steal $31M from Russian Central Bank

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.