recommended reading

House oversight leaders find rare bipartisan agreement on IT reform

Reps. Gerry Connolly, D-Va. and Darrell Issa, R-Calif.

Reps. Gerry Connolly, D-Va. and Darrell Issa, R-Calif. // Kristoffer Tripplaar

One key to rationalizing the way information technology is managed in government is to mandate transparency about what agencies are buying and from whom, Rep. Darrell Issa, R-Calif., said during Nextgov Prime Monday.

Rep. Gerry Connolly, D-Va., who appeared onstage with Issa, agreed.

“Off the shelf software for agency X, identical to that same software for agency Y, ought not to be proprietary information,” Connolly said. “Right now, often, it is. The same company selling the same software to two agencies can insist that one agency can’t know what the other one is paying for it. And it is not uncommon, as Darrell indicated, that, as a result, we have 24 different price structures for the same item.”

Issa has proposed legislation to reform federal information technology acquisitions that, among other things, would urge agencies to use open source software when possible. A coalition of industry groups criticized that provision and others in an open letter to Issa Friday, saying they could not endorse the legislation in its current form.

Issa responded Monday that he intended the Federal Information Technology Acquisition Reform Act to be neutral about how technology is developed.

Some open source software may not be an ideal fit for government because government’s needs are sometimes unique, he said. But government agencies often have similar needs and one agency ought to be able to benefit from software that’s developed or retrofitted for another agency, he said.

Issa is chairman of the House Oversight and Government Reform Committee, which oversees many government efficiency efforts. Connolly is the ranking Democrat on the panel’s technology subcommittee.

The two have a historically combative relationship but agreed with each other numerous times during Monday’s discussion.

Connolly has praised Issa’s reform plan, but said he hopes to make some changes before the legislation is passed out of committee. Technology reform can help drastically reduce waste and fraud in government, clawing back $200 billion or more, he said Monday.

That reform could help ease the pain of any budget deal to avoid the so-called fiscal cliff in January, he said.

Issa’s bill would also mandate that each federal agency has a single chief information officer with broad budget authority, a power that only Veterans Affairs CIO Roger Baker has now.

“What we want to do is redefine the word ‘chief’ to mean chief,” Issa said during Monday’s panel. “There has to be one responsible individual who then holds their staff -- at all levels, regardless of their titles and their pay grades -- responsible. We don’t have that in the federal government.”

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.