recommended reading

IT Reform Act Could Hitch a Ride on Major Defense Bill

Rep. Darrell Issa, R-Calif.

Rep. Darrell Issa, R-Calif. // House subcommittee on Oversight and Reform

The bipartisan team sponsoring a complete reboot of how the government buys information technology introduced a version of its bill as an amendment to the National Defense Authorization Act on Tuesday.

Packaging separate legislation inside a major policy bill such as the Defense Authorization Act can speed passage because lawmakers are wary of jeopardizing the full bill based on opposition to a minor part. 

The House Rules Committee will consider amendments to the defense bill during a meeting on Wednesday afternoon.

The Federal Information Technology Acquisition Reform Act won approval from the House Oversight and Government Reform Committee in March and is awaiting action on the House floor. The bill was sponsored by Committee Chairman Rep. Darrell Issa, R-Calif., and Rep. Gerry Connolly, D-Va., ranking member of the committee’s government operations panel.

“Chairman Issa is pursuing all channels to advance his IT reform legislation,” a committee spokesman said by email Tuesday. He also noted that the 1996 Clinger-Cohen Act, which established the modern system of agency chief information officers, was also advanced as an amendment to the annual Defense authorization bill.

The government spends about $80 billion on IT annually, at least $10 billion of which auditors say is either lost to waste, duplication and inefficiency or could be saved by transitioning to more modern systems that would better serve federal employees and taxpayers.

The reform act would give CIOs authority over all IT spending inside their agencies and create a collection of agency-based Assisted Acquisition Centers of Excellence that other agencies may consult regarding particular categories of IT purchases, among other reforms.

The defense bill version of the reform act was updated based on public and industry feedback, including comments on the social legislating platform Madison managed by the Open Gov Foundation and hosted by Nextgov.

Among the most significant changes, the updated act specifies that a Federal Infrastructure and Common Application Collaboration Center, designed to serve as a “tiger team” to assist agencies with tricky acquisitions, will be located inside the Office of Management and Budget’s E-Government Office and will report to the federal CIO. The collaboration center had previously been placed inside OMB but not within a specific office.

The amendment version also further de-emphasizes a mandate that agencies consider open source alternatives when making major technology purchases. Industry groups, including TechAmerica, objected that those mandates could be read to favor some vendors over others. Issa’s office maintained it was only urging agencies to consider all options.

The updated bill also specifies that mandates to increase transparency reporting on the Federal IT Dashboard should apply to spending on ongoing IT maintenance, not just new projects. About 70 percent of the government’s annual IT spending goes to operations and maintenance of existing IT systems, according to the Government Accountability Office.

Federal CIO Steven VanRoekel has told Congress he does not believe new legislation is necessary to make government IT spending more efficient. He told members of the Senate Homeland Security and Governmental Affairs Committee on Tuesday that giving agency CIOs  budget authority is less important than offering them a “seat at the table” when major spending decisions are made.

David Powner, director of Information Technology Management Issues at GAO, told committee members agency CIOs may not need authority over all IT spending but that giving CIOs authority over commodity IT spending such as Internet and cellphone service is “a no brainer.”

The IT reform act also would:

  • Promote broader use of “bid to price” contracts in which an agency states the price it plans to pay for a good or service and then invites vendors to compete based on quality;
  • Broaden the government’s cadre of IT and acquisition experts;
  • Give agency CIOs flexibility to establish working capital funds to help pay for the transition to cloud-based computing services;
  • Require agencies to report more fully on the cost savings achieved by consolidating federal data centers.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.