recommended reading

The Race to Manage Government Records Begins


As federal agencies crawl toward deadlines to permanently store their records in digital formats, the National Archives and Records Administration is bringing together vendors that want a piece of that business.

An August 2012 presidential directive requires agencies to store all emails digitally by 2016 and to store other records digitally by 2019.

In advance of those deadlines, the Archives is inviting vendors to schedule Web presentations about their technology before interested members of the federal information management community, according to the notice posted this month.

Vendors will be responsible for hosting and scheduling the webinars, according to an information page. The archives will simply pass that scheduling information on to records management officials at government agencies. 

The technology can be focused solely on records management or on related fields such as Freedom of Information Act compliance, the notice said. The Archives is also interested in bringing in technology from related fields such as e-discovery tools that help agencies and businesses collect information demanded by opponents in a lawsuit.

The Archives is also planning an industry day in September during which records management and technology officials will explain further the sort of technology they’re after, the information page said. 

Agencies are required to store permanent copies of records that may be useful to future historians and researchers but aren’t required to turn those records over to the Archives for 30 years. Many agencies now print paper copies of those documents, partially out of concern that current file formats will be hopelessly outdated and possibly useless three decades down the road.

Government transparency groups generally praised the White House records management order, but complained the deadlines were too far out. About 95 percent of government agencies fail to meet current statutory requirements for maintaining their electronic records, according to an Archives estimate based on agency self-assessments.

The Archives is also facing a deadline at the end of 2013 to come up with a comprehensive plan for federal records management, including management of emails, social media and the metadata associated with those and other documents. Metadata is information about the creation of a document or other digital product, such as the last-edited dates attached to Word documents or the date and time stamp on digital photos.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.