recommended reading

Senate Bill Would Make Data Center Consolidation the Law


This post has been updated to add details about House legislation to consolidate data centers and a White  House plan to optimize IT spending. 

A bill approved by the Senate’s Homeland Security and Governmental Affairs Committee on Wednesday would put the power of legislation behind the Obama administration’s push to close and consolidate federal data centers.

The bill, initially introduced by Sen. Michael Bennett, D-Colo., would require the 24 federal agencies included in the Federal Data Center Consolidation Initiative to report to the White House annually on their plans and progress to cut the government’s data center footprint.

The amended legislation the committee appproved on a voice vote Wednesday was offered by Committee Chairman Tom Carper, D-Del., ranking member Tom Coburn, R-Okla., and Sen. Kelly Ayotte, R-N.H. The bill will now proceed to the Senate floor.

The government is in the midst of a multi-year program to shutter or consolidate smaller data centers and server farms and move more federal software systems to efficient computer clouds. The Government Accountability Office has criticized agencies for failing to report adequately on the initiative and said the government is unlikely to meet its initial goal of saving $3 billion from the program by 2015.

“Because federal agencies have been slow to act on consolidation initiatives, [this] bill sets hard deadlines and requires agencies to conduct inventories and implement consolidation strategies,” Bennett’s office said in a statement. 

“This is a commonsense way that we can reduce unnecessary waste, save taxpayer dollars, and ensure that our federal agencies are being held accountable,” Bennett said, adding that the bill will cut both spending and energy consumption.

In March, federal Chief Information Officer Steven VanRoekel rolled the government’s data center consolidation initiative in with a separate initiative known as PortfolioStat to streamline how the government buys and manages information technology.

A GAO report released on Wednesday found agencies were also failing to meet PortfolioStat benchmarks. 

Rep. Gerry Connolly, D-Va., introduced legislation that would put Congress’ mandate behind the White House’s data center initiative in 2012 but the bill did not reach the House floor before the close of the last Congress. A version of that bill was included in the 2014 National Defense Authorization Act, which passed the House in June.  

Come to Nextgov Prime in Washington Nov. 20-21 to discuss the biggest challenges and opportunities facing federal IT leaders. Registration is free for federal employees.

(Image via kubais/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.