recommended reading

White House Pushes Weaker Version of Spending Transparency Bill

Charles Dharapak/AP

The White House would like to roll back some transparency requirements in House-passed legislation that would standardize how the government records and publishes spending information, according to documents obtained by Federal News Radio.

The proposed changes to the Digital Accountability and Transparency Act include removing a requirement that agencies publish spending information using common data standards so watchdogs, businesses and others could easily track spending across agencies. Instead the White House version would require agencies to use open data practices so that information is public but may be less likely to be consistent.

The White House version also would require agencies to report information quarterly rather than monthly and would put the White House’s Office of Management and Budget in charge of implementing the new law rather than the Treasury Department.

OMB gave agencies a copy of the revised bill and asked them to report back with comments the same day, Federal News Radio reported.

The DATA Act passed the House nearly unanimously in November. The Senate version of the law, sponsored by Sen. Mark Warner, D-Va., was passed out of the Homeland Security and Governmental Affairs Committee in November and is awaiting a hearing by the full Senate.

The Data Transparency Coalition, a strong DATA Act proponent, called the White House version a step backward and said it would not support that version if it was substituted for the version currently awaiting action in the Senate.

"Unfortunately, OMB’s proposed revisions would nullify the bill's main purpose to standardize and publish government data, contrary to the clear consensus that has brought together both parties, both chambers, and advocacy groups across the political spectrum,” the Coalition said in a statement. “We cannot support the DATA Act if it becomes a dead letter. We hope that President Obama will clarify that he supports real reform that meets the principles expressed in his own Open Data Policy.”

Threatwatch Alert

Stolen credentials

Hackers Steal $31M from Russian Central Bank

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.