recommended reading

Census Needs Better IT Plans for 2020, Auditor Says

Jason E. Miczek/AP File Photo

The U.S. Census Bureau should keep a more diligent testing schedule for information technology initiatives related to the 2020 census or it risks not having a firm plan in place by a 2015 deadline, according to an auditor’s report released on Thursday.

Census plans to improve technology in 2020 include gathering some survey responses online and asking field surveyors to enter data using their own smartphones rather than issuing devices to them.

Out of six IT projects the bureau is researching, four don’t have finalized schedules, the Government Accountability Office found. The two projects with final schedules are not slated to be complete until after the September 2015 design deadline for the 2020 census,, GAO said.

Census also hasn’t prioritized its projects to determine which must be completed before the design deadline and which might wait, GAO said. Those projects stand a solid chance of reducing costs for the 2020 census, the auditor said, but poor scheduling could limit cost savings.

“A delayed design decision would cut into an already slim margin of error to develop, acquire, and test the operational systems that will be used for the 2020 Decennial Census,” GAO said. “In light of this, prioritizing activities and ensuring that schedules and project plans are completed in a way that is consistent with the prioritized approach could help ensure that the most essential information is available to inform this decision.”

Threatwatch Alert

Network intrusion / Spear-phishing

Researchers: Bank-Targeting Malware Sales Rise in Dark Web Markets

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.