recommended reading

House Passes Federal IT Reform Yet Again, This Time With Defense Bill

Rep. Darrell Issa, R-Calif.

Rep. Darrell Issa, R-Calif. // Carolyn Kaster/AP

This story has been updated with details about the amendment and with comment from Sen. Tom Udall.

A fundamental overhaul of how federal agencies build and buy information technology systems passed the House on Thursday for the second time this year.

The chamber in February approved the Federal Information Technology Acquisition Reform Act, or FITARA, which among other reforms would limit each federal agency -- including the Defense Department -- to one person with the title chief information officer and give that person authority over the agency’s IT spending.

This time around, the legislation was tacked on as an amendment to the 2015 National Defense Authorization Act, which the House approved by a vote of 326-98. A similar measure made it into the Defense bill last year but was stripped out at the last minute in December, when lawmakers also cut more controversial amendments -- including one addressing sexual assault in the military -- to ensure the bill would pass both the House and the Senate.  

The amendment approved Thursday differs somewhat from the bill that passed in February, according to a Hill staffer who asked not to be named. The new legislation omits a requirement for a pilot program on interagency collaboration and a plan for acquisition centers for excellence, the staffer said.

The urgent need for federal IT procurement reform became a national story last year, after the cumbersome system’s limitations were blamed in the failed launch of Legislation has consistently had the backing of both Democrats and Republicans. In the House, FITARA has been jointly sponsored by Reps. Gerry Connolly, D-Va., and Darrell Issa, R-Calif.

Issa on Thursday applauded the House for it’s latest passage of FITARA. “We spend more than $80 billion a year on federal IT systems, yet the cost overruns and failure rate for these programs is as high as 80 percent,” he said. “By streamlining responsibility and centralizing budget authority, this bipartisan legislation will go a long way to increasing accountability and cutting waste.”

A Senate version of IT reform introduced in December would also mandate a single CIO for each federal agency but it would limit their budget authority somewhat, compared to the House version, while still requiring them to play a central role in all IT budget decisions. That bill, known as the Federal Information Technology Savings, Accountability, and Transparency Act, is sponsored by Sens. Tom Udall, D-N.M., Jerry Moran, R-Kan., and Mike Johanns, R-Neb.

Udall is considering attaching that legislation to the Senate Defense authorization bill, according to his spokeswoman Jennifer Talhelm. "He’s also urging the Homeland Security and Government Affairs Committee to consider it," she said. "Sen. Udall feels we should act on it sooner rather than later." 

The White House has not commented on specific IT reform legislation, but federal Chief Information Officer Steven VanRoekel has said that giving agency CIOs budget authority is less important than giving them “a seat at the table” when major decisions are being made.

The Senate Armed Services Committee began marking up its own 2015 Defense authorization bill on Wednesday.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.