recommended reading

Bill would require agencies to recognize security clearances governmentwide

A bipartisan bill introduced on Thursday directs agencies to ensure that approved security clearances for federal employees and contractors apply governmentwide.

The legislation, sponsored by Sens. Daniel Akaka, D-Hawaii, and George Voinovich, R-Ohio, amends the portion of the 2004 Intelligence Reform and Terrorism Prevention Act that deals with the security clearance process. It mandates the creation of a performance accountability council to oversee the reduction of the government's security clearance backlog and extends reporting requirements.

A provision in the bill would direct agencies to adhere to "reciprocal recognition of clearances that allow access to classified information granted by all other agencies and departments." Many federal agencies traditionally have used their own security clearance standards and do not necessarily accept background checks other executive branch agencies perform. The intelligence reform law also includes a provision related to reciprocal recognition of security clearances among agencies.

The Akaka-Voinovich bill is similar to a June 2008 executive order from President George W. Bush that aimed to streamline the background checks on federal employees and contractors needing special security clearance to access classified information. The order also included a requirement that clearances apply governmentwide and established a performance accountability council.

A Senate Democratic committee aide said that the Akaka-Voinovich bill is aimed at codifying some of the executive order's provisions, including the establishment of the council. As for reciprocal recognition of security clearances among agencies, the legislation "reemphasizes" that requirement. "We were getting the sense that not everyone was following the intent, as we saw it, of what reciprocal recognition was," the staffer said.

The Defense Department issues the majority of security clearances for employees and contractors to access sensitive information, and the process long has been inefficient and riddled with error. The Government Accountability Office in 2005 placed the security clearance backlog on its list of federal programs most vulnerable to waste, fraud and abuse and it has remained there since then. In its most recent report on high-risk programs and agencies, released in January, GAO praised the government for making "significant progress" on reducing the backlog, but also noted that timeliness alone "does not provide a complete picture of the clearance process." GAO criticized the executive branch's annual reports to Congress on the clearance process for lacking sufficient data on quality.

The 2004 intelligence reform law required agencies by Dec. 17, 2009, to complete 90 percent of security clearances within 60 days. In September, Office of Personnel Management Director John Berry told Congress that the government is on track to reduce the average length of time required to process security clearance applications by the end of 2009. He also vowed that by the end of 2010 the issue would be removed from GAO's high-risk list.

The Akaka-Voinovich bill also calls on the Office of Management Budget director to submit an information technology strategy to Congress within 120 days of the legislation's enactment for expediting the security clearance process. In addition, agencies would have to continue reporting to Congress on their progress in improving the security clearance process until two years after GAO removes the program from the high-risk list, or 2017, whichever arrives first. Currently, the reporting requirement runs through 2011.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.