recommended reading

What Do HHS Employees Really Think? Agency Will Pay Data Miners to Find Out

VLADGRIN/Shutterstock.com

The Health and Human Services Department plans to mine data from its internal social network, including deducing employee’s emotions and sentiments, contracting documents show.

Health and Human Services began using the internal social networking site Yammer in late 2012, according to a department blog post. The Facebook-like network is open to all the department’s 75,000 employees, the post said. It’s focused on helping employees better engage with each other across divisions and informally crowdsourcing solutions to workflow issues.

HHS Secretary Kathleen Sebelius’ office plans to award a three-month contract to the California-based business intelligence company GoodData to sift through information posted to Yammer to determine employees’ sentiment on particular topics and to learn which topics are trending on the site. 

The secretary’s office plans to award the contract under a Federal Acquisition Regulation provision that allows agencies to forego competitive bidding in instances where there’s only one acceptable vendor for a particular good or service. The notice of intent posted Thursday is meant to give potential bidders a chance to prove they can offer a competitive monitoring service.

The document doesn’t list the value of the GoodData contract or go into details about what information the secretary’s office hopes to cull from employees’ Yammer posts.

Federal agencies including the Food and Drug Administration and the Secret Service have launched social media monitoring programs in the past, though they’re usually focused on monitoring what the public is talking about, not federal employees.

A guidance document from the Federal Chief Information Officer’s Council released in July approves of social media monitoring provided agencies disclose how and why they’re doing it to people who might be monitored. 

(Image via VLADGRIN/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.