recommended reading

Bill to probe FOIA delays clears Senate Judiciary

The Senate Judiciary Committee advanced a bipartisan bill Thursday that would set up a commission to explore why tens of thousands of requests for government information get sidetracked.

Co-sponsored by Senate Judiciary Committee Chairman Patrick Leahy, D-Vt., and Sen. John Cornyn, R-Texas, the bill was approved and sent to the full Senate on a voice vote.

The legislation is in response to delays lasting sometimes years in responding to requests for documents under the Freedom of Information Act.

Leahy noted some progress in cleaning up the backlog of applications for information, saying the administration reported that the number of pending cases dropped from 124,019 in fiscal 2008 to 67,764 in fiscal 2009, a government-wide decrease of 50 percent. "But large FOIA backlogs remain a major roadblock to public access to information," Leahy said.

Sen. Chuck Grassley, R-Iowa, said exemptions cited by agencies under FOIA for preventing release of information have risen significantly in the last year. The law lists exceptions for complying with requests, such as to protect national security or personal privacy.

The bill sets up a 16-person commission to study the reasons for the delays and issue a report of recommendations within a year. An amendment by Leahy approved by voice vote orders the commission to examine and determine why the number of exemptions numbered 467,000 in fiscal 2009.

The amendment asks the commission to determine what efforts are being made to comply with President Obama's order in January 2009 to make government more open.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.