Professional Documents
Culture Documents
Public-Sector Information
Technology Policy
In 1813, a year before the British burned the buildings of the nation's
capital in ".Mr. Madison's War," Congress made provision for the protec
tion of state documents. In what may be considered the beginning of fed
eral information policy, it was mandated that one copy of the House and
Senate journals along with certain other legislative documents be made
available by the secretary of state to selected universities, state libraries,
and historical societies. By the 1840s, the Depository Library program
was promoting the practice of agencies making their publications avail
able to the public. The Printing Act of 1852 established the office of the
Superintendent of Public Printing under the Secretary of the Interior,
who in 1857, became responsible for distribution to depository libraries.
On the day Abraham Lincoln was inaugurated, the Government Printing
Office (GPO) was established, displacing the private printing companies
serving the government at that time. The Office of the Superintendent of
Documents was created in 1869, and under the Printing Act of 1895 the
Depository Library program was taken over by the GPO and the Monthly
Catalog of GPO publications was launched. There is a direct line of
development of federal information policy from the wartime concerns of
1813 to the launch of electronic publication formats in the 1990s, but by
then the scope of governmental publications had grown exponentially
and all agencies, not just the GPO, had become outlets for federal infor
mation, often via the Internet.
The first depository library shipment under the 1895 act was sent out to
420 libraries on July 17, 1895. It contained only 11 publications of Con
gress. By 1922, however, depository libraries were receiving so many pub
lications that they complained'about lack of space and staff, particularly
in view of relative lack of use of government documents. The GPO ended
29
30 CHAPTER 2 A BRIEf HiSTORY Of PUBLIC-SECTOR INFORMATION TECHNOLOGY POLICY War and CoId~
the practice of sending every library every publication and instead devel WARANDCOUl
oped the Classified List of United States Government Publications, allow . .FRASTRUCT\I
ing libraries to select desired holdings. Only 48 of the 418 depository
libraries existing in 1923 opted to continue to receive all publications. In Chap
Still, by 1945, the GPO was doing eight mailings a day per library. Vannen
Libraries were overwhelmed, complaining about being unable to main Deyelop
tain comprehensive records, to ensure documents were actually shelved, Bushla
and to cope with the perishable stock paper on which documents were ohjocttel
printed. Eventually, under the Depository Library Act of 1962, libraries see and·
were relieved of the obligation to retain forever documents they had future. 1
agreed to receive; instead, 53 regional depositories were named to receive itself. _
all government publications, but even they could dispose of documents
after 5 years (McGarr, 2000). The fioI
in 190,
During the 1980s and 1990s, governmental efforts to reduce paperwork the BriIi
combined with sharp cutbacks in funding for printing meant a notice Ii Stripf
able decline in the number of federal publications in print. Information Lab'~ ZI
dissemination on microfiche, which the GPO had seen as a solution to
the fiall
the information explosion, now became viewed as outdated technology
tube ....
as libraries, universities, and the media retooled for the computer age.
Many government publications became issued only in electronic format,
abandoning print altogether. As this occurred, the GPO, which for over
100 years had been the dominant agency for information dissemination
by the federal government, now became one among a larger number of
players in the arena of federal information policy. The National
Technical Information Service, the National Archives, the Smithsonian
Institution. the office of the president, and of course the agencies them
selves all have become major direct providers of federal information in
electronic format. In 2004 the GPO, having already cut its consumption
of paper in half in the 1992-2003 period and mounted over a quarter
million free digital documents by 2004, drew up a 3-year plan to trans
form itself from a printing office to a manager of digital documents
(Menke, 2004a).
The fedtlral Depository Library program and the GPO were pioneers
establishing the principle of information access for all Americans. At the
dawn of this new century, however, information access has come to tran
scend thtl concept of document dissemination. Moreover, since the
1970s. new information policy issues have come to the fore as well, in
cluding the government's role in developing the infrastructure for infor
mation and communications technologies (leT); leveraging information
technology (IT) to promote public-sector productivity and to reinvent
the way government does business; information security, particularly
after the terrorist attack of September 11,2001; and any number of reg
ulatory issues arising from the coming of age of cyberspace.
.. PI::u::Y War and Cold War: Origins of Information Technology Infrastructure in the United States 31
The advent of widespread mainframe computing in the federal govern ers." Tho!
ment was associated with IBM's 701 computer, which was sold starting System Do
in 1952-1953 for defense purposes during the Korean War. IBM. in an directly liD
alliance with Harvard University, had developed the Mark 1 computer ARPAnet, t
in 1944. but it had been a relay computer. relying on decimal storage It reached 1
wheels and rotary dial switches. IBM chief Thomas Johnson Watson had nections in
the 701 developed specifically for the Korean War effort. as a "defense resoarch pn.
calculator." Early 701s were sold to the U.S. Navy, the Department of fundamenta.
Defense, aircraft companies, atomic research laboratories, and other gov online digC\l
ernment agencies. accidental !,l
1990, hadnE
A new level of computer use in government was achieved by the IBM
7090, introduced in 1950 as the first commercial transistorized com
puter and the world's fastest. With the 7090 and its upgrades, IBM dom
ESTABLISHING THE I
inated the mainframe world of computing in the 1960s and 1970s. Then,
INFORMATION POU
in the face of competition by Apple Computer's revolutionary desktop
microcomputer, IBM introduced the IBM PC in 1981. Intended as a per Although not
sonal computer for use in the home and not competitive with IBM's gmergence of
mainframe computers for business, the PC soon came into general gov
ernmental and business use, eventually ending the stand-alone main The Admini.!:lt
framg architecture for IT, Gal piecm; of I,
(APAL which I
In 1957 as IBM's 701 computers were coming into widespread use in the
regulatiom to;
federal govgrnment, the Soviet Union launched the world's first artificial
eleGtronic u , "
satellite, Sputnik-I. In direct response, that same year the federal govern
inga and publit
ment established the Advanced Research Projects Agency (ARPA) within
the APA becm
the Department of Defense to promote defense technology. Over the next
12 years, major governmental initiatives reconstructed telecommunica rUlemakiug.
tions infrastructure and created the predecessor of the modern Internet. The Federal XI
Some of these initiatives were specifically military. Semi-Automatic Act of 1950 (A
Ground Environment and the related Whirlwind project (1958), for quate and prop
instanGe. represented major advances in data communications technology decisions, pro
and were used in the service of air defense. In 1960, President Eisenhower Combined \\itJ
placed the National Aeronautics and Space Administration (NASA) in Electronic Free
charge of communications satellite development. Echo, NASA's first satel for the mandatf
lite, was launched August 12 and functioned to reflect radio waves back
The Freedom I
to earth. ;rhe Communications Act of 1962 combined the efforts of AT&T,
established thl
NASA, and the Department of Defense to create Comsat on February 1,
Agencies ,\'ere
1963. In 1964, led by Comsat, a consortium of 19 nations formed IntelSat
their own initio
with the purpose of providing global satellite coverage and interconnec
fled certain exe
tivity. IntelSat in 1965 launched the Early Bird satellite, the world's first
matters, interru
commercial communications satellite, serving the Atlantic Ocean Region.
tected by othe
Global satellite coverage was achieved by IntelSat 7 years later, in 1969.
secrets and fim
In an effort that predated the modern Internet by decades. in 1965 ARPA civil discoverr
sponsored a study of the "cooperative network of time-sharing comput privacy, im'esti
lGY POLICY Establishing the Architeaure of Federal Information Policy, 1946-1980 33
the federal govern ers." The Massachusetts Institute of Technology's Lincoln Lab and the
:II was sold starting System Development Corporation in Santa Monica, California, were
an War. IBM, in an directly linked via a dedicated 1200 bps phone line. Finally, in 1969
e Mark 1 computer ARPAnet, the predecessor of the Internet, went online with four nodes.
on decimal storage It reached 15 nodes by 1971, had e-mail in 1972, and international con
ohnson Watson had nections in 1973, the year in which Bob Kahn started the "internetting"
ifnrt. as a "defense research program at ARPA, working with others to develop many of the
the Department of fundamental concepts on which the Internet rests. ARPAnet initiated
mes. and other gov online discussion lists in 1975 and suffered its first viruses in 1980 (an
accidental status message virus). ARPAnet was not phllsed out until
1990, having performed its function as the test bed of thg Interngt.
aeyed by the IBM
banSistorized com
IfI8"9-des. IBM dom
ESTABLISHING THE ARCHITECTURE OF FEDERAL
III and 1970s. Then,
INFORMATION POLICY, 1946-1980
lUlutionary de5klop
I.lD.tended as a per Although not directed specifically toward IT, thg postwar pgriocl saw tbg
,.m,-e with IBM'g emergence of several pillars of federal information policy.
.. into ggngral gov
t d!Dld-aloDl=! main The Administrative Procedures Act of 1946. The earligst of thgse criti
cal pieces of legislation was the Administrative Procedures Act of 1945
(APA), which required agencies responsible for proposing new rules and
ilmpread use in the
regulations to publish them in the Federal Register, which developed an
_leh first artificial
electronic version in 1993. More significantly, the APA required hellf
r IIIIc federal govern
ings and public participation in regulatory rule making. In the late 1990s
~ L\RP.\) within
the APA became a legal basis for elgctronic public participation in e·
~_ On~r the next
rulemaking.
II!II tdernmmuniea
• ...-iern Internet. The Federal Records Act of 1950. Four years later, the Foderal Recordg
~ Semi-Automatio Act of 1950 (FRA, amended 1964). mandated agencies to preserve "ade
.~ {19(8), for quate and proper documentation of the organization, functions, polioies,
IIIiI:IIions tochnology decisions, procedures, and essential tnm5actiontl of the agency."
.&i"Pnt llignhowflr Combined with the 1966 Freedom of Information Act and thg 1996
~ C\"\SA) in Electronic Freedom of Information Act, the FRA became the legal basis
a,N.-\S.-\:s first satel for the mandate that federal agencies make information available online.
f! ad.io wayes back The Freedom of Information Act of 1966. This act, known as FOIA.
~ dbts of i\T&T,
established the right of public access to government informfltion.
~ em February 1,
Agencies were required to make information available automatically at
;.. bmed InteiSat
their own initiative or in response to individual f(lqUgsts. FOIA speci
~.-) inteocollneG fied certain exemptions. including classified defense and foreign policy
.tIae ,,-odd's first
matters, internal agency personnel rules and practices. information pro
- Oc.oon Region.
tected by other laws (e,g., many contractor bids), commercial trado
,.., l:Ib!!r. in 1969.
secrets and financial information. documents normally privileged in thg
IIIIIIL irn. 1Q65 ARPA civil discovery context, personal information affecting an individual's
_ h iug comput- privacy, investigatory records compiled for law enforcement purposes,
34 CHAPTER 2 A BRIEF HISTORY OF PUBLIC-SECTOR INFORMATION TECHNOLOGY POLICY
1k~
The Presidential Records Act of 1978. This post-Watergate legislation
changed the legal ownership ofthe official records ofthe president from ..,..
private to public, further expanding public access to federal information. -II
The Paperwork Reduction Act of 1980. The PRA mandated an informa -'
du
$
tion resource management (IRM) approach to federal data. This impor
tant piece of legislation was the culmination of a decade of information
policy discussion and debate and represented the first truly unified pol
icy framework for IRM at the federal level. The director of the Office of
MWEt£lI!t
0L0G'r Poucy From BITNET to FirstGov:Growth of the Internet, 1981-2000 35
lD interfere with law Management and Budget (OMB) was given responsibility for developing
nnation revealing the a policy for treating information as a resource and for overseeing the
d to protect the safety implementation of an IRM plan. A major revision of the PRA in 1995
d ~a.phical infor made strategic planning for IRM a federal mandate.
II:I:1TOnic Freedom of
Thus, by the end of the 1970s, the federal government had moved from
lated the Freedom of
data management to IRM and had put in place the legal infrastructure
to ensure both public access to federal information and also the protec
created the Office of tion of individual privacy. As later chapters will discuss, this legisla
15 other IT agencies tion was less than effective in rendering its lofty ideals into satisfactory
mal Research Service practice. Moreover, these acts were the architectural underpinning for
eorganization Act of what was to come, but they were written before the full impact of the
d by the Budget Im IT revolution in the two decades that followed. That impact ensured
A to access executive that policies associated with the legislation enumerated above would
continue to require revisitation for the remainder of the century and, in
deed, to the present day.
A was an elaboration
mce in the Federal
II) required agencies
FROM BITNETTO FIRSTGOV: GROWTH OFTHE INTERNET,
llatements and man
1981-2000
inutes (to include a
I., documents issued, The last two decades of the 20th century witnessed the coming of age of
IIIerials and all other the Internet, which in turn breathed life into visions of e-governance dis
;,. and studies were cussed in Chapter 1. In 1981 there was no Internet. By 2000, the federal
government had established an impressive presence on the Web-a
:iYacr of individuals presence that many thought would change everything.
IIdernl agencies. The
The year 1981 saw the establishment of BITNET, the Because It's Time
iJl information were
NETwork. This important forerunner of the Internet was initiated as a
IY record containing
cooperative network at the City University of New York. It provided
.. written consent of
electronic mail, file transfer, and discussion list functionality. In 1986
protide individuals
the National Science Foundation (NSF) funded NSFNet as a backbone
network. In 1987, NSF signed a cooperative agreement to manage
; .-as another elabo NSFNet in cooperation with IBM, MCI, and Merit Network. By the end
Ie that the public is of 1987 there were 10,000 Internet hosts. Together, the military'S
IIrl:ing the decision- ARPAnet, academia's BITNET, and the government's NSFNet formed the
triad of networks that melded to become the modern Internet.
Iatergate legislation By 1984 computer networking had advanced to the point where a for
.the president from mally administered system of addresses was necessary. The domain
iederal information. name system (DNS) was established that year, allowing users to employ
-.dated an informa mnemonic Internet addresses (URLs-uniform resource locator ad
II data. This impor dresses, such as www.nsf.gov) instead of numeric Internet provider (IP)
lCade of information addresses. The translation between URLs and their IP numeric counter
1St truly unified pol parts was first done through a single lookup file, hosts. txt, maintained
elm of the Office of by UCLA's Jon Postel, on a Department of Defense contract. Later, a
36 CI-IAPTER 2 A BRIEF HISTORY OF PUBLIC-SECTOR INFORMATION TECHNOLOGY POLICY
By 1989, the number of Internet hosts reached 100,000, and the fol
lowing year ARPAnet was phased out, eclipsed by NSFNet. When the
Clinton administration took office, the growing significance of the
Internet was already clear. Vice President Al Gore had been a cham
pion of the High Performance Computing Act of 1991, which autho
rized the creation of a "national high-performance computing program"
for high-speed networking and established the National Research and
Education Network. A year later the number of Internet hosts had
reached one million, the first Web browser software was released
(Mosaic, created by Tim Berners-Lee), and the age of Web surfing was
launched. The same year, 1992, the first White House Web page was
put up, and in 1993 public e-mail to the president and vice-president
was inaugurated.
tr:m!;fprring it by file
technology had made the 1967 ruling obsolete. The tax prohibition
las oyer networks) to
applied to vendors with no physical presence in the state. In 1991), the
ad the world. In 1984, World Trade Organization (WTO), meeting in Singapore, reduced tariffs
lDdem DNS, in which
on IT trade items, thereby encouraging global Internet commercial de
kdernet ~aintenance velopment And in 1998, the Internet Tax Freedom Act of 1998 (ITFA)
III of Defense contract imposed a 3-year moratorium on state and local taxation of Internet
tary portion. In 1992, access-a moratorium that was subsequently renewed. 1 The overall ef
IIIed (XSI) to perform fect of Supreme Court, congressional, and WTO actions was to open up
llnet Corporation for e-commerce as a very attractive milieu for doing business.
iIi:ty for the DNSs and
the military remains
By the time federal funding of the Internet ended in 1993, the Internet
llent for the .gov sec
had become a private-sector entity. Routing began through private pro
s..
viders in 1994. NSFNet to being a limited research network. But
loo.OOO. and the fol the commercialization of the Internet did not mean the federal govern
r KSFXet. When the ment had lost interest in promoting IT infrastructure-far from it. The
significance of the National Information Infrastructure Act of 1993 mandated funding pri
e had been a cham ority in federal research and development efforts be given to accelerated
tOOl. which autho development of high-performance computing and high-speed network
I:DIDputing program" ing services.
tional Research and
: Internet hosts had The federal government also became more sensitive to social problems
hr:tn> was released associated with the growth of the Internet in this period. The Commgrcg
:of Web surfing was Department's 1995 National Telecommunications and Information
louse Web page was Administration's report, "Falling Through the Net," brought widespread
t and \-ice-president public attention to the issue of the digital divide. In reaction, the
Telecommunications Act of 1996 provided for a Universal Service Fund
fee (a telephone tax, also known as the HE-rate" fund or fee), pa:rt of
iIIlited by the NSF's which became used on a Clinton administration initiative to providg
at b,- the National modem-based Internet access to schools, libraries, Indian reservations,
.me on the Internet. and other digital divide target groups.
- . scientific. or re
II Riel Boucher (D, At the start of the new millennium, on June 24, 2000, President Clinton
D House Committee made the first presidential Internet address to the nation, calling for the
pas,..~ and in Nov establishment of the FirstGov,gov portal, a consumer-oriented one-stop
II that n!pealed the Web address leading to all that the federal government had to offer. It
IIat permitted com was seen by some as the start of building the virtual state. FirstGov.gov
were profound and was launched September 22, 2000, as a Clinton management initiative
that provided a gateway to 47 million federal government Weh pages.
FirstGov.gov also linked state, local, DC, and- tribal government pages in
ather accelerant in an attempt to prOVide integrated service information in particu)IH argall,
.... Xorth Dakota such as travel. It was managed by the Office of Citizen Servin!s and
m- I: Illinois State
Communications within the General Services Administration (GSA). It
.. prohibited Inter fell short of some aspirations for it, but FirstGov.gov marked a tremen
e Gmrt finding that dous milestone in federal IT policy.
39 CHAPTEI\ 2 A Bfl.IEF HISTOI\Y OF PUBLIC-SECTOR INFORMATION TECHNOLOGY POLICY
The coming of the information age brought with it several policy issues,
all having the common theme of applying long-standing social princi
ples to new situations created by the possibilities of leT. These issues
included guaranteeing public access to electronic information, promot
ing public participation in e-government, ensuring accessibility for the
disabled, protecting individual privacy, modernizing education, secur
ing intellectual property, and, more recently, implementing electronic
voting and stopping the export of American IT jobs.
)7 . ,
.... i
Public participation in e-government. Toward the end of the last decade ~
- .
p .
need to go beyond passive information provision and instead actively -=T~j
involve citizens in agency decision processes. In 1997, the U.S.
••
Department of Agriculture became the first federal agency to engage in
e-rulemaking, soliciting Web-based comments on rules for organic foods.
This initiative won the 1998 Government Technology Leadership Award.
A few other agencies followed suit, but implementation of this type of
------.
.....
ma....
!
....
11Iis.....
the OMB called for a uniform protocol for e-rulemaking by the end of 21m.. willi!
2003. Finally, Regulations.gov was launched as a new one-stop Web por ~
tal in late 2002, part of the Bush administration e-government initiatives.
On this site, citizens could find, review, and submit comments on fed )( , 7 ,
eral documents that are open for comment and published in the Federal its - I I I
Register. 2 t:imL. n.1
Accessibility for the disabled. The Rehabilitation Act Amendments of drt-di i
aDSSFtI
1986 (sometimes called the Rehabilitation Act of 1986) added Section
..-,
508 to the Rehabilitation Act of 1973. Section 508 required federal agen
cies to establish guidelines for making IT accessible to the disabled.
-al policy issues, Agency accessibility evaluations were mandated, and the attorney gen
IIIiiIIg social princi eral was charged with compliance evaluation. The 1998 Amendments to
fK:T. These issues the Rehabilitation Act of 1973 required federal agencies to make their
lilnnation. promot electronic information, including their Internet pages, available to peo
a::essibilitv for the ple with disabilities. This strengthened the Section 508 disability access
I education, secur standards mandated, by the 1986 amendments, though a significant loop
~ting electronic hole allowed federal agencies to be exempted from Section 508 imple
mentation where the disability initiative in question would constitute
an undue burden.
W the right of cit
Ll\rights to include Individual privacy. Privacy in cyberspace has been a continuing con
:to prmide online gressional priority as federal IT has become pervasive, though imple
L EFOL\ officially mentation has been weak, as later chapters discuss. The Computer
-.lion had to be in Matching and Privacy Protection Act of 1988 was an amendment to the
II chOOSing, as pre Privacy Act of 1974 that extended Privacy Act protections to most
- -reasonable ef forms of computer matching of individual records across agencies .
.uc: reading rooms However, in 1996 the Personal Responsibility and Work Opportunity
lliministrative rul Reconciliation Act, also known as welfare reform, required interstate
~ of the public." and intergovernmental coordination for the matching of records to
IIICIIion [~ARA), in ensure that no individual exceeded the allotted 5-year lifetime cap on
liDded agencies of assistance. Moreover, many IT initiatives after the terrorist strike of
llltation of agency September 11, 2001, were based on creating new levels of computer
matching of individual records, often in secret and rarely with individ
ual consent.
I of the last decade
, emphasized the
President Clinton, in his presidential memorandum of May 14, 1998 (Pri
II instead actively
vacy and Personal Information in Federal Records), directed federal
• 1997. the U.S.
agencies to review their compliance with the Privacy Act of 1974. Each
IIIIlDCY to engage in agency was to designate a senior official for privacy policy. Each agency
I for organic foods.
was required to conduct a Privacy Act compliance review. This require
r..dership Award.
ment was generalized under the Bush administration, when in 2003 the
ion of this type of
OMB required privacy assessments as part of the FY 2005 budget process.
III: of e-rulemaking
For the first time agencies were required to submit privacy assessments
!Ill projects of the
of major IT systems as part of their annual business case submissions.
Ia in 2001. In 2002 This implemented privacy provisions detailed in the E-Government Act of
ing by the end of
2002, which included sections on privacy assessments and Web site pri
l8le-stop Web por
vacy statements.
mInent initiatives.
comments on fed
Modernizing education. In the 1990s, the federal government increased
bed in the Federal its support for modernizing technology infrastructure in public educa
tion. The Information and Technology Act of 1992 promoted technology
:I Amendments of development in public education, health care, and industry and called
16) added Section on NSF to fund efforts to connect K-12 classrooms to NSFNet. And, as
40 CHAPTER 2 A BRIEF HISTORY Of PUBLIC-SECTOR INFORMATION TECHNOLOGY POLICY
mentioned above, the Telecommunications Act of 1995 provided for the Thedn
HE-rate" telephone tax to fund Internet access for schools, libraries, and con.ftuo.
others. Likewise. the Library Services and Technology Act of 1995 pro pel$OnaI
vided additional IT funding for public libraries. Finally, the New Commm
Millennium Classrooms Act of 2000 provided tax incentives to corpora from chi
tions to donate up-to-date computers and related technology to schools and 5imi
and libraries. dren 1»41
tered _
RQgulating Q-vicQ. The dark side of the Internet also came under con
gressional scrutiny in the 1990s. The Communications Decency Act of To~-SllJiII
its enforcement on grounds of vagueness. The Supreme Court unan to r.. nul
imously ruled most of the CDA unconstitutional in 1997. Subse The Pm!
quently, the Child Online Protection Act of 1998 (COPA) established Title X.
$50,000 fines for commercial Web publishers who knowingly used prort. .
the Web to allow children to view pornography. It also required adults non ....
to have to use access codes or other registration procedures before Th,p. " .
being allowed to see objectionable material online. The American ~-dII
Civil Liberties Union (ACLU) took the position that COPA criminal
ized free speech. In the last case of its term, by a five to four vote, in lbr: CW
the case of Ashcroft v. the AGLU (2004), in July 2004 the Supreme liIJeUt III'
Court ruled that COPA "likely violates the First Amendment" and that
.....
fAwaIiI
the government had not shown that its more restrictive approach was
more effective than less restrictive approaches such as filtering soft
ware. The case was remanded to the lower courts, where the Bush
--- ...
Iftp'·
.".
•
i prmided for the The Children's Online Privacy Protection Act of 1998 (COPPA, not to be
DIs. libraries, and confused with COPA, above) made it illegal to collect, use, or disclose
Act of 1996 pro personal information from children under 13. Enforced by the Federal
'malh-. the New Communications Commission, COPPA required those who collect data
1Ii,""e5 to corpora from children under 13 to first obtain parental permission. Chat rooms
Bogy to schools and similar websites were also prohibited from collecting data on chil
dren as a prerequisite for access to the sites. COPPA legal action has cen
came under con tered on nonpornographic commercial sites such as GirlsLife.com and
s Decency Act of Toysmart.com, which became entangled in COPPA-related Federal Trade
!Cent"" materials. Commission (FTC) fines and litigation. COPPA has been much less con
_e
junction against
Court unan
in 1997. Subse
troversial than other legislation mentioned in this section and is thought
to be unlikely to be overturned by the Supreme Court.
.. tJt'low). which new domain would not connect a child to other online sites outside the
.rioDing artistic child-friendly zone. While representing a novel approach to the issue of
• mlicitation to child protection on the Internet, as of this writing the .kids domain
II::T to bQ a con remains relatively unpopulated and unused.
WI ~bon of free The Controlling the Assault of Non-Solicited Pornography and Market
ing Act of 2003 (CAN-SPAM) gave the FTC, state attorneys general, and
42 CHArTER 2 A BI\IEF HISTOI\Y OF PUBLIC-SECTOR INFORMATION TECHNOLOGY POLICY
ISPs the power to enforce rules requiring senders of marketing e-mail to ..........
to COUIIIII
include pornography warnings, to offer opt-out methods, and to not use
falae or deceptive information in e-mail subject lines. The law became IlDsallo
effective January 1, 2004, and authorized the FTC to impose fines up to x..wJa
$250 por o-mail, with a cap of $2 million for initial violations and $6 _ot: _)
million for repeat violations (these caps do not apply to e-mail using fIIInx..
false/deceptive aubject lines), There were also criminal penalties includ 76 \DIIJII
ing up to 5 years of prison. The FTC was mandated to develop a plan for bowa.
a national do-not-spam registry and was authorized to launch the list ~
after filing its report.
A 2004 Btudy found that most spammers were ignoring the CAN-SPAM
~
parft:ww
~n.l
...
law. However, it was only in April 2004 that the first CAN-SPAM pros IT lII1:d...
ecutions took place against operations promoting diet patches and
human grown hormone pills. In May 2004, the FTC required that the In~
term SEXUALLY-EXPLICIT: appear in the subject line of sexually ori from tI.::
ented commercial e-maiL In June 2004, the FTC advised Congress that haTt" ....
the proposed no-spam national registry could not be implemented until af!a::t tl.:1
technology emerged that could verify the origin of e-mail. The~
Cinf':Stt.
Securing intellectual property. Largely in response to demands from the IXllitlad ill
entertainment industry, Congress moved to protect intellectual property
rights through the Digital Millennium Copyright Act of 1998 (DMCA),
which extended copyrights to digital media, but the "Fair Use Doctrine"
was retained to promote the rights of universities, libraries, and other
occaBional Wlers of intellectual property. The act also prohibited removal ET'eIl bc6..
of copyright management information from electronic media, outlawing
the circumvention of antipiracy access controls. The DMCA imple
~
~iDWi
nm:.lllba- _
mented the 1996 World Intellectual Property Organization (WIPOJ Copy
right Treaty of 1996 and the WIPO Performances and Phonograms Treaty
of the same year. The next year, the Trademark Cyberpiracy Prevention
Act of 1999 outlawed cybersquatting, giving corporations and others pro
~
1_
In the
C..IlP".
tection against those who register well-known domain names as a means npID2D,
of extorting fees from existing trademark owners. fnmd _-\ 111
Electronic voting. The "hanging chad" controversy over voting in the Intf""5t* "
2000 presidential elections motivated passage of the Help America Vote tioos PtiwIiI
Act of 2002 (HAVA). HAVA funded replacement of lever and punch card crimin;;aJi;,.
voting technologies with new electronic systems. By January 1, 2004, ~,.I
the~
states had to submit plans to switch to electronic voting machines for
use in the 2006 national elections. However, since 2002, numerous
issues have emerged about the security and integrity of existing elec
my d
requind iii
H"
tronic voting systems from Diebold and other vendors, bringing imple 3l!!Lmi1! . .
mentation into question and raising fears of litigation. Intbel~
Regulating the outsourcing of IT jobs. The faltering performance of the tedun!~
economy and the approaching 2004 presidential elections brought 19901..~
GT Poucy Securing E-Government, /986-2005 43
..n.eting e-mail to another IT policy issue to national center stage: the offshoring of IT jobs
Us. and to not use to countries such as India and Ireland, where lower wages prevailed.
I. The law became
This also raised information security issues in the case of federallT work,
-.pose fines up to as well as issues of enforcement of privacy protection legislation when
'I'iolations and $6 work is performed abroad. Passed in January 2004, a provision of the
Iy to trmail tilling omnibus budget bill barred companies that win federal jobs through A
I penalties includ 76 competitions from shifting the work to other countrie5. The meaSUT\:1,
_~lop a plan for
known as the Thomas-Voinovich Amendment (after its two Republican
Iu launch the list sponsors), prohibited for one year any work won by a vendor from being
"performed by the contractor at a location outside the United States,"
unless the work is already being done overseas by government gmploy
11K the CAN-SPAM ees. The bill reflected growing congressional opposition to outsourcing
&A.."t-SPAM proB IT work, especially overseas.
diet patchea and
lllqaired that the In summary, the period from 1986 to the present has brought IT policy
• of sexually ori from the sidelines to the forefront of congressional attention. Policies
lid Congreaa that have been formed and implemented in a wide variety of arenas tha.t
affect the way government does business and the rights of all Americans.
~ented until
IIIil. The policy issues raised in each arena are far from resolvedi in most
cases the legislated solutions are less than effective, and much more
IaB:mds from the political and agency activity may be anticipated in the future.
IIRa::tu.al property
"'" 1008 (DMCA),
- t)~ Doctrine" SECURING E-GOVERNMENT, 1986-2005
~. and other
flllDbited removal Even before the 9/11 terrorist attack on the World Trade Center. guaran
~outlawing
teeing the security of cyberspace was emerging as a central concern for
• 1l!\.fL-\ imple those involved in public IT policy. After 9111, security emerged as the
number one priority of federal information officers, and IT budgets WQTQ
.... f"'1PO) Copy
reallocated to reflect its heightened importance.
t ~ Treaty
IiIIIcY Preyention In the 1980s, security was seen primarily in tmms of computer crime. The
_.ad otherB pro Computer Fraud and Abuse Act of 1986 impD!md fines and imprisonment
~iI.<;ameans up to 20 years for various types of unauthorized computm access and
fraud. A 1996 amendment extended coverage to all computgrs involvgd in
interstate commerce and communications. The Electronic Communica
. . 'fVting in the
IIIp America Vote tions Privacy Act of 1986 updated wiretap laws for the digital era and also
r..a punch card criminalized the unauthorized capture of telecommunications between
network points. The Computer Security Act of 1987 [CSA) mandated that
" a!'y 1. 2004,
... aw-hinea for the National Institute of Standards and Technology [NIST) develop secu
rity standards and guidelines for federal computer systems. The CSA alao
~ numerous
"* c:Dsti.ng elec
I.l.ringing imp le-
required that all federal agencies and their contractorB eBtabliBh computer
security plans.
In the 1990s, the Clinton administration began to put into placg thg archi
tecture for securing cyberspace against foreign and domestic gngmi{}fJ. In
IIIIIrwumce of the
1994, reflecting FBI support, Congress passed the Digital Telephony Act,
IIIeIic:IDs brought
+4 CHAPTER. 2 A BR.IEF HtSTOR.Y OF PUBLIC-SECTOR. INFORMATION TECHNOLOGY POLICY
!IllS that would be Also following 9/11, Executive Order 13231 (Critical Infrastructure
n his Presidential Protection in the Information Age) created the President's Critical
rl Infrastructures), Infrastructure Protection Board. The board was intended to be the cen
Ossian on Critical tral executive branch policy body for cyberspace security. It was com
the goal of estab posed of senior officials from more than 20 departments and agencies .
. A national center
in the National BeUer known by the general public, the USA Patriot Act of 2001 became
III to establish per- law on October 26 of that year. It gave government investigators greater
authority to track e-mail and to eavesdrop on telecommunications. In
September 2002, the court of review interpreted the USA Patriot Act to
moo (GISRA; part mean that surveillance orders under the Foreign Intelligence Surveillance
the P~\ by enact Act could apply to criminal as well as terrorist cases, meaning that U.S.
letimes called the citizens could suffer electronic eavesdropping on a less protected basis
Dt of agency-wide
than hitherto .
• nnifrwg, annual
mces. agency re A spate of new cybersecurity legislation followed on the hgelg of the
D{.\ Gon;red pro Patriot Act. The Cyber Security Research and Development Act of 2002
.... but exempted authorized funding for new computer and network security research
B OYer sight. and grant programs and shielded ISPs from customer lawsuits when
they reveal customer information to law enforcement authorities. The
IhilT to the secu
Federal Information Security Management Act of 2002 strengthened the
III Security Act of information security program, evaluation, and reporting requirements of
ClO) for the new
federal agencies. In 2003, President Bush dissolved the Critical Infrn
ID to oversee the
structure Protection Board, placing its functions in the new Homeland
Dr}-. Other provi.
Security Council, which was charged with coordinating cybersecurity
IIcture Protection
policy. Early strategy emphasized public- and private-sector best prac
tices and downplayed enforcement of security policies on the private
sector.
IlIldtion Analysis
IJIU:md intograte For consumers, an amendment to the Fair Credit Reporting l\ct 5trength~
ity of data, and ened laws to prevent identity theft, improve resolution of conaumer
disputes, improve the accuracy of consumer records. and make improve
aal Infrastructure ments in the use of, and consumer access to, credit information. Called
IR1"!Stigations and the Fair and Accurate Credit Transactions Act of 2003, the law requimd
ptem of the De credit reporting firms to give consumers free copies of thgir credit
~ Office of thg reports and the opportunity to correct them. Also, the law mquired that
Ilion of ~1ST, thg credit card receipts be shortened so as not to disclose consumgr namgs
... of the Depart and full credit card numbers. A National Fraud Alert System was also
!IpOnSe Center of set up to alert businesses of accounts suspected of being involved with
identity theft.
ry of homeland In 2004, the OMB formed the Information Systems Council (ISC) to co
M information ordinate the sharing of terrorist information. This was seen as an im
plementation of an August 2004 executive order by President Bush
r FOL\ requests (Strengthening the Sharing of Terrorism Information to Protect Ameri~
IIIcml parties to cans) and partially implementing recommendations of the 9/11 com
mission. The ISC included representation from the departments of
46 CHAPTER 2 A BRIEF HISTORY OF PUBLIC-SECTOR INFORMATION TECHNOLOGY POLICY
ostice, State, and required agencies to prepare multiyear strategic plans that described
orism Center. The agency mission goals and approaches for reaching them. The act also
tion systems were required agencies to prepare annual program performance reports to
rrorism. review progress toward annual performance goals, which, of course,
included IT goals. Executive Order 12862 (Setting Customer Service
9/11 commission, Standards, 1993) mandated that all agencies, including IT agencies,
Deluded the long identify their customers, customer needs, and set standards and bench
federal informa
IJI' marks for customer service, laying the basis for a policy of customer ori
Joseph Lieberman, entation as a keystone of e-government later in the decade. Finally, the
cb. a network in Government Information Locator System (GILS) was announced
mity information, February 22, 1993, as an Internet index to all federal materials. It re
t redundancy and flected a decision of the Clinton administration to support direct agency
inlhrmation. Their release of electronic information, reversing a Reagan-era policy that hGld
~ authority and release should be contracted through private third parties.
the IT expenditures to be outsourced. CIOs sometimes felt the core was encroached upon
h. such measures like and that it was difficult to establish effective performance standards
'client satisfaction with vendors.
quisition process by
President Clinton endorsed the concept of a federal government-wide
~ procurement
lDIl"aged adoption of Internet portal. Firstgov,gov, in his Presidential Memo of December 17,
1999 (Electronic Government). The President announced 12 steps agen
cies could take, including getting forms online by December 2000, PO:lt
!l:istence of the CIO ing online privacy policies, posting e-mail contact information, and
_mmt facilitating identifying e-gov "best practices." In the same year, the Pr8sidtmt's
~dent Clinton in
Management Council adopted digital government as one of its top three
It the Clinger-Cohen
priorities. On June 24, President Clinton made the first Internet address
I Z8 federal agencies
to the nation by a president of the United States, On September 22, ZOOO,
·was intended to be the FirstGov.gov portal was launched. In the 2000 election. both candi
=1 IT practic8s. EO dates (Gore and Bush) advocated expansion of digital government.
~ for f:'-gon:!rnment. Though not limited to IT, the little-known Data Quality Act of 2000
~ from thf:l OMB (DQA, aka Information Quality Act) was Significant as an example of
IliJ:i.atin:l!; under the federal policy aimed at information controL Thb onf:l-paragraph provi
sion was added without debate or hearings as Section 515a of the Trea
I the Goyernmf:lnt sury and General Government Appropriations Act of 2000. It charged
iI!Il authorized thf:l
OMB with the task of developing government-wide guidelines to ell9UI'O
Ih"o agencies (Sec.
and maximize the quality of information disseminated by ag9ncieg. Each
Idiom; 1703-1707);
agency must develop an administrative mechanism whereby affected
~nt forms (Sec.
parties can request that agencies correct poor-quality information (that
lID be in place by is, an appeals process was mandated). The practical effect of tl19 DQA
was to give primarily industry complainants the basis for holding up 9n
IIDl'k for accepting
legally yalid and vironmental or other reports by objecting to individual statistics, rgquir
lanement of the e ing agencies to provide evidence for every statistic and statement in a
report recommending some action. s
1-
.-am.n:ing of gov
world of pub
d 01 1998 (FAIR)
• ..n of thgir com
The incoming Bush administration issued its core document, The Pre~;i •
dent's Management Agenda, in August 2001 (OMB, 2003a). This docu
ment committed the Bush administration to five major management
objectives. one of which was electronic government. In June 2001. the
~@p adminis OMB created the position of Associate Director for Information Tech
nology and E-Government. This gave the OMB a "point man" to give
• int@il'>Sted party
llirular activity on higher priority to IT initiatives, particularly the goal of creating a citizen
centric government through e-government. Mark Forman waB thfl firBt to
• F~\IR "\ct did
III: ib commercial serve in this position.
t -.:mrxempt com The OMB issued the cornerstone document E-Government Strategy on
. . . or buy" ded February 17, 2002 (OMB, 2002). This document set forth the three fun
--=nting to the damental Bush administration e-government principles: citizen-centric,
• pit pressure on results oriented, market based. 6 It also called for increased cross-agency
~werenot data sharing. Some 34 specific projects were identified for funding,
50 CHArTER 2 A BRIEf HISTORY OF PUBLIC-SECTOR INFORMATION TECHNOLOGY POLICY
• Government to citizen
• USA Service (GSA)
-- ........
IT u 2
_ .... I11III
Ii ...
~
In 2002, the first Chief Technology Officer for the federal government
was appointed. This officer was to oversee the implementation of
e-government initiatives. Casey Coleman, heading up the GSA's Office
of Citizen Services, was appointed July 25. Although coordination of
implementation was shared with the GSA and CIO Council, the OMB
retained primary responsibility for IT and e-government policy at the
federal level.
Under the Bush administration, a performance engineering (systems
analysis) approach to public IT and e-government became ascendanL
Acting on a February 2002 recommendation from the Federal CIa
Council, the OMB established the Federal Enterprise Architecture Pro
gram Management Office (FEAPMO) on February 6, 2002. In 2002
FEAPMO issued The Business Reference Model Version 1.0, which
created a functional (not department-based) classification of all gov
ernment services with a view to its use by OMB for cross-agency
reviews to eliminate redundant IT investments and promote reusable
lLOGY POLICY
Building the Virtual State, 1990-2005 51
llritiativeannounced
IT components. A Performance Reference Model (Fall 2002) set gen
eral performance measurement metrics. A Data and Information Ref
erence Model was issued to set uniform guidelines for data needed to
support Enterprise Architecture. Overall, this was reminiscent of 1960s
program planning and budgeting systems (PPB): functional instead of
line item budgeting, emphasis on empirical measurement of perform
ance, strengthening top management oversight capabilities. Other 2002
developments included improvements in e-procurement and geospatial
recordkeeping. 7
Perhaps the best-known piece of 2002 IT legislation was the Electronic
Government Act of 2002 (EGA), passed November 15 and signed by the
og (Treasury) president on December 16. The act was sponsored by Senator Joe
Lieberman (0, Conn.) and was intended to promote e-government in all
federal agencies. In essence, the EGA formalized much of what had been
unerre)
done by the OMB's Associate Director for IT and E-Government:
The EGA authorized $45 million available to the OMB for e-government
projects in the fiscal year 2003, $50 million in FY 2004, and $250 mil
lion in each of FY 2005 and 2006. However, actual appropriations
deleted $40 million of the authorized $45 million, forcing the OMB to
implement e-gov strategy from mostly departmental budgets. Subse
quent appropriations were also far lower than originally planned. s
Most recently, the Bush administration has pushed ahead with its priva
tization and outsourcing agenda. This agenda is implemented directly in
oIOLOGY POLICY Summary S3
l~m for e-government the OMB's A-76 guidelines for competing federal jobs as discussed in
{ 2004. and $250 mil Chapter 10 and indirectly through the General Services Administration
actual appropriations Modernization Act of 2005 (GSAMA), which is pending and expected to
1, forcing the OMB to pass at this writing. GSAMA promotes partnering and outsourcing by
tntal budgets. Subse permitting public- and private-sector acquisition staff to work in each
:inally planned. 8 other's organizations for a period of time. The GSAMA also makes per
manent controversial share-in-savings contracting and requires agencies
rernment initiatives in to use commercially available online procurement services. All this is to
math'es. Round 2 was
be overseen by a new Federal Acquisition Service, which incorporates
vestigations, financial
the former Federal Technology Service and Federal Supply Service.
rr benefits to individ
Justice. Treasury, and
:riminal investigation SUMMARY
ding of e-government
lit of the 850 million From the War of 1812 to the war on terrorism, federal information pol
~ OEG. Mark Forman, icy has been influenced by military events. From the protection of
of e-gm'ernment was national records in 1813 to the protection ofthe nation's electronic infra
5 were forced to look structure in 2004, the underlying continuity of policy has been national
lent. This became in action to establish and safeguard information as a national resource. The
ed e-gm'ernment pri- great achievement of the 19th century was the creation of the GPO under
the Superintendent of Documents, with distribution through the Federal
Depository Library Program.
II ambitious agenda
iIS s\-stems consoli In the aftermath of World War II, Vannevar Bush laid out the vision of
!:ted agencies to list what was to one day be called the Internet, calling for the mobiliza
t planning or acqui tion of science to serve the goal of expanding human knowledge. Gov
spending and mov ernment subsidy and direction marked the advent of the computer
ncial applications. age, with the first mainframe computers being created for the military,
eel agencies to sign and later, used by large federal agencies such as the U.S. Census. The
~top. E-Training, origins of the Internet may be traced to the ARPA of the Department
IIing to institution of Defense and to NSFNet, and federal subsidy did not end until the
III initiatives from early 1990s. Even the commercialization of the Internet came about
1M o:\m IT policy, through legislation.
• to integrate secu
Several important lines of policy making mark the study of modern IT
RSi:ness cases that
policy in the United States:
in Z()()..!. the OMB
Is but break report
I,. and to identify
• Increasing public access to information, from the FOIA of 1966 to the
l .ncies to meet
launch of FirstGov.gov in 2000
....--green ratings • Increasing public participation, from the APA of 1946 to the launch
... including both of Regulation.gov in 2002
.... attain security • Protecting citizen rights, from the Privacy Act of 1974 to the OMB
requirement of privacy assessments in 2003
• Establishing a comprehensive approach to the management of public
... w:ith its priva information systems, fTom the PRA of 1980 to the Clinger-Cohen Act
I idirectlyin of 1996 and the EGA of 2002
54 CI-lAPTER 1 A BRI(;F HiSTORY OF PUBLIC-SECTOR INFORMATION TECHNOLOGY POLICY
Along the way, information policy has expanded into such issues as pro
viding accflssibility for the disabled, modernizing education, securing
intellectual property, implementing electronic voting, and stopping the
export of American IT jobs, to name a few.
Today, in the first years of the 21st century, the evolution of information
policy is at a crossroads. E-government struggles to expand in an era of
budgetary austerity. The protection of citizen rights struggles to survive
in an agfl of counterterrorist surveillance. Efforts to expand public par
ticipation face the long-term trend of increasing levels of nonvoting and
disbelief in the efficacy of government. Sociotechnical approaches to IT,
emphasizing the human factor, find diminishing leeway as systems
management becomes the dominant theoretical foundation of those
charged with implementing federal information policy. And the core IT
capabilities of federal agencies are stretched to the limit by the privati
zation and outsourcing of their former functions. .......- -..... i
-............
In the adverse setting that faces much of the public IT world, the good
news is that citizens and presidents alike believe in the efficacy of IT
solutions to the problems governments face. Whether from resignation
to technological determinism or systems theory assumptions that IT
-,,-t-
.,: ,-<
~
..
methods equate to efficiency or, for that matter, from actively embracing wc
the belief that IT will reinforce their power, political leaders are more a . c..
prone than ever to give priority to legislation and executive branch
actions that advance public IT policies.
DISCUSSION QUESTIONS
.... ......
cIiIIII!Id ....
.... t!'t ' 7
I. What were some of the hurdles the federal government had to clear with respect
to saving and sharing information with the public between 1813 and I945? How - - tIIlKII
.-diDIr
have these hurdles changed since entering the electronic age? 1ianpn.
2. How has the national defense sector influenced the development of electronic
communications?
c , s
3. The Internet has not always been open for commercial use.What events occurred i-i-i:M
dII.izrda
to change the Internet from a strictly educational, scientific, and research-oriented
tool to what it is today? ~
4. The move to privatization and commercialization of the Internet provided new '.."-'
challenges for the government with respect to social issues.What is the digital divide,
and what actions have been taken by the federal government to bridge it?
.~
lOGY POLICY
Glossary 55
Computer Fraud and Abuse Act of 1986: This act imposed fines and
D as occurred imprisonment on those found guilty of such computer crimes as unau
thorized computer access and fraud. The 1995 amendment extended the
legislation to cover all computers involved in interstate commerce and
communication.
n-ernment initiatives Privacy Act of 1974: This act regulated the collection, maintenance,
!'rior OMB directives use, and dissemination of federal information in order to protect the pri
JPOsed rules on the vacy of any individuals identified there within. Any disclosure of pri
vate information required prior written consent from the individual.
The act was amended by the Computer Matching and Privacy Protection
September 22, 2000, Act of 1988 to extend the protections of act to most computer match
1gement initiative to ing of individual records across agencies.
enices. At its incep
to -17 million federal Regulations.gov: This Internet portal provided an electronic space for
:t of Columbia Web citizens to review and then provide feedback on proposed rules and reg
!ministration. ulations from the Federal Register. It was launched in late 2002 as a
product of the Bush administration's e-government initiative to provide
5 ad established the active electronic opportunities for pllblic participation in rule making.
Ilion. ;\gencies were
mpon an individual's
b I.:lW r;mforcement, ENDNOTES
mpted was informa lPresident Bush signed the Internet Access Taxation Moratorium on November
s.. tntde secrets, indi 28, 2001, extending the 1998 ITFA to November 1, 2003. The moratorium on
Internet taxation was seen by the Bush administration as an economic stimulu5
formation that could as well as a promotion of Internet industries, but statg goVgrnIIlflntg fBgrBd gig~
. information on oil nificant revenue losses. The Bush administration supported ft permftnent exten
led the rising influ sion of the moratorium, which passed the Housg, but thB SBngtg votgd only for
~tiye agencies to an additional four years in April 2004. At this writing, the two ver,5ionB hftd not
",anient for the user, been reconciled.
2The URL is http www.regulations.gov.
3The Fedoral Financial Management Improvement Act of 1995 (FFMIA) re
rOO in the aftermath quired agency financial management systems to Gomply with fedeml finiinGiiil
management system requirements, applicablg fgdgral accounting fltgndardf!, gnd
r information officer
the u.s. Goyernment Standard General Ledger. To the extent that federal ac
responsible for the counting standards specify IT aspects. the FFMIA requires uniformity of IT
Itory of the United accounting across the federal government.
liming. and accessi· 4The IRS Restructuring and Reform Act of 1998. Section 2001c promoted elec
.rnt to deny FOIA tronic filing of tax returns. Section 2003d required the IRS to establish that all
forms. instructions, publications, and other guidance be available via the Inter
!lldederal parties to
net. Section 2003e provided for tax return preparer5 to be authorizmd eltJGtron
'Lomeland security. ically to communicate with the IRS. Section 2005 providgd taxpaygrg glgctronic
access to their accounts by 2006. In 1998 also. the Pmtftl Service Iftunched
lIIdel' the Office of
e-commerce, selling stamps via the Web. The Check Clearing for thB ngt Om
sbaring of terrorist tury Act of 2003 allowed the substitutability of electronic imageB of ehoekB for
I!Id in part in accord physical transfer of printed checks among bankg. It did not mandata a\actronic
IlL Representatives check clearance but made it legally equivalent.
Iber 2004 detailing sJim J. Tozzi, former Reagan administration head of the Offir:g of Information and
Regulatory Affairs. later turned lawyer-lobbyist for chemicaL rubber, peotiGide15,
agriculture. and other industries, challenged the EPA's regulation of thg chmni
.mandated the first cal atrazine on the ground that since there were opposing findings in the litera
liiIIlilgement within ture, the information used by the EPA could not be said to be reliable since the
same findings could not always be reproduced. The WaaiJiIlgtOIl POal quoted
lirector of the OMB Natural Resources Defense Council scientist Jennifer Sass as saying the act has
I and to oversee its "hamstrung EPA's ability to express anything that it couldn't back up with a
!DiJ'e strategic plan mountain of data. It basically blocked EPA scientists from expressing an experl
m Ion;!l. opinion." Atrazine was eventually given the go-ahead as a hormonil blMkilr
se C:HAPTEP- 2 A BP-IEF HISTOP-Y OF PUBLIC-SECTOR INFORMATION TECHNOLOGY POLICY
sprayed on corn, in spite of considerable but not universal evidence that it might
cause cancer (Weiss, 2004, p, 7),
6President Bush issued a Presidential Memo on the Importance of E-Government
in July 2002, stating, "My administration's vision for government reform is
guided by three principles, Government should be citizen-centered, results ori
ented, and market based,"
7Thll Cllnmal Smviclls Administration and the Office of Federal Procurement
Policy, with involvement from DOD, NASA, and NIH, advanced e-procurllmllnt
by establishing the Past Performance Information Retrieval System in 2002 to
give online access to past vendor performance records. Also in 2002, the OMB
issued a revision of Circular A-76 in October, replacing lowest-cost acquisition
with best-value acquisition, a goal long sought by ClOs. The circular also
encouraged outsourcing, in line with the Bush administration's goal to out
source 15% of "noninherently governmental jobs."
Thll OMB issulld a revision of OMB Circular A-16 in August 2002 setting
guidelines for standardizing GIS data collection records. This laid the basis for
its Cllospatial One Stop portal, one of 240MB e-government Quicksilver ini
tiatives. Circular A-16 was originally issued in 1953 to give OMB authority over
surveying and mapping.
5The GSA was also authorized $8 million for digital signatures and $15 million
for maintenance and improvement of FirstGov.gov and other portals.
FirstGov.Gov will be improved by adding a subject directory so pages can be
accessed by topic rather than by agency.