Data Transparency Coalition wants more open gov't data
The U.S. government should focus on standardizing the data it releases, says the new Data Transparency Coalition
IDG News Service - The U.S. government still publishes data in too many formats and requires contractors or grant recipients to send it information in multiple formats, according to a new coalition of tech vendors.
The Data Transparency Coalition, whose members include Microsoft and Teradata, launched Monday and will push for U.S. government agencies to standardize federal data published online. One of the immediate goals of the coalition is to advocate for Congress to pass the Digital Accountability and Transparency (DATA) Act, sponsored by Representative Darrell Issa, a California Republican, and Senator Mark Warner, a Virginia Democrat.
The DATA Act, first introduced by Issa last June, establishes an independent board to track all federal spending on a single website and requires agencies to report data in a standardized format. The bill mandates the use of governmentwide identifier codes and markup languages, such as XBRL, in an effort to make government data easily searchable.
Issa has championed the DATA Act as a step toward a "transparent and accountable government the American people deserve."
Right now, it's difficult to extract government data from many agencies, said Hudson Hollister, executive director of the Data Transparency Coalition. In many cases, agencies don't yet publish spending information, regulatory filings, corporate disclosures or legislative actions online, he said.
"The government's not managing its data," Hollister said. "There's nobody in charge of figuring out standard markup language to report it. There's nobody minding the store looking at the whole enterprise."
A lack of standard data formats and standard ways that government award recipients are identified causes confusion about the way government spends money, Hollister said. On USAspending.gov, the current website to track federal spending, the same award recipients come up multiple times during searches, because their names are spelled in multiple ways, he said.
"Because we don't have standard identifiers, we can't properly track federal spending," Hollister said. "We can't aggregate all the grants and contract awards a contractor receives."
The coalition members have services that use federal data, and standardization of formats would help their efforts, Hollister said. But beyond their business interests, better data transparency would allow U.S. residents to better understand their government and its budgets in this time of budget shortfalls, he said.
"The only way for citizens and the government to understand what's being spent is to track every dollar," he said.
The DATA Act, which has strong support from House of Representatives leadership, may see a vote on the House floor within a couple of weeks, Hollister said.
The coalition also supports other proposals, including the Public Online Information Act, a bill sponsored by Representative Steve Israel, a New York Democrat, and Senator Jon Tester, a Montana Democrat, that would require federal laws or regulations with public information requirements to be published online in machine-readable formats.
The group wants to "make some noise about data transparency," Hollister said.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is email@example.com.
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Mission Critical: Managing Mobile Applications & Content
- Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network
- At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success
- Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development
- Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices... All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts