Legislation would undo years of procurement reform, experts say

A provision in the Senate version of the 2002 National Defense Authorization Act that would undo years of acquisition reform appears unlikely to survive conference committee, according to officials close to the debate. Section 803 of the act (S.1438) would require any Defense Department agency that wished to use a multiple-award contract or task order for a purchase greater than $50,000 to open the competition to every contract holder.

In some cases, that would require an agency to notify only a handful of vendors. But in the case of the General Services Administration's Federal Supply Service schedules, a series of pre-negotiated contracts on which any agency is free to bid, there are often more than 500 vendors on any given schedule contract. Senior procurement officials have said such a regulation would be disastrous for the Defense Department, the largest single user of GSA schedules, and would interfere with the agency's ability to quickly procure goods and services. Dr. Leamon Lee, director of the National Institutes of Health Information Technology Acquisition and Assessment Center, said the provision marked a move from "reform to restriction." It constrains the Defense Department he said, and marks a setback for the acquisition reform that took place in the 1990s. That reform was aimed at letting government buy commercial products and services more in the manner of the private sector, thus reducing procurement cycles that often lasted more than two years. David Sutfin, chief of GovWorks, the procurement arm of the Interior Department's Minerals Management Service, said Section 803 "would undo management and acquisition reforms of the past decade if enacted into law as currently written." Sources close to the negotiations in Congress say there is no chance that Section 803 will survive conference committee in its current form. One source, who knows the author of the provision, said the author "did get carried away." The source said the author is knowledgeable about acquisition and contracting nuances, but has "grave concerns" about whether or not competition is being fully utilized on multiple-award contracts and, particularly, on the GSA schedules. The source said the provision was meant to send a message to contracting and acquisition officials who haven't done enough to ensure appropriate competition. Another source close to the conference proceedings said that the language is being re-written to include a requirement whereby any agency that didn't secure at least three bids for a contract or task order would have to give a reason why. Steve Kelman, former administrator of the Office of Procurement Policy during the Clinton administration and now a professor of public management at Harvard University's Kennedy School of Government, confirmed that suspicion about sham competition on the GSA schedules for services is rampant in Washington. "There's a general feeling around town that if you're inclined to award IT services work noncompetitively, sort of in the dead of night, the way you do it is through the GSA schedules," he said. Kelman added that Section 803, as written now, "makes no sense at all," and that it would "end the GSA service schedules." The General Accounting Office is investigating the management of competition on all governmentwide contracts and multiple-award contracts. A staffer with the Senate Governmental Affairs Committee said that report should be issued later in the year. White House officials have expressed concern that the provision "will significantly reduce efficiency offered to the [Defense] Department by the multiple-award schedules program operated by the General Services Administration." A spokesman for the Defense Department had no comment on the provision, except to say that officials had seen it and were crafting a response.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.