Management Matters Management MattersManagement Matters
Practical advice for federal leaders on managing people, processes and projects.

Me, Me, Me

As you toil under the rules and regulations that govern federal managers, you occasionally may long for the supposed freedom enjoyed by bosses outside the civil service. You imagine you could hire anybody you want, reward your best performers easily and fire the deadwood.

You're a fair arbiter of performance. You care deeply about your office's mission. You can be trusted with the freedom to manage that others enjoy.

Take members of Congress, for example. They have great leeway over their staffs. It is, after all, the lawmakers themselves whose nameplates mark the entrances to their offices. They can make hiring and firing decisions as they see fit.

And some take full advantage of that freedom. Rep. Tim Mahoney, D-Fla., a freshman lawmaker who faces voters in his first reelection effort on Nov. 4, did just that. He fired a female staffer whose primary fault, it seems, was enjoying a romantic affair with the married congressman. Unfortunately for Mahoney's reelection prospects, a phone call in which Mahoney fired the staffer was recorded. ABC News played it to the world earlier this month. "You work at my pleasure," Mahoney tells the employee on the tape. "Whenever I don't feel like you're doing your job, then you lose your job."

As he fires her, Mahoney further elaborates on his power as the boss. He says: "Guess what? The only person that matters is, guess who? Me."

Now that the public has had the opportunity to hear the tape, the only people that matter are, guess who? The voters. His district's verdict will be heard on Election Day.

It will be a reminder to lawmakers that, in fact, their staffers do not work for them. They work for the citizens who elected their representatives to see to their business in Washington. Everyone who works in a congressional office is an employee of the federal government. Every paycheck is cut from taxpayer dollars paid into the U.S. Treasury. Members of Congress who never learn that or forget it do not remain in office, at least if the voters catch on.

Now, members of Congress are not subject to the executive branch's civil service rules. Had Mahoney been a GS-15 supervisor who wanted to get rid of a GS-12 paramour, he'd have had a tougher time. There would have been a performance improvement plan and an opportunity for the employee to file a complaint through a variety of appeals avenues. Such rules might not prevent people from developing inappropriate relationships, but they do make it harder for bosses to hurt their subordinates' professional prospects when those relationships go awry.

Mahoney, it turns out, paid a heavy financial price -- $120,000, apparently from his personal fortune -- to keep the former staffer from going public with the affair. And he may yet pay a heavy political price by getting voted out of office.

It's reminiscent of the old adage: It's not the crime; it's the cover-up.

Civil service rules help prevent such cover-ups within the bureaucracy. They not only keep managers and employees honest, they offer a paper trail to prove that managers were trying to do the right thing if they are later accused of wrongdoing.

Most managers would never dream of doing what Mahoney did. But his example is a reminder to those who want similar power. Such power would be a mirage. In the federal government, your employees don't work for you. They work for the American people. And you do, too. Your job is to make sure employees do the job they're supposed to do. The rules and regulations aim to make sure you do yours.

Brian Friel covered management and human resources at Government Executive for six years and is now a National Journal staff correspondent.

Brian Friel is founder of One Nation Analytics, an independent research, analytics and consulting firm for the federal market.

Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.