Management Matters Management MattersManagement Matters
Practical advice for federal leaders on managing people, processes and projects.

Continuous Unimprovement

ARCHIVES
Anyone who has visited a lot of federal buildings likely wasn't surprised at the news July 8 that investigators found haphazard security procedures at government facilities nationwide. There's long been a frustrating lack of uniformity at entrances to Uncle Sam's workplaces. Security guards sometimes ask for identification, sometimes they don't. They might let people go around unescorted, they might not. Screening equipment seems to be set at random sensitivity levels. Loose change in pants pockets might set off the alarms on a screener in one building while another makes no sound if forgotten keys remain in pockets. Federal building security guards themselves often seem unsure of the standard procedures. To a lay observer, there is no rhyme or reason to the wide discrepancies.

The Government Accountability Office's investigation into federal building security showed that, indeed, the agency in charge of facility safety has not had a strong management system to ensure standard operating procedures were in place and followed. It's a disappointing discovery because of the importance of protecting the people who work in and visit federal buildings. It's disturbing because setting up such a management system is not rocket science. Organizations with far less crucial missions do it all the time.

Just look at the countless restaurant chains with franchises sprinkled around the country. If you go into any of these stores you'll discover the same menu and the same basic operating procedures. The employees all have been taught scripts to follow, from the initial greeting to the questions they're supposed to ask in response to your order to repeating your order to make sure they got it right. Many restaurants' standard procedures get down to details such as specifying which way the artificial sweetener packets should be facing in the sugar caddies on tables and whether the ketchup or the mustard goes to the right.

Managers learn all those standards, teach their employees and then monitor employees' actions to make sure they apply those standards at every opportunity. Some chains employ secret shoppers to visit restaurants and make sure the standards are being followed. Regional managers stop by every so often to check up on them, and they review statistics from customer feedback forms and sales to identify trouble spots. Variation is the enemy, and the companies use continuous improvement methods to eliminate it and provide predictable service to customers.

All that just for lunch and dinner. Federal building security deserves that kind of continuous improvement approach even more.

Some differences are of course necessary. The methods of facility security for agencies with highly sensitive national security missions should naturally be different than the methods for agencies that have a regular flow of public visitors. But for agencies with similar security needs, standards should be relatively constant and variation limited. Managers should be using continuous improvement methods to get personnel and systems up to standard. If it can be done for a burger and fries, it can be done for public safety.

Brian Friel covered management and human resources at Government Executive for six years and is now a National Journal staff correspondent.

Brian Friel is founder of One Nation Analytics, an independent research, analytics and consulting firm for the federal market.

FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.