Manager's Bill of Rights

tclark@govexec.com
amaxwell@govexec.com

Federal managers attempting to deal with employee performance problems are increasingly at risk of running afoul of complex laws, regulations, and judicial rulings, two veteran employee relations experts said at a seminar this week.

But there's hope for managers, said William N. Rudman, a retired federal investigator and manager, and Page Newton, a Justice Department legal adviser. They counseled against simply giving up in the face of intractable performance issues that are present in virtually every part of the government work force. Rudman and Newton told the 80 managers in their audience that they have the duty not to let performance problems fester, lest these problems demoralize their entire offices and cut into mission effectiveness.

The employment system in the government is stacked in favor of employees with grievances, the experts said, and the incidence of grievances filed is much higher in government than it is in the private sector. Employees' rights are well-defined and are protected by various laws on discrimination, whistleblowing and the like. Employees subjected to discipline are quick to cite these laws and the thicket of rules that has grown up around them. Managers who do not negotiate the thicket carefully can find themselves the victims of adverse action.

Less clearly defined are the rights of managers. And these rights, as they have emerged in rules and adjudication, were among the key subjects covered at a two-day session cosponsored by Government Executive at the Brookings Institution in downtown Washington.

Rudman, a 26-year veteran of federal service who now is a practicing attorney specializing in federal employment law, was the principal instructor for the course. During his government career at the Customs Service, the Defense Department and elsewhere, Rudman had extensive experience with discipline and performance issues, both as a subject and an instigator of investigations. Rudman's expertise has been tapped by Government Executive, which has published several articles he has written during the last four years. The latest was on the subject of the perils of pre-selection of new employees.

Newton is senior legal adviser for the Office of Legal Counsel in the Executive Office of the U.S. Attorneys. He provides advice on employee issues to the Justice Department's U.S. attorneys.

During the course, Rudman and Newton presented a "bill of rights" for federal managers:

  1. You are largely immune for your actions as a federal manager.
  2. You have the right to ask for and receive explanations.
  3. You have the right to review files including computer files.
  4. You have the right to meet with an employee without being tape recorded.
  5. You have the right to meet with an employee without his/her attorney present.
  6. You have a right to search the workplace based on a reasonable suspicion that the search will turn up evidence of work-related misconduct.
  7. You have the right to order someone to do or not to do anything that is not illegal nor would subject the employee to loss of life or limb. These orders may be oral, written or by e-mail.
  8. You have the right to stop threatening, disruptive or disrespectful speech or conduct.
  9. You have the right to discipline an employee.
  10. You have the right to cancel leave.
  11. You have the right to control travel.
  12. You have the right to reassign an employee to a different location or position at the same grade and pay, even if it requires relocation.
Rudman and Newton will present the course again October 7-8 at Brookings. For a course outline, click here. For more information call (202) 797-6299.
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.