Pentagon would pursue performance pay under House-passed authorization

The Defense Department should link pay to performance in its new personnel appraisal system, according to House lawmakers.

Legislation authorizing Defense funding for fiscal 2012, passed by the House on Thursday, would encourage the department to use employee performance rather than job tenure to determine incentive pay under its new performance management system.

Congress repealed the National Security Personnel System in the fiscal 2010 Defense authorization law, giving the department until Jan. 1, 2012, to roll back the controversial pay-for-performance system completely. Lawmakers also authorized the department to make changes to its performance management, workforce incentives and hiring flexibilities.

"Such incentives could include both monetary (such as quality step increases or cash awards for performance) and noncash awards," this year's Armed Services Committee authorization report states. "In addition, the department should develop measurable personnel performance metrics and consider whether professional certification programs are appropriate."

The fiscal 2012 authorization also would extend a requirement that the Pentagon submit progress reports to Congress and acknowledges that further legislative change may be necessary for Defense to implement a fair and transparent performance appraisal system.

Labor unions representing Defense civilian employees have been in negotiations with agency officials to design a replacement for NSPS. According to Matt Biggs, legislative and political director for the International Federation of Technical and Professional Engineers, the process could be complete in September, but limited funding to provide performance incentives could delay implementation for several years.

"With the current budget situation, there's no money for anything," he said. "Labor and management will probably come up with a really good system that won't be funded."

The process also has created conflict with the American Federation of Government Employees, which pulled out of talks in March after one union representative was removed from the negotiating team.

According to AFGE, Defense denied Julie Sheehan, an Air Force employee, permission to participate on the design team responsible for the NSPS overhaul in retaliation for her organizing and collective bargaining efforts. She has since been subject to accusations of poor job performance and placed on a performance improvement plan. Labor officials called the actions "union busting."

AFGE's buy-in is critical to the project's success, Biggs said, adding that the final performance management system could be an example for the Office of Personnel Management to roll out governmentwide.

The fiscal 2012 authorization bill also would prohibit Defense from awarding raises to poor performers. According to the committee report, this would affect just 1 percent of the department's 700,000 civilian workers. An incentive is necessary to encourage employees to improve their performance, the committee wrote.

"They're getting out in front of themselves," said Biggs. "If management does their jobs properly, they can already deny poor performers a raise. It pretty much takes the power out of management's hands."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.