Fedblog FedblogFedblog
Government Executive Editor in Chief Tom Shoop, along with other editors and staff correspondents, look at the federal bureaucracy from the outside in.

Agencies Are Supposed to Avoid Furloughs

ARCHIVES

With sequestration of agency budgets just days away, much of the talk lately has been about furloughs. The Pentagon has warned that more than 700,000 civilian employees could be subject to furloughs lasting up to 22 days. Homeland Security Secretary Janet Napolitano has talked of furloughs of up to 14 days. Many other agencies have issued similar warnings

All of this provides a sense of inevitability to widespread furloughs of federal employees if Congress and the administration can't work out a deal to avoid a sequester. But under the law, agencies are supposed to be doing everything they can to avoid furloughs. In a report issued late last year during negotiations over a deal to avoid going over the fiscal cliff, OMB Watch noted that the Obama administration has "significant flexibility to avoid furloughs and [reductions in force]." 

The continuing resolution that funds government through March 27 contains the following language, the report noted:

Amounts made available under section 101 for civilian personnel compensation and benefits in each department and agency may be apportioned up to the rate for operations necessary to avoid furloughs within such department or agency, consistent with the applicable appropriations Act for fiscal year 2012, except that such authority provided under this section shall not be used until after the department or agency has taken all necessary actions to reduce or defer non-personnel-related administrative expenses.

On top of that, the conference report on the 1985 law that created the sequestration procedures currently in place under the 2011 Budget Control Act made it clear that back then, at least, Congress intended for furloughs to be a last resort:

The conferees urge program managers to employ all other options available to them in order to achieve savings required under a sequestration order and resort to personnel furloughs only if other methods prove insufficient.

Agencies have had a relatively long time to figure out how to implement a sequester, and for many of them, it will doubtless be impossible to do so without furloughs. But they shouldn't be a foregone conclusion. 

Tom Shoop is vice president and editor in chief at Government Executive Media Group, where he oversees both print and online editorial operations. He started as associate editor of Government Executive magazine in 1989; launched the company’s flagship website, GovExec.com, in 1996; and was named editor in chief in 2007.

FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.