Agencies’ performance reports fall short of expectations

The most recent round of performance reports by federal agencies still don't provide an adequate picture of how the government is performing, according to Sen. Fred Thompson, R-Tenn, ranking member of the Senate Governmental Affairs Committee. Earlier this year, Thompson asked that the General Accounting Office assess agencies' fiscal 2000 performance reports and determine how well the agencies are achieving key goals. The GAO has recently begun releasing its assessments. "Obviously, the [1993 Government Performance and] Results Act hasn't come close to reaching its potential as a tool to improve government performance," Thompson said at a June hearing about the reports. Under the act, federal agencies are required to craft five-year strategic plans, along with annual performance reports and performance plans. Last year, Thompson gave a resounding thumbs down to fiscal 1999 performance reports because most agencies didn't explain how well they were accomplishing their missions. His assessment of the fiscal 2000 performance reports was just as critical. "I think both rounds of performance reports suffer from major shortcomings that prevent them from being nearly as informative and useful as they need to be," Thompson said. Based on the GAO's reviews, Thompson found that fiscal 2000 performance reports suffered from four problems: inability to assess an agency's performance, the inability to compare programs across government, poor or inadequate data on performance, and an unwillingness among agencies to set goals to resolve long-standing problems, such as information technology weaknesses. "All this sounds like basic common sense, and it is," Thompson said, but "moving the federal government in this direction has been a real struggle." According to Thompson, while agencies put in a great deal of time preparing strategic plans, performance plans and performance reports, the documents have yet to yield information that Congress can use to help guide them during the appropriations process. "We might as well go on with business as usual in Washington, where expectations of the federal government are so low that we simply accept high levels of waste, fraud and inefficiency as normal costs of operations," Thompson said. Still, Thompson said he was hopeful the Bush administration would set higher standards for agencies. "Using the Results Act to actually make decisions is a top priority for the [Bush] administration. We can't afford to let this opportunity pass us by," Thompson said.
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.