White House Regulatory Office Too Quiet About Its Activities, Study Finds

Fog envelopes the White House in December. Fog envelopes the White House in December. Manuel Balce Ceneta/AP

A notable portion of meeting records, oral communications and public comments related to agency rulemaking are absent from the White House Office of Information and Regulatory Affairs website, according to a new study that faults OIRA for less-than-full transparency during the last 12 years.

Since 1981, the office has been under executive order to review the costs and benefits of all proposed agency rules that exceed a certain threshold of economic impact. Consumer, environmental and workplace safety advocates worried, however, that secrecy in the reviewing process could delay or water down rules in ways favorable to industry lobbyists, according to a capsule history from the Center for Effective Government (formerly OMB Watch).

An agreement by the Reagan administration—converted to an executive order under President Clinton—required OIRA to publish logs of its meetings with outsiders, which have been posted on the Office of Management and Budget website since 2001. The office regularly updates its Regulatory Review Dashboard graphic.

In its recent study, the center examined all rulemaking logs from the Transportation and Labor departments as well as the Environmental Protection Agency. “The staggering discrepancy among reported meetings, written comments, and substantive conversations suggests OIRA's review of rules remains unreasonably opaque despite its stated disclosure policy,” the study found.

OIRA made records available for 647 meetings between October 2001 and January 2013, it concluded, but made available only 28 written comments from outside parties, and staff reported only nine substantive phone calls from outside parties.

“This discrepancy is especially pronounced when looking at disclosed meetings and communications related to EPA rules,” the center wrote. “From 2001 to 2013, OIRA disclosed 581 meeting records, just 26 written comments from outside interests, and only nine phone conservations. While one does not expect an equal number of meetings, comments, and phone calls for every topic, discrepancies this large are suspicious.”

The center found that disclosure of meetings had improved since 2002, but called for improved compliance. “Transparency and disclosure are crucial to the regulatory process,” it wrote. “To ensure that this process serves the public and to avoid charges that its staff bend to industry pressure, OIRA needs to follow the disclosure requirements set by executive order almost two decades ago. Congress also has a role: the House and Senate should ensure the meetings and communications that influence the regulatory process are accurately documented and publicly available to all Americans.”

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.