Tit-for-tat on House oversight panel appears to be the norm

It's only the beginning of the year, but there already appears to be no love lost between House Oversight and Government Reform Committee Chairman Darrell Issa, R-Calif., and ranking member Elijah Cummings, D-Md.

Cummings and Issa are interacting mainly through a series of public letters, and the latest exchange occurred on Monday when Issa gave Cummings a date of February 11 when he will publicly release responses from businesses in which they are identifying federal actions and regulations that inhibit job creation. Cummings had asked Issa to make the responses public.

Cummings penned his grievances to Issa on Monday, complaining in a letter that the Democrats repeatedly have been denied access to committee records. Cummings asked committee Republicans to publicly commit to a bipartisan subpoena policy. Although the chairman has the unilateral right to issue subpoenas without consulting the minority, Cummings said that past chairmen have refrained from doing that. The panel is set to adopt formal rules Tuesday.

To pour a little more salt in the wound, Issa also announced on Monday that he and former committee Chairman Edolphus Towns, D-N.Y., will sit together at tonight's State of the Union address to illustrate "the spirit of bipartisanship." Issa and Towns became friends when Towns chaired the committee last year and Issa was ranking member.

What about Cummings? "On Cummings, we have no comment," a committee aide said.

Cummings has criticized Issa's request to businesses for feedback as "tantamount to inviting businesses to tell us they want us to do something [on regulations] as opposed to protecting the American people."

Cummings and Issa were expected to meet on Monday to discuss an Oversight Committee agenda, despite their sniping.

Issa sent his request for regulatory feedback to Big Business groups such as the U.S. Chamber of Commerce and the Financial Services Roundtable, major corporations, and smaller trade groups. Issa's push on regulations comes as the White House touts its effort to reduce regulatory burdens and to improve relations with Big Business.

"I expect to be able to make an initial analysis, as well as all responses received as of today, public no later than February 11, 2011," wrote Issa, who noted that he already shared responses to the letters with Democratic committee staff. Issa said that his staff in the meantime will "focus on receiving, organizing, and analyzing the response to these letters."

Citizens for Responsibility and Ethics in Washington, a nonprofit watchdog group, has repeatedly called for Issa for make the responses to his requests public. CREW Executive Director Melanie Sloan called the February 11 release of the letters "inadequate," arguing that Issa was attempting to control how the responses are viewed by releasing them with an analysis.

"He will try to manipulate the message," Sloan said. "Why does Issa need several more weeks to review the responses before sharing them? … Everyone should have equal amounts of time to react.… I don't know what the big secret is."

In addition to Monday's letter, Issa announced the launch of a website, AmericanJobCreators.com, which he said is intended to "listen to the personal stories of constituents, Californians, and nationwide job creators about how government impacts job creation."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.