Labor IG: No More Advance Peeks at Jobs Data for Media

Minerva Studio/Shutterstock.com

The Labor Department should consider eliminating its evolving procedures for press “lockups” when it releases sensitive weekly data on unemployment claims because the steps are not well documented and the approach “creates an unfair competitive advantage for certain news organizations and their clients,” according to a new audit.

In recent years, the so-called lockups -- designed to allow reporters advance access to the embargoed data so that they can prepare a timely analysis -- have been refined by Labor, particularly after news organizations during 2012 congressional hearings complained about a ban on bringing electronic devices and software into the quarantined room at the Bureau of Labor Statistics to report the much-anticipated monthly jobs figures from BLS.

In August 2012, officials in Labor’s Employment and Training Administration accidently jumped the gun in releasing a set of state-compiled unemployment claim numbers a day early, prompting a probe from Labor’s inspector general. The FBI, according to news reports, is investigating whether some financial news services have obtained such data illegally to sell to clients for use in making investment decisions.

“Although ETA corrected control deficiencies identified after it released the claims report prematurely, we found the policies and procedures ETA followed to protect the claims report during the embargo were either not documented in writing or, when written, were not designed to minimize the risk of unauthorized use or disclosure,” the audit found.

Furthermore, it added, “even if news organizations adhere to the terms and conditions of the lock-up, their early access to the data positions them to potentially communicate this information to their clients, allowing them to trade on this data faster than the department can post the information to its website and faster than the general public can access it once the embargo is lifted.”

The IG noted that the Conference Board, a business group, recently ended such pre-release of data to the news media. It made six recommendations, among them that Labor “discontinue” use of the lockups. It also recommended that the assistant Labor secretary for employment and training consult with the Office of Management and Budget and other agencies to use press lockups to formalize a strategy for an “equitable release” of jobless claims data. It called on Labor to strengthen tools for the encryption of data and preservation of confidentiality.

Labor officials agreed with the recommendations. 

(Image via Minerva Studio/Shutterstock.com)

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.