Lawmakers press Bush to rescind order curbing collective bargaining

Democratic lawmakers are calling on President Bush and the Justice Department to explain an executive order that stripped collective bargaining rights from 1,500 Bureau of Alcohol, Tobacco, Firearms and Explosives employees, and to repeal the order if they cannot.

"We reject the view that union membership undermines a worker's ability to effectively perform his or her job functions, particularly in regard to national security issues," wrote Sens. Daniel Akaka, D-Hawaii; Patrick Leahy, D-Vt.; Barbara Mikulski, D-Md.; Edward Kennedy, D-Mass.; and Joseph Lieberman, I-Conn., in a Dec. 4 letter to President Bush. "Unionized employees serve with great distinction in a range of national and homeland security positions."

The senators asked Bush to contact them by Dec. 9 to schedule a briefing on how the ATF employees' jobs affect national security. Jesse Broder Van Dyke, a spokesman for Akaka, on Tuesday said the committee was waiting for a response from the White House.

Many of the letter's signatories serve on committees that oversee federal workers or have constituents who are public servants: Lieberman chairs the Homeland Security and Governmental Affairs Committee, and Akaka leads that panel's federal workforce subcommittee. Mikulski represents Maryland, which has a large population of federal employees.

Bush issued the Nov. 26 executive order under authorities in the 1978 Civil Service Reform Act, which allows the president to limit union rights for employees doing national security or intelligence work. President Carter issued the first such executive order in 1979, and Bush's directive reaffirmed that most of the 8,600 federal employees covered by Carter's order were not allowed to organize.

But Bush's decision to add the ATF employees to the list of excluded workers was a shift. Those employees had signed a new collective bargaining agreement as recently as April.

House Majority Leader Steny Hoyer, D-Md., who also maintains a strong interest in federal employee issues, sent a letter to Attorney General Michael Mukasey on Dec. 5, asking him to explain the national security rationale for the order as well.

"It is my understanding that during the … negotiations [that led to the April contract], management did not raise a single issue regarding a need to exclude employees from the bargaining unit or any proposed provision of the contract that was a national security concern," Hoyer wrote.

The majority leader did not give Mukasey a specific deadline, but requested a "prompt response."

The National Treasury Employees Union, which represents the ATF employees who lost their collective bargaining rights, most of whom work on licensing and compliance issues, praised both letters. NTEU President Colleen Kelley said she has contacted President-elect Barack Obama's transition team about the order. A spokesman for the team last week declined to comment on the order while the transition was under way.

"It is clear to us," Kelley said, "that the provisions of federal labor law can be applied to ATF in a manner consistent with national security requirements and considerations -- just as they have been for years."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.