E-mail is overwhelming Congressional offices

E-mail is overwhelming Congressional offices, creating a customer service problem that Capitol Hill is not equipped to deal with, according to a new report.

The report, "E-mail Overload in Congress: Managing a Communications Crisis," found that the number of e-mail messages to Congress has more than doubled in two years, reaching 80 million to the House and Senate combined last year.

The report is the first in a series of studies on how Congress interacts with the public through the Internet, called the Congress Online Project. The project is run by the Congressional Management Foundation and the George Washington University and is funded by The Pew Charitable Trusts.

In 1998, prior to President Clinton's impeachment trial, Congressional offices received a few dozen e-mails per week. But the beginning of the impeachment process marked the beginning of the e-mail revolution on the Hill, the report said. In January 1999, during a key week in the impeachment proceedings, House offices received up to a thousand messages a day while Senate offices received up to 10,000 messages a day. This year's election recount also sparked record e-mail highs. In December 2000, the House received 7 million e-mails.

The technology that was supposed to make Congress more accessible has instead led to frustrated constituents and frustrated members. "Rather than enhancing democracy--as so many hoped--e-mail has heightened tensions and public disgruntlement with Congress," the report said.

Grassroots lobbying efforts, in which groups organize e-mail campaigns to support or oppose certain measures on the Hill, are a major contributor to the problem, the report found. Most of the e-mails that members of Congress receive do not come from their districts or states.

Members of Congress and their staffs are also frustrated because e-mail has created a public perception that they are accountable to all members of the public, no matter where they are from. "Offices have responded to these non-constituent e-mail messages as they do with non-constituent postal mail--by ignoring them," the report said.

Congressional offices should automate as much of their e-mail response system as they can, the report recommended. One way to do that is by using a Web-based form for users to fill out, or using filters and rules to sort incoming mail. Chiefs of Staff should develop e-mail policies that spell out the office rules for prioritizing messages, responding to messages within a certain time frame, and saving messages for office records. Offices should also anticipate messages on hot button issues, and provide information on their Web sites that answer frequently-asked questions about those issues.

Several different software solutions are available to manage e-mail communications as well, and Hill offices should take advantage of them, the report said. The report analyzes the benefits and drawbacks of the different software packages currently available to Capitol Hill offices.

The report identified the following Congressional offices as using best practices to deal with e-mail communications:

  • Sen. Jeff Bingaman, D-N.M.
  • Sen. Conrad Burns, R-Mont.
  • Sen. Barbara Boxer, D-Calif.
  • Sen. William Frist, R-Tenn.
  • Sen. Patrick Leahy, D-Vt.
  • Rep. Rick Boucher, D-Va., 9th District
  • Rep. Anna Eshoo, D-Calif., 14th District
  • Rep. Zoe Lofgren; D-Calif., 16th District
  • Rep. Thomas Tancredo, R-Colo., 6th District
  • Rep. Zach Wamp, R-Tenn., 3rd District
  • Rep. Heather Wilson, R-N.M., 1st District

Is your office overwhelmed by e-mail? How are e-mail communications managed at your agency or department? Send your responses to mailbag@govexec.com

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.