Industry plan for new telecom sales squashed

A plan by an association of telecommunications companies to open a new sales avenue to the government appears to have been halted in its tracks. On Sept. 27, the telecommunications "shared interest group" of the Industry Advisory Council (IAC), an association of information technology firms that do business with the government, agreed to draft a letter to General Services Administration head Stephen Perry indicating the group's support for placing telecom services on GSA's schedules program. The schedules are a set of pre-negotiated contracts that any agency is free to use to buy goods and services. The move would be a boon for many telecom companies that currently do little or no business in the federal market. In a memo obtained by, sent Tuesday to IAC Executive Director Alan Balutis, telecom shared interest group chair Dennis Smith said the companies' actions could have damaged the business of other council members "While the telecom [shared interest group] members in attendance did not intend to harm the business prospects of their industry brethren, this is what could have resulted," Smith wrote. "Sending such a letter without unanimous agreement of the membership would be wrong." Telecom group members told that a draft letter had been circulated. In his memo to Balutis, Smith indicated that he had submitted the draft to the IAC board. Smith disavowed the group's support of any further action on the Sept. 27 letter, but didn't specifically reject the idea of placing telecom sales on the GSA schedule. "If copies of the draft(s) ever appear in public through someone's misguided attempt to stir the pot, it should be publicly refuted by IAC as a working paper that did not ever meet the test of our charter and policies; it did not have the support of IAC, nor a consensus among the telecom industry member firms," Smith said in his memo to Balutis. No member of the telecom group present at the Sept. 27 meeting objected to the proposal to draft a letter and send it to GSA. However, in the days following the meeting IAC members questioned whether the proposal needed full support of the membership, not just the telecom group, and the proposal's future was jeopardized. Additionally, members of the IAC board raised concerns that the letter could constitute a lobbying effort, prohibited by the organization's charter. Smith promised "to be more circumspect in the future in terms of how we address some of the tougher issues in our market and how our meetings are conducted." "We have worked hard for many years to establish trust and credibility in this market," Smith continued, "and they are worth protecting by how we conduct ourselves while addressing the tough issues." Smith and Balutis were unavailable for further comment on Tuesday.
Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.