Officials tout benefits of IT accessibility rules

Officials are marking the two-year anniversary of rules requiring the federal government to adopt technologies that are accessible to the disabled by noting progress toward that goal. But they also warn that without proper monitoring and ongoing improvements, full accessibility to government technology services may lag for years to come.

The National Council on Disability (NCD), an independent agency tasked with making recommendations on disability polices to White House, noted in an excerpt of a forthcoming report to Congress that federal agencies generally are increasing their awareness and adoption of information technology products and services that are accessible to disabled Americans. Those efforts are required by rules promulgated under statutory language known as Section 508.

"I think we're still making gains," said Terry Weaver, director of the Center for Information Technology Accommodations at the General Services Administration (GSA). "We are not still in the position we were two years ago when people said '5-0-what?'"

The mandate, named after its place in the Rehabilitation Act, took effect in June 2001 and requires all federal agencies to make their electronic communications and technology systems accessible to all people with disabilities.

The Justice Department is tasked with monitoring implementation of the rule, and in its capacity as a federal supplier, GSA has been assisting agencies in purchasing products that comply with Section 508 standards. Among other things, the rules require that government Web sites include coding that enables blind people to access the services offered on the sites.

"The first year, right around the date it started, you had Webmasters pulling their hair out," Weaver said. Over the last two years, "we built a baseline of knowledge up ... but there's a lot more to go because this is not a simple mandate," she added.

GSA helps train federal employees across the country about acquiring disability-friendly tech systems and educate e-government managers on integrating accessibility into their IT strategies.

One major plus is that over the last year, high-tech firms have heeded the accessibility message. "They want to sell what we want to buy," Weaver said.

Microsoft, for example, last week unveiled new features to its software systems. And the Information Technology Industry Council (ITIC) has facilitated an industry-led effort to identify new software, hardware and other products that meet Section 508 standards. The demand from government has led to the proliferation of choices for disabled consumers as well.

"We've been able to meet more consumer needs just because we've had more input" from government customers, said Laura Ruby, program manager for regulatory and industry affairs at Microsoft's accessible-technology group.

But Martin Gould, a senior research specialist with NCD, cautioned that roadblocks to Section 508 compliance remain. Not all industry developers consider accessibility when building gadgets, he said. He added that the accessibility mandates do not apply to some small IT purchases by agencies and that Congress must make strides to comply with the rules.

Lawmakers likely will review Section 508 when the Rehabilitation Act faces reauthorization later this year.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.