Telework triumph doesn’t mean agencies can rest on their laurels


Although the latest comprehensive report on telework policies in the federal government shows great progress on meeting the imperatives of a 2010 law, it also demonstrates obstacles agencies face in implementing the practice, one analyst said.

The Office of Personnel Management report released Friday demonstrated marked improvements in the use of telework governmentwide, as required by the 2010 Telework Enhancement Act. The law was enacted to encourage working away from the office as a means to save agencies money on real estate, energy and commuter subsidies, and attract employees with more flexible offerings. Telework has proved critical to continuity of operations during emergencies.

Roughly 10 percent of eligible employees teleworked routinely in 2009 compared to 21 percent in 2011, the report found. The 2011 figure still represents less than one-third of employees who are eligible.

"OPM came out and said, ‘Look, this is the beginning, don’t read too much into what we’re finding with this data. It’s going to take some time,' " said Josh Sawislak, a senior fellow at the public-private advocacy group Telework Exchange. But he noted some of the report’s findings demonstrated a sea change in how federal employees view telework. “It used to be an employee benefit, but it’s really now being seen as more of a management tool,” he said.

Management pushback, data collection and myths about security problems are major impediments to growing the practice, he added.

About 26 percent of eligible employees said they did not telework because they have not received management approval to do so, the report said. There are several pervasive perceptions about telework among many managers that agencies must combat to continue meeting the law’s requirements, according to Sawislak.

“I think that’s a very telltale sign, in the data, that we’ve got some very serious issues about management,” he said. “We need to do a better job of training managers, a lot of whom think they manage by attendance.”

Sawislak said better data will be required in future reports, noting some inconsistencies in what agencies were measuring and how they defined various parts of the statute. For example, agencies had different ways of notifying employees of their eligibility to telework. Agencies also had contrasting views of which jobs were considered off-limits for telework due to security concerns.

“If everybody’s not measuring the same thing the same way, it’s hard to compare that unstructured data,” he said.

The report also summarizes why some employees are eligible for telework and others are not. One reason is attributable to “direct handling of secure material.” Sawislak noted in many cases, this issue is becoming more irrelevant due to the shift toward cloud computing.

“When you’re in the cloud, everybody’s a remote worker,” he said. “If you are sitting at home, [information] goes from where you are to some cloud server somewhere, whether it’s operated by a private company or the government -- it comes back through the Internet. [Security concerns] should be no different as long as you have policies and procedures and you follow them.”

Classified information can be a more serious concern, Sawislak said, but the Defense Department and the Office of the Director of National Intelligence have been looking at that issue with respect to telework compliance and have made significant progress, he said.

The Telework Exchange, along with industry and government leaders and academics, is developing metrics to measure return on investment of the telework law. Tracking “hard” returns on investment -- cost savings from reduced transit subsidies or lower energy consumption -- due to telework is markedly easier than following “soft” returns on investments, such as recruitment and retention.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.