Editorial: Looking beyond e-mail

Related Links

FCW Insider

The House earlier this month passed a bill that would require the preservation of federal agency electronic messages, including those at the White House.

The bill’s primary purpose is to curtail the flurry of missing White House e-mails. The New York Times said, breathlessly, on its editorial page July 13: “After watching wholesale lots of the Bush administration’s most important e-mails go mysteriously missing, Congress is trying to legislate against any further damage to history. The secrecy-obsessed White House is, of course, threatening a veto — one more effort to deny Americans their rightful access to the truth about how their leaders govern or misgovern.”

Unfortunately, the White House is not alone in the cavalier way it treats e-mail — and all electronic documents. One of the worst kept secrets in government is that electronic documents have been ignored. Many agencies still do not save e-mail records. Out of necessity, most agencies rely on users to determine whether an e-mail or electronic document meets the definition of a government record that needs to be saved, and then many agencies merely print those documents and put the hard copies into their existing record-keeping systems.

This process has been portrayed to be more complex than it needs to be. Most agencies are intimidated by the problem because of the sheer number of electronic documents they create every day. There are solutions available, and we understand the Air Force is being innovative in this arena, using commercial products to automate the entire process. For most agencies, though, it simply isn’t a priority.

In part, that is because there is no good link between all this data and agency missions. That change could and it can make archiving and storage an essential part of how an agency gets its job done.

There is also the difficult task of finding an adequate way of storing those electronic documents in a format that can be maintained for generations. That vexing task has been dogging the National Archives and Records Administration for years.

It is sometimes said that soldiers will fight the last war rather then looking at coming battles. That can be true for the electronic record archiving debate, too. While issues about e-documents linger, there are fresh challenges ahead.

As agencies come to use more Web 2.0 tools in their daily operations, it seems an increasingly futile quest to determine at what point an electronic document becomes a record that needs to be preserved. We hope and believe that the inherent transparency of these tools will also provide historians with the discussions around issues because those discussions will take place in the open.

This is not a quixotic battle. If done right, it should help agencies tap into the wealth of information they already have to accomplish their missions more effectively.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.


  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group