White House

We The People expands its reach

We The People screengrab

The White House is making it easier to transfer electronic signatures from other websites to its We The People petition page in an effort to spur greater participation.

A common request for the petition page, according to a Nov. 4 blog post by Ezra Mechaber, associate director of online engagement for the White House's Office of Digital Strategy, has been a "strong desire from our users to be able to submit signatures and petitions from other sites and still get an official response."

The We The People site, introduced two years ago, allows the public to petition White House policy experts on specific issues. Mechaber said since the site began, more than 10 million users have signed nearly 300,000 petitions there.

Mechaber said the White House is developing an application programming interface (API) that will allow signature acceptance from other sites. The number of signatures per petition is critical. Once a petition is posted on the site, petitioners have 30 days to get 100,000 signatures to get a response from the White House. Responses don't necessarily entail policy shifts – a presidential endorsement of Texas secession was not forthcoming, for example, despite more than 125,000 signatures endorsing the proposal -- but filings can bring issues to the White House's attention.

The Write API, said Mechaber, will allow individuals and organizations to collect signatures from their own platforms and submit them to We The People without requiring users to visit the official site.

All of those signatures, he said, would contribute toward the signature threshold needed for an official White House response.

The White House convened a conference call on Nov. 4 to explain how the API will work and to give potential developers a look at the beta platform.

Building out the Write API, said Mechaber, will make the site more accessible and builds on the Read API released this spring. The Read API opened up the site's data for analysis, allowing anyone to access the public data it made available and package it in customized platforms.

About the Author

Mark Rockwell is a staff writer at FCW.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.


The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group