Workforce

After the breach: 21.5 million exposed individuals still waiting

Shutterstock image (by Pavel Ignatov): Alert icon.

The 21.5 million feds, contractors and others exposed in the Office of Personnel Management security clearance data breach have yet to receive official notification of their exposure, credit monitoring and other identity protection services, and until a contractor gets the award for those services, they’ll continue to wait.

That’s despite initial estimates that a contract would be out by Aug. 21.

It’s been nearly three months since news of the OPM breaches first hit, and as FCW reported, the pair of breaches that OPM learned of in April and had described as two separate intrusions was actually one sustained assault.

But while the 4 million feds exposed in the “first” breach have received notifications and credit monitoring, the agencies charged with awarding the contract for the much bigger notification job -- the General Services Administration and the Naval Sea Systems Command -- are missing self-imposed deadlines.

Quotations from vendors were due Aug. 14.

“GSA and NAVSEA, respectively, anticipate award of the BPA and first order in late August 2015,” GSA spokeswoman Stephanie Kenitzer said in an Aug. 24 email.

A week later, on the last day of August, Kenitzer told FCW that the Aug. 21 date, which appears in NAVSEA’s request documentation but not GSA’s, was never a firm deadline.

“That was not a date that was ever out on any of our postings,” she said, despite NAVSEA’s documents being hosted on GSA Interact. “We never had any intention of being able to make the award by that date.”

In multiple conversations, Kenitzer stressed the scope and importance of the contract.

“We want to make sure we get it right,” she said. “All the acquisition pieces have to line up properly for this to happen.”

On Aug. 31, Kenitzer could not say when the contract might be awarded.

In June, libertarian publication Reason noted that, given OPM learned of the data breach in April, the federal government was failing to meet the standards to which it holds the private sector when it comes to data breach notifications.

Two months later, the majority of affected individuals are still in the dark.

“This delay in the second contract could mean that OPM, through their various intergovernmental partnerships, is fine-tuning a necessary and expansive contract,” said National Federation of Federal Employees spokesman Drew Halunen. “It could also mean that OPM is simply dragging its feet and failing to grasp the immensity of this unprecedented data breach.”

Halunen also noted the “repeated failures” of the contract work on the first round of breach notifications, saying, “[W]e hope OPM has learned from their mistakes and will have an adequately-prepared outside vendor.”

About the Author

Zach Noble is a former FCW staff writer.

Featured

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.