What It IsCongress passed the Clinger-Cohen Act in 1996 to instill private-sector IT management best practices in federal agencies. One of the most important provisions of the law requires the largest agencies to create a CIO position. The CIO was envisioned to be a top-level executive who would provide strategic insight into how IT could help mold the business processes used to deliver public services. The law also did away with much of the bureaucratic red tape that agencies were required to follow to purchase IT equipment and services, which prolonged many procurements by years. The Clinger-Cohen Act’s primary provisions are:¿ Create a CIO position that reports to the head of the agency.¿ Develop an IT capital planning and investment process.¿ Set performance goals and standards for IT systems. ¿ Create an enterprise architecture.¿ Evaluate the skills of the agency’s IT staff and identify skill gaps. ¿ Evaluate the IT skills of the agency’s executives.¿ Develop hiring and training plans for the agency’s workforce to improve IT management.Why It Failed¿ Most federal CIOs do not report to the head of an agency and few have full authority over the agency’s IT budget.¿ Capital planning and investment reviews fail because reports are seen as paperwork exercises, and the Office of Management and Budget does not measure results or work with agencies to fix specific weaknesses in the most high-risk IT projects.¿ Few agencies measure whether performance goals and standards have been met and are given little guidance on how to do so.¿ Most agency architectures are too technical and detailed (down to the desktop) and do not serve as a blueprint of an agency’s business processes, including where systems need to be interoperable and the best way to apply technology. ¿ Lack of project management skills is still cited as one of the primary causes of project failures.¿ Agency leaders still lack knowledge of IT’s role. Related content opinion Website spoofing: risks, threats, and mitigation strategies for CIOs In this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them. By Yash Mehta Dec 01, 2023 5 mins CIO Cyberattacks Security brandpost Sponsored by Catchpoint Systems Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe