Welcome!

News Feed Item

Treasurer McCord Files Petition to Safeguard State Employee Safety

Commonwealth Court Asked to Decide If Right to Know Law Applies Where Personal Safety and Security Is in Question

HARRISBURG, PA--(Marketwired - February 24, 2014) - Faced with the threat of a lawsuit, or releasing information that could jeopardize the safety and security of some public employees, Treasurer Rob McCord today asked Commonwealth Court to resolve a conflict concerning the application of the state Right to Know Law.

"I take seriously my obligation to protect the safety and security of our public employees. By filing this motion, I hope to ensure the protection of our public employees as provided in the Right to Know Law," McCord said.

McCord brought the matter before the court following a written threat to sue by a group calling itself Pennsylvanians for Union Reform (PFUR). PFUR said it will sue the commonwealth if Treasury does not produce an un-redacted list of personal information for all state employees. The state's Right to Know Law exempts some of that information from public release if it would put the personal safety of the employee at risk, such as law enforcement officers, or state employees with protection-from-abuse orders.

But PFUR and its president, Simon Campbell, have requested complete employee information under another law, the state Administrative Code, arguing they do not want the Right to Know Law to apply.

"The Legislature created a comprehensive system in which requests for public records are handled through the Right to Know Law. It is absurd to suggest that the Legislature did not intend the law to apply in all circumstances involving public records," McCord said. "PFUR appears to want to pick and choose when the Right to Know Law applies."

With the question of whether the Administrative Code or the Right to Know Law applies in such cases seemingly destined for a court decision either way, McCord, in his official capacity, filed a Petition for Review in the Nature of an Action for Declaratory and Injunctive Relief.

"As a public official, I'm in the position of either complying with the organization's demand and releasing information that has been deemed confidential under the Right to Know Law -- for good reason, in my opinion -- or redacting the information and subjecting the Treasury Department to litigation. We thought it best to ask the court proactively to clarify the issue before we proceed," McCord said.

On January 15, the attorney for PFUR wrote to the Treasurer, asking for a list of employees and related information. Under the Administrative Code, Treasury annually receives electronic files containing lists of all employees of each executive branch agency. Those lists have not been redacted to exclude information on employees who have active protection from abuse orders, are domestic and sexual violence victims, or are confidential undercover agents or other at-risk law enforcement officers.

PFUR's attorney specifically stated their request was not being made under the Right to Know Law, but instead under the Administrative Code, which says the employee records furnished to Treasury are "public information." Treasury's legal counsel responded a week later by informing the PFUR attorney that Treasury would consider the request under the Right to Know Law. That statute and a subsequent court decision direct public agencies such as Treasury to treat all written requests for access to records as Right to Know requests.

PFUR's attorney in turn wrote to Treasury on January 27, insisting the request be considered under the Administrative Code and giving the department until February 21 to produce the information sought. Failure to do so, he wrote, would result in him filing a mandamus action in court to enforce the provisions of the Administrative Code.

"The Right to Know Law is valuable for increasing government transparency and giving citizens access to information they deserve to have. It was never intended, however, to compromise the physical safety of law enforcement officers or victims of criminal violence, and the Legislature recognized that and included some proper exceptions when it wrote the statute," McCord said.

"No matter how Mr. Campbell and his group intend to use the information, a determination to put it into the public domain is something I believe would be outside the scope of my duties as Treasurer, and irresponsible," he added. "That's why I have asked the court to affirm that the Right to Know Law exemptions should apply."

The administrative agency employee list could contain the identity of undercover law enforcement personnel, the identity of persons who are participants in the Crime Victim Advocate's Address Confidentiality program, the birth days and months of employees, and persons who have obtained protection from abuse orders in which their residency and work address are subject to court-ordered confidentiality.

Under the Right to Know Law, public records are exempt from disclosure if they would, for example, reveal personal identification information, personal financial information, victim information, or information that may jeopardize the safety of a victim, endanger someone's physical or personal safety or security, or hinder an arrest, prosecution or conviction. The Right to Know Law compels an agency to consider applicable exclusions when determining whether information is exempt from disclosure.

For more information, visit www.patreasury.gov.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, presented an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He then expounded on the industry issues he frequently came up against as an analyst, and ...
Cloud resources, although available in abundance, are inherently volatile. For transactional computing, like ERP and most enterprise software, this is a challenge as transactional integrity and data fidelity is paramount – making it a challenge to create cloud native applications while relying on RDBMS. In his session at 21st Cloud Expo, Claus Jepsen, Chief Architect and Head of Innovation Labs at Unit4, will explore that in order to create distributed and scalable solutions ensuring high availa...
SYS-CON Events announced today that App2Cloud will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct. 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. App2Cloud is an online Platform, specializing in migrating legacy applications to any Cloud Providers (AWS, Azure, Google Cloud).
In his session at @DevOpsSummit at 20th Cloud Expo, Kelly Looney, director of DevOps consulting for Skytap, showed how an incremental approach to introducing containers into complex, distributed applications results in modernization with less risk and more reward. He also shared the story of how Skytap used Docker to get out of the business of managing infrastructure, and into the business of delivering innovation and business value. Attendees learned how up-front planning allows for a clean sep...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, shared examples from a wide range of industries – including en...
To get the most out of their data, successful companies are not focusing on queries and data lakes, they are actively integrating analytics into their operations with a data-first application development approach. Real-time adjustments to improve revenues, reduce costs, or mitigate risk rely on applications that minimize latency on a variety of data sources. Jack Norris reviews best practices to show how companies develop, deploy, and dynamically update these applications and how this data-first...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Intelligent Automation is now one of the key business imperatives for CIOs and CISOs impacting all areas of business today. In his session at 21st Cloud Expo, Brian Boeggeman, VP Alliances & Partnerships at Ayehu, will talk about how business value is created and delivered through intelligent automation to today’s enterprises. The open ecosystem platform approach toward Intelligent Automation that Ayehu delivers to the market is core to enabling the creation of the self-driving enterprise.
"At the keynote this morning we spoke about the value proposition of Nutanix, of having a DevOps culture and a mindset, and the business outcomes of achieving agility and scale, which everybody here is trying to accomplish," noted Mark Lavi, DevOps Solution Architect at Nutanix, in this SYS-CON.tv interview at @DevOpsSummit at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
"We're here to tell the world about our cloud-scale infrastructure that we have at Juniper combined with the world-class security that we put into the cloud," explained Lisa Guess, VP of Systems Engineering at Juniper Networks, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Enterprise architects are increasingly adopting multi-cloud strategies as they seek to utilize existing data center assets, leverage the advantages of cloud computing and avoid cloud vendor lock-in. This requires a globally aware traffic management strategy that can monitor infrastructure health across data centers and end-user experience globally, while responding to control changes and system specification at the speed of today’s DevOps teams. In his session at 20th Cloud Expo, Josh Gray, Chie...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Consumers increasingly expect their electronic "things" to be connected to smart phones, tablets and the Internet. When that thing happens to be a medical device, the risks and benefits of connectivity must be carefully weighed. Once the decision is made that connecting the device is beneficial, medical device manufacturers must design their products to maintain patient safety and prevent compromised personal health information in the face of cybersecurity threats. In his session at @ThingsExpo...
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, discussed how to use Kubernetes to set up a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. H...