Welcome!

News Feed Item

Treasurer McCord Files Petition to Safeguard State Employee Safety

Commonwealth Court Asked to Decide If Right to Know Law Applies Where Personal Safety and Security Is in Question

HARRISBURG, PA--(Marketwired - February 24, 2014) - Faced with the threat of a lawsuit, or releasing information that could jeopardize the safety and security of some public employees, Treasurer Rob McCord today asked Commonwealth Court to resolve a conflict concerning the application of the state Right to Know Law.

"I take seriously my obligation to protect the safety and security of our public employees. By filing this motion, I hope to ensure the protection of our public employees as provided in the Right to Know Law," McCord said.

McCord brought the matter before the court following a written threat to sue by a group calling itself Pennsylvanians for Union Reform (PFUR). PFUR said it will sue the commonwealth if Treasury does not produce an un-redacted list of personal information for all state employees. The state's Right to Know Law exempts some of that information from public release if it would put the personal safety of the employee at risk, such as law enforcement officers, or state employees with protection-from-abuse orders.

But PFUR and its president, Simon Campbell, have requested complete employee information under another law, the state Administrative Code, arguing they do not want the Right to Know Law to apply.

"The Legislature created a comprehensive system in which requests for public records are handled through the Right to Know Law. It is absurd to suggest that the Legislature did not intend the law to apply in all circumstances involving public records," McCord said. "PFUR appears to want to pick and choose when the Right to Know Law applies."

With the question of whether the Administrative Code or the Right to Know Law applies in such cases seemingly destined for a court decision either way, McCord, in his official capacity, filed a Petition for Review in the Nature of an Action for Declaratory and Injunctive Relief.

"As a public official, I'm in the position of either complying with the organization's demand and releasing information that has been deemed confidential under the Right to Know Law -- for good reason, in my opinion -- or redacting the information and subjecting the Treasury Department to litigation. We thought it best to ask the court proactively to clarify the issue before we proceed," McCord said.

On January 15, the attorney for PFUR wrote to the Treasurer, asking for a list of employees and related information. Under the Administrative Code, Treasury annually receives electronic files containing lists of all employees of each executive branch agency. Those lists have not been redacted to exclude information on employees who have active protection from abuse orders, are domestic and sexual violence victims, or are confidential undercover agents or other at-risk law enforcement officers.

PFUR's attorney specifically stated their request was not being made under the Right to Know Law, but instead under the Administrative Code, which says the employee records furnished to Treasury are "public information." Treasury's legal counsel responded a week later by informing the PFUR attorney that Treasury would consider the request under the Right to Know Law. That statute and a subsequent court decision direct public agencies such as Treasury to treat all written requests for access to records as Right to Know requests.

PFUR's attorney in turn wrote to Treasury on January 27, insisting the request be considered under the Administrative Code and giving the department until February 21 to produce the information sought. Failure to do so, he wrote, would result in him filing a mandamus action in court to enforce the provisions of the Administrative Code.

"The Right to Know Law is valuable for increasing government transparency and giving citizens access to information they deserve to have. It was never intended, however, to compromise the physical safety of law enforcement officers or victims of criminal violence, and the Legislature recognized that and included some proper exceptions when it wrote the statute," McCord said.

"No matter how Mr. Campbell and his group intend to use the information, a determination to put it into the public domain is something I believe would be outside the scope of my duties as Treasurer, and irresponsible," he added. "That's why I have asked the court to affirm that the Right to Know Law exemptions should apply."

The administrative agency employee list could contain the identity of undercover law enforcement personnel, the identity of persons who are participants in the Crime Victim Advocate's Address Confidentiality program, the birth days and months of employees, and persons who have obtained protection from abuse orders in which their residency and work address are subject to court-ordered confidentiality.

Under the Right to Know Law, public records are exempt from disclosure if they would, for example, reveal personal identification information, personal financial information, victim information, or information that may jeopardize the safety of a victim, endanger someone's physical or personal safety or security, or hinder an arrest, prosecution or conviction. The Right to Know Law compels an agency to consider applicable exclusions when determining whether information is exempt from disclosure.

For more information, visit www.patreasury.gov.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, discussed how VPaaS enables you to move fast, creating scalable video experiences that reach your aud...
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for ...
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effici...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
"MathFreeOn.com is a line coding platform for engineers and scientists. When they want to solve an engineering problem and they have to use software - they have to pay a lot of money for licenses - but with MathFreeOn you don't have to pay a lot of money. Just go to our site and write the code and you can check the result right away," explained Simon Lee, CMO of MathFreeOn, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Cla...
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...