Welcome!

News Feed Item

Treasurer McCord Files Petition to Safeguard State Employee Safety

Commonwealth Court Asked to Decide If Right to Know Law Applies Where Personal Safety and Security Is in Question

HARRISBURG, PA--(Marketwired - February 24, 2014) - Faced with the threat of a lawsuit, or releasing information that could jeopardize the safety and security of some public employees, Treasurer Rob McCord today asked Commonwealth Court to resolve a conflict concerning the application of the state Right to Know Law.

"I take seriously my obligation to protect the safety and security of our public employees. By filing this motion, I hope to ensure the protection of our public employees as provided in the Right to Know Law," McCord said.

McCord brought the matter before the court following a written threat to sue by a group calling itself Pennsylvanians for Union Reform (PFUR). PFUR said it will sue the commonwealth if Treasury does not produce an un-redacted list of personal information for all state employees. The state's Right to Know Law exempts some of that information from public release if it would put the personal safety of the employee at risk, such as law enforcement officers, or state employees with protection-from-abuse orders.

But PFUR and its president, Simon Campbell, have requested complete employee information under another law, the state Administrative Code, arguing they do not want the Right to Know Law to apply.

"The Legislature created a comprehensive system in which requests for public records are handled through the Right to Know Law. It is absurd to suggest that the Legislature did not intend the law to apply in all circumstances involving public records," McCord said. "PFUR appears to want to pick and choose when the Right to Know Law applies."

With the question of whether the Administrative Code or the Right to Know Law applies in such cases seemingly destined for a court decision either way, McCord, in his official capacity, filed a Petition for Review in the Nature of an Action for Declaratory and Injunctive Relief.

"As a public official, I'm in the position of either complying with the organization's demand and releasing information that has been deemed confidential under the Right to Know Law -- for good reason, in my opinion -- or redacting the information and subjecting the Treasury Department to litigation. We thought it best to ask the court proactively to clarify the issue before we proceed," McCord said.

On January 15, the attorney for PFUR wrote to the Treasurer, asking for a list of employees and related information. Under the Administrative Code, Treasury annually receives electronic files containing lists of all employees of each executive branch agency. Those lists have not been redacted to exclude information on employees who have active protection from abuse orders, are domestic and sexual violence victims, or are confidential undercover agents or other at-risk law enforcement officers.

PFUR's attorney specifically stated their request was not being made under the Right to Know Law, but instead under the Administrative Code, which says the employee records furnished to Treasury are "public information." Treasury's legal counsel responded a week later by informing the PFUR attorney that Treasury would consider the request under the Right to Know Law. That statute and a subsequent court decision direct public agencies such as Treasury to treat all written requests for access to records as Right to Know requests.

PFUR's attorney in turn wrote to Treasury on January 27, insisting the request be considered under the Administrative Code and giving the department until February 21 to produce the information sought. Failure to do so, he wrote, would result in him filing a mandamus action in court to enforce the provisions of the Administrative Code.

"The Right to Know Law is valuable for increasing government transparency and giving citizens access to information they deserve to have. It was never intended, however, to compromise the physical safety of law enforcement officers or victims of criminal violence, and the Legislature recognized that and included some proper exceptions when it wrote the statute," McCord said.

"No matter how Mr. Campbell and his group intend to use the information, a determination to put it into the public domain is something I believe would be outside the scope of my duties as Treasurer, and irresponsible," he added. "That's why I have asked the court to affirm that the Right to Know Law exemptions should apply."

The administrative agency employee list could contain the identity of undercover law enforcement personnel, the identity of persons who are participants in the Crime Victim Advocate's Address Confidentiality program, the birth days and months of employees, and persons who have obtained protection from abuse orders in which their residency and work address are subject to court-ordered confidentiality.

Under the Right to Know Law, public records are exempt from disclosure if they would, for example, reveal personal identification information, personal financial information, victim information, or information that may jeopardize the safety of a victim, endanger someone's physical or personal safety or security, or hinder an arrest, prosecution or conviction. The Right to Know Law compels an agency to consider applicable exclusions when determining whether information is exempt from disclosure.

For more information, visit www.patreasury.gov.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
In his session at @ThingsExpo, Chris Klein, CEO and Co-founder of Rachio, will discuss next generation communities that are using IoT to create more sustainable, intelligent communities. One example is Sterling Ranch, a 10,000 home development that – with the help of Siemens – will integrate IoT technology into the community to provide residents with energy and water savings as well as intelligent security. Everything from stop lights to sprinkler systems to building infrastructures will run ef...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
Unless you don’t use the internet, don’t live in California, or haven’t been paying attention to the recent news… you should be aware that self-driving cars are on their way to becoming a reality. I have seen them – they are real. If you believe in the future reality of self-driving cars, then continue reading on. If you don’t believe in the future possibilities, then I am not sure what to do to convince you other than discuss the very real changes that will roll out with the consumer producti...
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
SYS-CON Events announced today that Enzu, a leading provider of cloud hosting solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to foc...
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...