Government Technology

Garcetti: LA City Agencies Must Get on Board with Open Data Initiative



December 19, 2013 By Rick Orlov, McClatchy News Service

Los Angeles Mayor Eric Garcetti issued an executive directive on Wednesday to have all city agencies take part in a new Open Data Initiative and make public all the information collected by them in the course of a year.

Garcetti, who just left for an Australian vacation with his family, said he hopes to have the data available on a new city website that tracks City Hall services such as police response times and updates on street closures and roadway sweeping.

All city departments, including Airports, Harbor, Water and Power, Recreation and Parks, Library and the pension systems are mandated to take part.

"This empowers Angelenos to participate in their government with greater understanding and impact and promotes a culture of data sharing and cooperation among city departments," he said.

"I look forward to launching L.A.'s Open Data portal in early 2014 to promote transparency in government and give Angelenos a new way to help solve our toughest challenges."

Included in the directive are instructions to the Information Technology Agency to work with the mayor's office in collecting the data to be put on the website, while examining issues of confidentiality and security.

"Opening government data to entrepreneurs and businesses promotes innovation by putting that information to work in ways outside the expertise of government institutions and gives companies, individuals and nonprofit organizations the opportunity to leverage one of government's greatest assets: public information," he said.

"It fosters creative new thinking about solving our most intractable challenges through public-private partnerships and promoting a culture of data sharing."

In keeping with Garcetti's mission to be the full-disclosure mayor, before leaving on his 10-day holiday break, he put up a citizen survey -- saying it's his New Year's resolution to solve municipal issues -- asking three questions: What needs the most improvement in your neighborhood; do you know how to contact City Hall; and by what method do you prefer to reach City Hall? To weigh in, visit www.lamayor.org/resolution.

(c) 2013 the Daily News (Los Angeles)


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
Fresh Ideas In Online Security for Public Safety Organizations
Lesley Carhart, Senior Information Security Specialist at Motorola Solutions, knows that online and computer security are more challenging than ever. Personal smartphones, removable devices like USB storage drives, and social media have a significant impact on security. In “Fresh Ideas in Online Security for Public Safely Organizations,” Lesley provides recommendations to improve your online security against threats from social networks, removable devices, weak passwords and digital photos.
View All

Featured Papers