Chapter 32. Open Source Software for Open Government Agencies

The theme of open government that pervades this volume depends on drawing participation from as wide a swath of the public as possible, and this goal in turn calls for the use of software that is universally available, easy to use, easy to adapt to specific needs, and easy to modify to match evolving requirements. Free and open source software meets these goals more consistently than any alternative.

In this chapter, we use the term FLOSS for this type of software: free/libre/open source software. Although it’s usually distributed free of charge, its distinguishing trait is a license that allows anyone to change the code and redistribute the changes. This keeps FLOSS from being dominated by one set of developers, and therefore from being burdened with restrictions that users may reject and that even may violate government policies (e.g., terms of service that let the developers collect personal information from users). The alternatives are usually called “proprietary software” because they are often free of charge but are still under the control of the organization that created them.

FLOSS is already in widespread use within government agencies, and will have an even greater role to play in open government technologies that can be really useful for public administrations. However, adopting or migrating to FLOSS is a complex, multidisciplinary effort involving several areas of expertise. It requires taking a hard look at current workflows in the organization, as well as how people interact with information technology (IT) systems day to day. The unique complexities found in each public agency add more difficulties.

So, FLOSS migration is a major endeavor, and as any migration, it can easily go wrong. All too often, agencies are discouraged by one failure from pursuing other opportunities, and may even blame the software or the community that supports it instead of the logistics of the migration. This chapter will hopefully persuade you that adopting FLOSS is crucial and will additionally give you guidelines to avoiding mistakes during its adoption.

The common hurdles in adopting FLOSS fall into three major categories:

Management

Understanding the procedures that agency heads need to put in place, and how staff members must be coordinated

Technical

Choosing software appropriate for the job, and interacting with the community that developed the software in a productive manner

Social

Presenting change to staff members in a positive manner and handling the various forms of resistance they will put up

Before introducing guidelines based on experience, we’ll lay out some of the specific advantages of FLOSS for public agencies. Then we’ll present a set of best practices obtained through research by European projects that have analyzed adoption and migration experiences.

Government agencies, and public institutions to which they contract out services, are large software users with special characteristics derived from their obligations toward citizens and their unique legal status. For example, most agencies are expected, or even required by law, to provide services accessible to all residents of their regions, including those who are disabled, who lack education, or who are geographically isolated. Agencies must also be neutral in their relationships with manufacturers, and must often guarantee the integrity, privacy, and security of the data they handle over long periods of time.

All these needs play into their considerations when adopting software, beyond the cost/functionality evaluation that businesses and individuals perform. An analysis of these common requirements shows a clear advantage to FLOSS solutions where they exist.

Any institution values the advantages of keeping open options for different vendors, because it tends to lower costs and leave an escape path when a chosen vendor leaves the business or fails to provide up-to-date features. But for public agencies, a competitive market is usually more than a preference—it’s a legislative requirement. The legislation enjoins them to initiate procurement by issuing calls for tenders that don’t favor a single vendor. Any interested company that fulfills reasonable criteria can produce a bid that competes on its own merits with everyone else.

But this critical adherence to disinterested policy is violated in the case of proprietary software. Each product is available from only one supplier (even if it uses a number of intermediaries). If a particular product is specified in a call for tenders, the administration has predetermined the supplier that gets the contract. In the case of computer applications, it is virtually impossible to avoid specifying a particular product because the agency needs compatibility with products that are already deployed, savings in training and maintenance, or other reasons.

Requiring a proprietary format (such as the ability to deal with certain kinds of spreadsheets) is a looser limitation but still a means of lock-in, because the vendor that defined the format and continues to update the format over time is the only one the agency can rely on to handle the format in all its subtleties.

FLOSS offers a way out of this situation. If the specified functionality is delivered by FLOSS, any interested company can offer the product and any service based on it, subject only to the capabilities and knowledge of the company. In addition, agencies that enter contracts this way can easily switch to another supplier without needing to switch to a new product.

Public agencies have become increasingly committed to transparency. The public rightfully demands not only to be kept apprised of each stage of decision making—such as in urban planning—but to see the data behind the planning, the steps made in taking the decision, and the reasons for the decision. Being able to let citizens inspect the agency’s software extends this public scrutiny to the field of IT. In addition, agencies need to guarantee that their computer systems do what they are intended to do (in many countries, by legal requirement). Many systems manage data with privacy restrictions (tax data, criminal records, health information, etc.), which must be kept out of the malicious grasp of unauthorized third parties. Ironically, experience has taught that systems tasked with keeping secrets are more secure and more likely to fulfill their requirements if the source code is open to examination; only encryption keys should be secret.

Proprietary applications without source code are difficult to evaluate rigorously to guarantee that the application will process the data in the way that it should, with no leaks or back doors. Even if a vendor does provide a customer with its source code, the possibilities of a public institution ensuring that it is free of malicious or insecure elements are very limited. Remember that every major software product contains security flaws that are routinely reported and fixed only after the product has been in the field for months, or even years. Only if software inspection can be routinely done by third parties, including any citizen who may want to do it, can the agency be sure that it is taking all reasonable measures to comply with this fundamental duty.