Browse Definitions:
Definition

Freedom of Information Act

The Freedom of Information Act (FOIA) is a United States federal law that grants the public access to information possessed by government agencies. Upon written request, U.S. government agencies are required to release information unless it falls under one of nine exemptions listed in the Act. All Executive Branch departments, agencies and offices, federal regulatory agencies and federal corporations are subject to the Freedom of Information Act. However, it does not apply to Congress, federal courts and parts of the Executive Office of the President that serve only to advise and assist the President. The law is enforceable in a court of law.

Anyone can request information, including U.S. citizens, foreign nationals, organizations, associations and universities, and all agency records that were created or obtained by a federal agency can be requested. This includes print documents, photographs, videos, maps, e-mail, and electronic records.  In addition to releasing information upon written request, agencies are required to publish instructions on how to make a FOIA request and automatically publish certain information in online 'reading rooms.' This information includes records that affect the public, such as regulations, policy statements and staff instructions, as well as information that is or is likely to be frequently requested by the public.

While any information can be requested, government agencies can withhold information that it determines falls under one of nine categories that is exempt under FOI. These categories, as outlined by the Electronic Frontier Foundation, are as follows:

  • Classified information that would damage national security
  • Internal information involving personnel rules and agency practices
  • Material specifically shielded from disclosure by another law
  • Confidential commercial or financial data, like trade secrets
  • Records that would be privileged in litigation
  • Information that would invade someone’s privacy
  • Law enforcement records
  • Information related to government regulation of financial institutions
  • Certain geological/geographical data

These exemptions are intended to protect sensitive information, but agencies have been accused of using the Act’s vague language to withhold information. There is also concern that sensitive information given to government agencies by corporations or individuals will be disclosed without first notifying the corporation or individual. (For example, a credit bureau may request sensitive information pertaining to individuals.) Because FOIA is not a “line-item” appropriation, agencies are responsible for funding their FOIA offices out of their general operating funds. This means funds can be diverted away from the information office when they are needed elsewhere. Some agencies that have a backlog of FOIA requests blame the lack of resources for the long wait times.

If a requester feels that a request has been tampered with or delayed, he/she can file a lawsuit. If the requester receives a favorable judgment from the court, then attorney fees can be recouped. However, if the agency in question decides to hand over information before the judge announces a ruling, then the attorney fees cannot be recouped. Moreover, any denial with a “sound legal basis” is defended in court by the Department of Justice as instructed in a 2001 memo by former Attorney General John Ashcroft.

See also: Open Government Directive, Government Information Awareness

Learn more:

The National Security Archive has information on making and tracking FOIA requests

This was last updated in June 2010

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

SearchSecurity

  • insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • 3D XPoint

    3D XPoint is memory storage technology jointly developed by Intel and Micron Technology Inc.

  • RRAM or ReRAM (resistive RAM)

    RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a ...

  • JEDEC

    JEDEC is a global industry group that develops open standards for microelectronics.

SearchCloudStorage

  • Google Cloud Storage

    Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

Close