IT quangos in firing line of government cuts

Most of the IT-related quangos that came under fire in the latest round of cuts are to stay open, it has emerged, as Cabinet Office minister Francis Maude announced the groups that would be shut.

Most of the IT-related quangos that came under fire in the latest round of cuts are to stay open, it has emerged, as Cabinet Office minister Francis Maude announced the groups that would be shut.

The Technology Strategy Board is to remain, "on grounds of performing a function that requires impariality," the Cabinet Office said.

The Information Commissioner's Office, Technical Advisory Board, and National DNA Database Ethics Group are all to remain in operation.

The British Educational Communications and Technology Agency (Becta) is to be abolished, as already announced, with some of its functions being moved to the Department for Education.

And the National Endowment for Science, Technology and the Arts (NESTA) is no longer a government body, but the Cabinet Office said it would seek to establish it as an independent charity.

The Waste Electrical and Electronic Equipment Advisory Body (WAB) has also been abolished, finishing at the end of September and with its "remaining functions" transferred to the Department for Business Innovation and Skills.

There was no mention of the IT sector skills council e-Skills in the document.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT for government and public sector

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close