Click here
      Home    DAG Tutorial    Search    Available Downloads     Feedback
 
The DAG does not reflect the changes in the DoDI5000.02. Work is in progress to update the content and will be completed as soon as possible.
 
.

7.0. Overview

Topic
Previous Page Next Page

Previous and Next Page arrows

DEFENSE ACQUISITION GUIDEBOOK
Chapter 7 - Acquiring Information Technology

7.0. Overview

7.0.1. Purpose

7.0.2. Contents

7.0.1. Purpose

The goal of this chapter is to help program managers (PMs) and Sponsors/Domain Owners implement Department of Defense (DoD) policies intended to achieve fundamentally joint, net-centric, distributed forces capable of rapid decision superiority and massed effects across the battle space. This chapter explains how the DoD is using a net-centric strategy to transform DoD warfighting, business, and intelligence capabilities. The chapter provides descriptions and explanations of many of the associated topics and concepts. This chapter also discusses many of the activities that enable the development of net-centric systems, however, not all activities are the direct responsibility of the PM. Many activities reflect Department-level effort that occurs prior to, or outside of, the acquisition process. The detailed discussions of such a broad set of activities are presented here to help the PM understand the context of the capabilities described in the Joint Capabilities Integration and Development System (JCIDS) documents and required of the system under development.

7.0.2. Contents

This chapter contains ten sections that present the Program Manager with a comprehensive review of topics, concepts, and activities associated with the acquisition of Information Technology (IT), including National Security Systems (NSS).

Section 7.1, "Introduction," explains net-centric information sharing in the context of the discussions and requirements outlined in the various other sections of this chapter.

Section 7.2, "DoD Information Enterprise (DoD IE)," explains several important concepts that provide a foundation for acquiring net-centric Information Technology (including NSS). The overarching concept is that the DoD Enterprise Architecture (DoD EA) is used to describe and document current and desired relationships among warfighting operations, business, and management processes, the entities involved, and the information used. The IT architectures (i.e., IT solutions) are then aligned with the DoD EA.

DoD Architecture Framework (DoDAF) views that comprise architectures that are the DoD EA, and the DoD EA as a whole:

  • Describe existing and desired capabilities.
  • Provide a basis for interoperability and supportability reviews and certifications.
  • Provide required components of the Capability Development Document (CDD) and Capability Production Document (CPD).
  • Support portfolio management

The section discusses the DoD IEA and its role in helping PMs and Sponsors/Domain Owners describe their transition from the current environment to the future net-centric environment. Sections 7.3 through 7.10 elaborate on specific areas on which the Sponsors/Domain Owners and PMs should focus as they work to deliver and improve the reach, richness, agility, and assurance of net-centric capabilities.

Section 7.3, "Interoperability and Supportability of Information Technology and National Security Systems," explains interoperability and supportability, outlines the use of the Net-Ready Key Performance Parameter in these processes, and describes the process of building an Information Support Plan.

Section 7.4, "Sharing Data, Information, and Information Technology (IT) Service," provides guidance on implementing DoD Net-centric Data Strategy and Goals, and outlines Data, Information, and IT Services Sharing tasks as they relate to the acquisition process.

Section 7.5, "Information Assurance," explains the requirements for Information Assurance (IA) and provides links to resources to assist in developing an IA Strategy.

Section 7.6, "Electromagnetic Spectrum," offers a discussion and explanation of Spectrum Supportability.

Section 7.7, "Accessibility of Electronic and Information Technology," summarizes the requirements of the Workforce Investment Act of 1998, (Section 508 of the Rehabilitation Act (as amended in 1998)), regarding the procurement, development, maintenance, or use of electronics and IT that are accessible to people with disabilities.

Section 7.8, "Clinger-Cohen Act," helps PMs and Sponsors/Domain Owners understand how to implement Subtitle III of title 40 United States Code (formerly known as division E of the Clinger-Cohen Act (CCA) and hereinafter referred to as "Title 40/CCA") and associated regulatory requirements.

Section 7.9, "Post Deployment Reviews," discusses how the Department of Defense (DoD) uses the Post Implementation Review to inform Sponsors of the degree to which their IT/NSS investments closed the needed capability gaps.

Section 7.10, "Commercial, Off-The-Shelf (COTS) Solutions," provides insight into DoD guidance regarding acquisition of COTS software products.

In summary, this chapter should help PMs and Sponsors/Domain Owners understand and apply the tools of the DoD EA so that they can more effectively:

  • Describe and measure the degree to which their programs are interoperable and supportable with the DoD IE.
  • Ensure their programs employ and institutionalize approaches that make data visible, accessible, understandable, trusted, interoperable and responsive.
  • Achieve the Department's objectives for IA.
  • Ensure their programs will have assured interoperable access to electromagnetic spectrum.
  • Achieve these goals within the constraints of the law and where possible, through the use of commercially available solutions.

Previous and Next Page arrows

List of All Contributions at This Location

No items found.

Popular Tags

Browse

https://acc.dau.mil/UI/img/bo/minus.gifWelcome to the Defense Acquisition...
https://acc.dau.mil/UI/img/bo/plus.gifForeword
https://acc.dau.mil/UI/img/bo/plus.gifChapter 1 -- Department of Defense...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 2 -- Program Strategies
https://acc.dau.mil/UI/img/bo/plus.gifChapter 3 -- Affordability and...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 4 -- Systems Engineering
https://acc.dau.mil/UI/img/bo/plus.gif4.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif4.1. Introduction
https://acc.dau.mil/UI/img/bo/plus.gif4.2. Systems Engineering Activities in...
https://acc.dau.mil/UI/img/bo/plus.gif4.3. Systems Engineering Processes
https://acc.dau.mil/UI/img/bo/plus.gifChapter 5 -- Life-Cycle Logistics
https://acc.dau.mil/UI/img/bo/plus.gifChapter 6 -- Human Systems Integration...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 7 -- Acquiring Information...
https://acc.dau.mil/UI/img/bo/minus.gif7.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif7.1. Introduction
https://acc.dau.mil/UI/img/bo/plus.gif7.2. DoD Information Enterprise
https://acc.dau.mil/UI/img/bo/plus.gif7.3. Interoperability and Supportability...
https://acc.dau.mil/UI/img/bo/plus.gif7.4. Sharing Data, Information, and...
https://acc.dau.mil/UI/img/bo/plus.gif7.5. Information Assurance (IA)
https://acc.dau.mil/UI/img/bo/plus.gif7.6. Electromagnetic Spectrum
https://acc.dau.mil/UI/img/bo/plus.gif7.7. Accessibility of Electronic and...
https://acc.dau.mil/UI/img/bo/plus.gif7.8. The Clinger-Cohen Act (CCA) --...
https://acc.dau.mil/UI/img/bo/plus.gif7.9. Post-Implementation Review (PIR)
https://acc.dau.mil/UI/img/bo/plus.gif7.10. Commercial Off-the-Shelf (COTS)...
https://acc.dau.mil/UI/img/bo/plus.gif7.11. Space Mission Architectures
https://acc.dau.mil/UI/img/bo/plus.gifChapter 8 -- Intelligence Analysis...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 9 -- Test and Evaluation (T&E)
https://acc.dau.mil/UI/img/bo/plus.gif9.0 Overview
https://acc.dau.mil/UI/img/bo/plus.gif9.1 OSD T&E Organization
https://acc.dau.mil/UI/img/bo/minus.gif9.2 Service-Level T&E Management
https://acc.dau.mil/UI/img/bo/minus.gif9.3 Test and Evaluation
https://acc.dau.mil/UI/img/bo/minus.gif9.3.3 Live Fire Test and Evaluation
https://acc.dau.mil/UI/img/bo/plus.gif9.4 Integrated Test and Evaluation
https://acc.dau.mil/UI/img/bo/plus.gif9.5 Test and Evaluation Planning
https://acc.dau.mil/UI/img/bo/plus.gif9.6 T&E Reporting
https://acc.dau.mil/UI/img/bo/minus.gif9.7 Special Topics
https://acc.dau.mil/UI/img/bo/plus.gif9.7.5 Testing in a Joint Operational...
https://acc.dau.mil/UI/img/bo/plus.gif9.7.6 Information Assurance Testing
https://acc.dau.mil/UI/img/bo/plus.gif9.8. Best Practices
https://acc.dau.mil/UI/img/bo/minus.gif9.9. Prioritizing Use of Government Test...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 10 -- Decisions Assessments and...
https://acc.dau.mil/UI/img/bo/plus.gif10.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif10.1. Decision Points
https://acc.dau.mil/UI/img/bo/plus.gif10.2. Executive Review Forums
https://acc.dau.mil/UI/img/bo/plus.gif10.3. Integrated Product and Process...
https://acc.dau.mil/UI/img/bo/plus.gif10.4. Role of Exit Criteria
https://acc.dau.mil/UI/img/bo/plus.gif10.5. Role of Independent Assessments
https://acc.dau.mil/UI/img/bo/plus.gif10.5.3. Preliminary Design Review (PDR)...
https://acc.dau.mil/UI/img/bo/plus.gif10.6. Information Sharing and DoD...
https://acc.dau.mil/UI/img/bo/plus.gif10.7. Management Control
https://acc.dau.mil/UI/img/bo/plus.gif10.8. Program Plans
https://acc.dau.mil/UI/img/bo/plus.gif10.9. Acquisition Program Baseline (APB)
https://acc.dau.mil/UI/img/bo/plus.gif10.10. Periodic Reports
https://acc.dau.mil/UI/img/bo/plus.gif10.11. Major Automated Information...
https://acc.dau.mil/UI/img/bo/plus.gif10.12. Defense Acquisition Executive...
https://acc.dau.mil/UI/img/bo/plus.gif10.13. Acquisition Visibility
https://acc.dau.mil/UI/img/bo/plus.gif10.14. Special Interest Programs
https://acc.dau.mil/UI/img/bo/plus.gif10.15. Relationship of Affordability and...
https://acc.dau.mil/UI/img/bo/plus.gif10.16. Acquisition Program Transition...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 11 -- Program Management...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 12 - Defense Business System...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 13 -- Program Protection
https://acc.dau.mil/UI/img/bo/plus.gif13.0 Overview
https://acc.dau.mil/UI/img/bo/plus.gif13.1 The Program Protection Process
https://acc.dau.mil/UI/img/bo/plus.gif13.2 The Program Protection Plan (PPP)
https://acc.dau.mil/UI/img/bo/plus.gif13.3 Critical Program Information (CPI)...
https://acc.dau.mil/UI/img/bo/plus.gif13.4. Intelligence and...
https://acc.dau.mil/UI/img/bo/plus.gif13.5. Vulnerability Assessment
https://acc.dau.mil/UI/img/bo/plus.gif13.6. Risk Assessment
https://acc.dau.mil/UI/img/bo/plus.gif13.7. Countermeasures
https://acc.dau.mil/UI/img/bo/plus.gif13.8. Horizontal Protection
https://acc.dau.mil/UI/img/bo/plus.gif13.9. Foreign Involvement
https://acc.dau.mil/UI/img/bo/plus.gif13.10. Managing and Implementing PPPs
https://acc.dau.mil/UI/img/bo/plus.gif13.11. Compromises
https://acc.dau.mil/UI/img/bo/plus.gif13.12. Costs
https://acc.dau.mil/UI/img/bo/plus.gif13.13. Contracting
https://acc.dau.mil/UI/img/bo/plus.gif13.14. Detailed System Security...
https://acc.dau.mil/UI/img/bo/plus.gif13.15. Program Protection Plan (PPP)...
https://acc.dau.mil/UI/img/bo/plus.gif13.16. Program Protection Plan (PPP)...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 14 -- Acquisition of Services
https://acc.dau.mil/UI/img/bo/minus.gifDoD Directive 5000.01
https://acc.dau.mil/UI/img/bo/plus.gifENCLOSURE 1 ADDITIONAL POLICY
https://acc.dau.mil/UI/img/bo/plus.gifDoD Instruction 5000.02
https://acc.dau.mil/UI/img/bo/plus.gifRecent Policy and Guidance
https://acc.dau.mil/UI/img/bo/plus.gifCurrent JCIDS Manual and CJCSI 3170.01 I
https://acc.dau.mil/UI/img/bo/plus.gifDefense Acquisition Guidebook Key...
ACC Practice Center Version 3.2
  • Application Build 3.2.9
  • Database Version 3.2.9