Click here
      Home    DAG Tutorial    Search    Available Downloads     Feedback
 
The DAG does not reflect the changes in the DoDI5000.02. Work is in progress to update the content and will be completed as soon as possible.
 
.

4.3.8. Technical Data Management Process

Topic

Previous and Next Page arrows

DEFENSE ACQUISITION GUIDEBOOK
Chapter 4 -- Systems Engineering

4.3.8. Technical Data Management Process

4.3.8. Technical Data Management Process

Through the Technical Data Management process, the program identifies, acquires, manages, maintains, and ensures access to the technical data and computer software required to manage and support a system throughout the acquisition life cycle. Key Technical Data Management considerations include understanding and protecting Government intellectual property and data rights, achieving competition goals, maximizing options for product support, and enabling performance of downstream life-cycle functions. DoDI 5000.02 contains Technical Data Management requirements for Acquisition Category (ACAT) I and II programs.

Effective acquisition, upgrades, and management of product data provide:

  • Information necessary to understand and evaluate system designs throughout the life cycle
  • Ability to operate and sustain weapon systems under a variety of changing technical, operational, and programmatic environments
  • Ability to re-compete item acquisition, upgrades, and sustainment activities in the interest of achieving cost savings; the lack of product data and/or data rights often makes it difficult or impossible to award contracts to anyone other than the original manufacturer, thereby taking away much or all of the Government’s ability to reduce total ownership costs (TOC)

Activities and Products

The Program Manager and Systems Engineer, in conjunction with the Product Support Manager, should ensure that life-cycle requirements for weapon system-related data products and data rights are identified early and that appropriate contract provisions are put in place to enable deliveries of these products. Figure 4.3.8.F1 shows the activities associated with Technical Data Management, including:

- Identify Data Requirements

  • Formulate the program’s Technical Data Rights Strategy (TDRS) and technical data management approach, with emphasis on technical and product data needed to support the product throughout its life cycle. (see DAG Chapter 2 Program Strategies for more information about Data Rights).
  • Ensure that data requirements are documented in the TDRS; summarized in the Technology Development Strategy (TDS), Acquisition Strategy (AS), and Life-Cycle Sustainment Plan (LCSP); and submitted at each milestone prior to award of the contract for the next life-cycle phase.
  • Consider not only the immediate, short-term costs of acquiring the needed technical data and data rights but also the long-term cost savings resulting from the ability to compete production and logistics support activities and reduce TOC. Understand that the Government can possess either Government Purpose or Unlimited Rights to use many types of technical data and data rights, at no additional cost, based on the type of technical data and the source of funding used to generate the data (see DoD Open Systems Architecture Contract Guidebook for Program Managers for more information about data rights).

- Acquire Data

  • Use explicit contract Statement of Work tasks to require the developer to perform the work that generates the required data. The content, format, and quality requirements should be specified in the contract.
  • Use current, approved Data Item Descriptions (DID) and Contract Data Requirements Lists (CDRL) in each contract to order the delivery of the required technical data and computer software.

- Receive, Verify, and Accept Data

  • Ensure verification of content, format, and quality of all required product-related data received from originators.
  • Inspect contractually ordered data deliverables to ensure markings are in accordance with the relevant data rights agreements and DFARS clauses, and contain appropriate distribution statements and/or export control statements.

Caution: Acceptance of delivered data not marked consistent with the contract can result in the Government “losing” legitimate rights to technical data and can incur significant legal liability on the Government and the individual Government employees. Regaining those rights generally requires costly and time-consuming legal actions.

- Store, Maintain, and Control Data

  • Budget for and fund the maintenance and upkeep of product data throughout the life cycle.
  • An Integrated Data Environment (IDE) or Product Life-cycle Management (PLM) system allows every activity involved with the program to create, store, access, manipulate, and exchange digital data.
  • To the greatest extent practical, programs should use existing IDE/PLM infrastructure such as repositories operated by Commodity Commands and other organizations. (Program-unique IDEs are discouraged because the high infrastructure cost; further, multiple IDEs inhibit access, sharing, and reuse of data across programs.)
  • Ensure all changes to the data are made in a timely manner and are documented in the program IDE or PLM system.

- Use and Exchange Data

Plan for and establish methods for access and reuse of product data by all personnel and organizations that perform life-cycle support activities.

Figure 4.3.8.F1. Data Management Activities

Figure 4.3.8.F1. Data Management Activities

In support of the Government’s requirement for a Technical Data Package (TDP), the Program Manager should also consider all product related data (e.g., technical manuals, repair instructions, and design/analysis data) to:

  • Allow logistics support activities
  • Better enable sustainment engineering
  • Apply, implement and manage product upgrades

Contractually deliverable data should be identified and ordered at the specific “data product” level, e.g., two-dimensional drawings, three-dimensional Computer-Aided Design (CAD) models, technical manuals, etc. Figure 4.3.8.F2 provides a notional representation of different types of product-related data.

Caution: Program Managers and Systems Engineers should be aware that terms such as “technical data,” “product data,” and “TDP” are imprecise, not equivalent, and often incorrectly used interchangeably.

Resources for establishing and conducting Technical Data Management activities include but are not limited to:

Figure 4.3.8.F2. Data Taxonomy

Figure 4.3.8.F2. Data Taxonomy

- Data Protection

The Program Manager is responsible for protecting system data, whether the data is stored and managed by the Government or by contractors. The DoD policy with regard to data protection, marking, and release can be found in:

Data containing information subject to restrictions are protected in accordance with the appropriate guidance, contract, or agreement. Guidance on distribution statements, restrictive markings, and restrictions on use, release, or disclosure, of data can be found in the DFARS Part 252.227-7013 and 7014, and DoDI 5230.24.

When digital data is used, the data should display applicable restriction markings, legends, and distribution statements clearly visible when the data is first opened or accessed. These safeguards not only ensure Government compliance regarding the use of data but also guarantee and safeguard contractor data delivered to the Government, and extend responsibilities of data handling and use to parties who subsequently use the data.

Section 208 of Public Law 107-347 and DoD Privacy Impact Assessment (PIA) guidance requires that PIA be conducted prior to developing or purchasing any DoD information system that collect, maintain, use, or disseminate personally identifiable information about members of the public, federal personnel, DoD contractors and, in some cases, foreign nationals. Available PIA guidance provides procedures for completing and approving PIAs. For further information, see DAG Chapter 7 Acquiring Information Technology, Including National Security Systems.

All data deliverables should include distribution statements. Processes should be established to protect all data that contain critical technology information, as well as ensure that limited distribution data, intellectual property data, or proprietary data is properly handled throughout the life cycle, whether the data are in hard-copy or digital format.

Previous and Next Page arrows

Previous Page Next Page

List of All Contributions at This Location

No items found.

Popular Tags

Browse

https://acc.dau.mil/UI/img/bo/minus.gifWelcome to the Defense Acquisition...
https://acc.dau.mil/UI/img/bo/minus.gifForeword
https://acc.dau.mil/UI/img/bo/plus.gifChapter 1 -- Department of Defense...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 2 -- Program Strategies
https://acc.dau.mil/UI/img/bo/plus.gif2.0 Overview
https://acc.dau.mil/UI/img/bo/plus.gif2.1. Program Strategies—General
https://acc.dau.mil/UI/img/bo/plus.gif2.2. Program Strategy Document...
https://acc.dau.mil/UI/img/bo/plus.gif2.3. Program Strategy Relationship to...
https://acc.dau.mil/UI/img/bo/plus.gif2.4. Relationship to Request for...
https://acc.dau.mil/UI/img/bo/plus.gif2.5. Program Strategy Classification...
https://acc.dau.mil/UI/img/bo/plus.gif2.6. Program Strategy Document Approval...
https://acc.dau.mil/UI/img/bo/plus.gif2.7. Acquisition Strategy versus...
https://acc.dau.mil/UI/img/bo/plus.gif2.8. Technology Development...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 3 -- Affordability and...
https://acc.dau.mil/UI/img/bo/minus.gif3.0. Overview
https://acc.dau.mil/UI/img/bo/minus.gif3.1. Life-Cycle Costs/Total Ownership...
https://acc.dau.mil/UI/img/bo/plus.gif3.1.2. Life-Cycle Cost Categories and...
https://acc.dau.mil/UI/img/bo/plus.gif3.1.4. Implications of Evolutionary...
https://acc.dau.mil/UI/img/bo/plus.gif3.2. Affordability
https://acc.dau.mil/UI/img/bo/minus.gif3.3. Analysis of Alternatives
https://acc.dau.mil/UI/img/bo/minus.gif3.4. Cost Estimation for Major Defense...
https://acc.dau.mil/UI/img/bo/plus.gif3.4.4. Cost Assessment Reporting...
https://acc.dau.mil/UI/img/bo/plus.gif3.5. Manpower Estimates
https://acc.dau.mil/UI/img/bo/minus.gif3.6. Major Automated Information Systems...
https://acc.dau.mil/UI/img/bo/minus.gif3.7. Principles for Life-Cycle Cost...
https://acc.dau.mil/UI/img/bo/plus.gif3.7.4. Further Information and Training
https://acc.dau.mil/UI/img/bo/minus.gifChapter 4 -- Systems Engineering
https://acc.dau.mil/UI/img/bo/plus.gif4.0. Overview
https://acc.dau.mil/UI/img/bo/minus.gif4.1. Introduction
https://acc.dau.mil/UI/img/bo/plus.gif4.1.1. Systems Engineering Policy and...
https://acc.dau.mil/UI/img/bo/plus.gif4.1.2. Systems Engineering Plan
https://acc.dau.mil/UI/img/bo/plus.gif4.1.3. Systems Level Considerations
https://acc.dau.mil/UI/img/bo/plus.gif4.1.4. Engineering Resources
https://acc.dau.mil/UI/img/bo/plus.gif4.1.5. Certifications
https://acc.dau.mil/UI/img/bo/plus.gif4.1.6. Systems Engineering Role in...
https://acc.dau.mil/UI/img/bo/minus.gif4.2. Systems Engineering Activities in...
https://acc.dau.mil/UI/img/bo/plus.gif4.2.1. Life-Cycle Expectations
https://acc.dau.mil/UI/img/bo/plus.gif4.2.2. Pre-Materiel Development Decision
https://acc.dau.mil/UI/img/bo/plus.gif4.2.3. Materiel Solution Analysis Phase
https://acc.dau.mil/UI/img/bo/plus.gif4.2.4. Technology Development Phase
https://acc.dau.mil/UI/img/bo/plus.gif4.2.5. Engineering and Manufacturing...
https://acc.dau.mil/UI/img/bo/plus.gif4.2.6. Production and Deployment Phase
https://acc.dau.mil/UI/img/bo/plus.gif4.2.7. Operations and Support Phase
https://acc.dau.mil/UI/img/bo/plus.gif4.2.8. Technical Reviews and Audits...
https://acc.dau.mil/UI/img/bo/plus.gif4.2.9. Alternative Systems Review
https://acc.dau.mil/UI/img/bo/plus.gif4.2.10. System Requirements Review
https://acc.dau.mil/UI/img/bo/plus.gif4.2.11. System Functional Review
https://acc.dau.mil/UI/img/bo/plus.gif4.2.12. Preliminary Design Review
https://acc.dau.mil/UI/img/bo/plus.gif4.2.13. Critical Design Review
https://acc.dau.mil/UI/img/bo/plus.gif4.2.14. System Verification...
https://acc.dau.mil/UI/img/bo/plus.gif4.2.15. Production Readiness Review
https://acc.dau.mil/UI/img/bo/plus.gif4.2.16. Physical Configuration Audit
https://acc.dau.mil/UI/img/bo/plus.gif4.2.17. In-Service Review
https://acc.dau.mil/UI/img/bo/minus.gif4.3. Systems Engineering Processes
https://acc.dau.mil/UI/img/bo/plus.gif4.3.2. Technical Planning Process
https://acc.dau.mil/UI/img/bo/minus.gif4.3.3. Decision Analysis Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.4. Technical Assessment Process
https://acc.dau.mil/UI/img/bo/minus.gif4.3.5. Requirements Management Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.6. Risk Management Process
https://acc.dau.mil/UI/img/bo/minus.gif4.3.7. Configuration Management Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.8. Technical Data Management Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.9. Interface Management Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.10. Stakeholder Requirements...
https://acc.dau.mil/UI/img/bo/minus.gif4.3.11. Requirements Analysis Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.12. Architecture Design Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.13. Implementation Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.14. Integration Process
https://acc.dau.mil/UI/img/bo/minus.gif4.3.15. Verification Process
https://acc.dau.mil/UI/img/bo/minus.gif4.3.16. Validation Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.17. Transition Process
https://acc.dau.mil/UI/img/bo/minus.gif4.3.18. Design Considerations
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.1. Accessibility (Section 508...
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.2. Affordability – Systems...
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.3. Anti-Counterfeiting
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.4. Commercial-Off-the-Shelf
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.5. Corrosion Prevention and...
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.6. Critical Safety Item
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.7. Demilitarization and Disposal
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.8. Diminishing Manufacturing...
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.9. Environment Safety and...
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.10. Human Systems Integration
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.11. Insensitive Munitions
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.12. Intelligence (Life-Cycle...
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.13. Interoperability and...
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.14. Item Unique Identification
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.15. Open Systems Architecture
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.16. Operational Energy
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.17. Packaging Handling Storage...
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.18. Producibility Quality and...
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.19. Reliability and...
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.20. Spectrum Management
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.21. Standardization
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.22. Supportability
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.23. Survivability and...
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18.24. System Security Engineering
https://acc.dau.mil/UI/img/bo/plus.gif4.3.19. Tools Techniques and Lessons...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 5 -- Life-Cycle Logistics
https://acc.dau.mil/UI/img/bo/plus.gif5.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif5.1. Life-Cycle Sustainment in the...
https://acc.dau.mil/UI/img/bo/plus.gif5.2. Applying Systems Engineering to...
https://acc.dau.mil/UI/img/bo/plus.gif5.3. Supportability Design...
https://acc.dau.mil/UI/img/bo/plus.gif5.4. Sustainment in the Life-Cycle...
https://acc.dau.mil/UI/img/bo/plus.gif5.5. References
https://acc.dau.mil/UI/img/bo/plus.gifChapter 6 -- Human Systems Integration...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 7 -- Acquiring Information...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 8 -- Intelligence Analysis...
https://acc.dau.mil/UI/img/bo/plus.gif8.0. Introduction
https://acc.dau.mil/UI/img/bo/plus.gif8.1. Threat Intelligence Support
https://acc.dau.mil/UI/img/bo/plus.gif8.2. Signature and other Intelligence...
https://acc.dau.mil/UI/img/bo/plus.gif8.3. Support to the Intelligence...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 9 -- Test and Evaluation (T&E)
https://acc.dau.mil/UI/img/bo/plus.gifChapter 10 -- Decisions Assessments and...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 11 -- Program Management...
https://acc.dau.mil/UI/img/bo/plus.gif11.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif11.1. Joint Programs
https://acc.dau.mil/UI/img/bo/plus.gif11.2. International Programs
https://acc.dau.mil/UI/img/bo/plus.gif11.3. Integrated Program Management
https://acc.dau.mil/UI/img/bo/plus.gif11.4. Knowledge-Based Acquisition
https://acc.dau.mil/UI/img/bo/plus.gif11.5. Technical Representatives at...
https://acc.dau.mil/UI/img/bo/plus.gif11.6. Contractor Councils
https://acc.dau.mil/UI/img/bo/plus.gif11.7 Property
https://acc.dau.mil/UI/img/bo/plus.gif11.8. Modeling and Simulation (M&S)...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 12 - Defense Business System...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 13 -- Program Protection
https://acc.dau.mil/UI/img/bo/plus.gif13.0 Overview
https://acc.dau.mil/UI/img/bo/plus.gif13.1 The Program Protection Process
https://acc.dau.mil/UI/img/bo/plus.gif13.2 The Program Protection Plan (PPP)
https://acc.dau.mil/UI/img/bo/plus.gif13.3 Critical Program Information (CPI)...
https://acc.dau.mil/UI/img/bo/plus.gif13.4. Intelligence and...
https://acc.dau.mil/UI/img/bo/plus.gif13.5. Vulnerability Assessment
https://acc.dau.mil/UI/img/bo/plus.gif13.6. Risk Assessment
https://acc.dau.mil/UI/img/bo/plus.gif13.7. Countermeasures
https://acc.dau.mil/UI/img/bo/plus.gif13.8. Horizontal Protection
https://acc.dau.mil/UI/img/bo/plus.gif13.9. Foreign Involvement
https://acc.dau.mil/UI/img/bo/plus.gif13.10. Managing and Implementing PPPs
https://acc.dau.mil/UI/img/bo/plus.gif13.11. Compromises
https://acc.dau.mil/UI/img/bo/plus.gif13.12. Costs
https://acc.dau.mil/UI/img/bo/plus.gif13.13. Contracting
https://acc.dau.mil/UI/img/bo/plus.gif13.14. Detailed System Security...
https://acc.dau.mil/UI/img/bo/plus.gif13.15. Program Protection Plan (PPP)...
https://acc.dau.mil/UI/img/bo/plus.gif13.16. Program Protection Plan (PPP)...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 14 -- Acquisition of Services
https://acc.dau.mil/UI/img/bo/plus.gif14.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif14.1. Introduction to the Acquisition of...
https://acc.dau.mil/UI/img/bo/plus.gif14.2. The Planning Phase
https://acc.dau.mil/UI/img/bo/plus.gif14.3. The Development Phase
https://acc.dau.mil/UI/img/bo/plus.gif14.4. The Execution Phase
https://acc.dau.mil/UI/img/bo/plus.gifAppendix A -- REQUIREMENTS ROADMAP...
https://acc.dau.mil/UI/img/bo/plus.gifAppendix B -- SERVICE ACQUISITION...
https://acc.dau.mil/UI/img/bo/plus.gifAppendix C -- SERVICE ACQUISITION MALL...
https://acc.dau.mil/UI/img/bo/plus.gifAppendix D -- MARKET RESEARCH RESOURCES
https://acc.dau.mil/UI/img/bo/plus.gifAppendix E -- GLOSSARY
https://acc.dau.mil/UI/img/bo/plus.gifDoD Directive 5000.01
https://acc.dau.mil/UI/img/bo/plus.gifDoD Instruction 5000.02
https://acc.dau.mil/UI/img/bo/minus.gifRecent Policy and Guidance
https://acc.dau.mil/UI/img/bo/plus.gifDownload the Defense Acquisition...
https://acc.dau.mil/UI/img/bo/plus.gifWeapon Systems Acquisition Reform Act of...
https://acc.dau.mil/UI/img/bo/plus.gifCurrent JCIDS Manual and CJCSI 3170.01 I
https://acc.dau.mil/UI/img/bo/plus.gifDefense Acquisition Guidebook Key...
ACC Practice Center Version 3.2
  • Application Build 3.2.9
  • Database Version 3.2.9