Click here
      Home    DAG Tutorial    Search    Available Downloads     Feedback
 
The DAG does not reflect the changes in the DoDI5000.02. Work is in progress to update the content and will be completed as soon as possible.
 
.

4.3.8. Technical Data Management Process

Topic

Previous and Next Page arrows

DEFENSE ACQUISITION GUIDEBOOK
Chapter 4 -- Systems Engineering

4.3.8. Technical Data Management Process

4.3.8. Technical Data Management Process

Through the Technical Data Management process, the program identifies, acquires, manages, maintains, and ensures access to the technical data and computer software required to manage and support a system throughout the acquisition life cycle. Key Technical Data Management considerations include understanding and protecting Government intellectual property and data rights, achieving competition goals, maximizing options for product support, and enabling performance of downstream life-cycle functions. DoDI 5000.02 contains Technical Data Management requirements for Acquisition Category (ACAT) I and II programs.

Effective acquisition, upgrades, and management of product data provide:

  • Information necessary to understand and evaluate system designs throughout the life cycle
  • Ability to operate and sustain weapon systems under a variety of changing technical, operational, and programmatic environments
  • Ability to re-compete item acquisition, upgrades, and sustainment activities in the interest of achieving cost savings; the lack of product data and/or data rights often makes it difficult or impossible to award contracts to anyone other than the original manufacturer, thereby taking away much or all of the Government’s ability to reduce total ownership costs (TOC)

Activities and Products

The Program Manager and Systems Engineer, in conjunction with the Product Support Manager, should ensure that life-cycle requirements for weapon system-related data products and data rights are identified early and that appropriate contract provisions are put in place to enable deliveries of these products. Figure 4.3.8.F1 shows the activities associated with Technical Data Management, including:

- Identify Data Requirements

  • Formulate the program’s Technical Data Rights Strategy (TDRS) and technical data management approach, with emphasis on technical and product data needed to support the product throughout its life cycle. (see DAG Chapter 2 Program Strategies for more information about Data Rights).
  • Ensure that data requirements are documented in the TDRS; summarized in the Technology Development Strategy (TDS), Acquisition Strategy (AS), and Life-Cycle Sustainment Plan (LCSP); and submitted at each milestone prior to award of the contract for the next life-cycle phase.
  • Consider not only the immediate, short-term costs of acquiring the needed technical data and data rights but also the long-term cost savings resulting from the ability to compete production and logistics support activities and reduce TOC. Understand that the Government can possess either Government Purpose or Unlimited Rights to use many types of technical data and data rights, at no additional cost, based on the type of technical data and the source of funding used to generate the data (see DoD Open Systems Architecture Contract Guidebook for Program Managers for more information about data rights).

- Acquire Data

  • Use explicit contract Statement of Work tasks to require the developer to perform the work that generates the required data. The content, format, and quality requirements should be specified in the contract.
  • Use current, approved Data Item Descriptions (DID) and Contract Data Requirements Lists (CDRL) in each contract to order the delivery of the required technical data and computer software.

- Receive, Verify, and Accept Data

  • Ensure verification of content, format, and quality of all required product-related data received from originators.
  • Inspect contractually ordered data deliverables to ensure markings are in accordance with the relevant data rights agreements and DFARS clauses, and contain appropriate distribution statements and/or export control statements.

Caution: Acceptance of delivered data not marked consistent with the contract can result in the Government “losing” legitimate rights to technical data and can incur significant legal liability on the Government and the individual Government employees. Regaining those rights generally requires costly and time-consuming legal actions.

- Store, Maintain, and Control Data

  • Budget for and fund the maintenance and upkeep of product data throughout the life cycle.
  • An Integrated Data Environment (IDE) or Product Life-cycle Management (PLM) system allows every activity involved with the program to create, store, access, manipulate, and exchange digital data.
  • To the greatest extent practical, programs should use existing IDE/PLM infrastructure such as repositories operated by Commodity Commands and other organizations. (Program-unique IDEs are discouraged because the high infrastructure cost; further, multiple IDEs inhibit access, sharing, and reuse of data across programs.)
  • Ensure all changes to the data are made in a timely manner and are documented in the program IDE or PLM system.

- Use and Exchange Data

Plan for and establish methods for access and reuse of product data by all personnel and organizations that perform life-cycle support activities.

Figure 4.3.8.F1. Data Management Activities

Figure 4.3.8.F1. Data Management Activities

In support of the Government’s requirement for a Technical Data Package (TDP), the Program Manager should also consider all product related data (e.g., technical manuals, repair instructions, and design/analysis data) to:

  • Allow logistics support activities
  • Better enable sustainment engineering
  • Apply, implement and manage product upgrades

Contractually deliverable data should be identified and ordered at the specific “data product” level, e.g., two-dimensional drawings, three-dimensional Computer-Aided Design (CAD) models, technical manuals, etc. Figure 4.3.8.F2 provides a notional representation of different types of product-related data.

Caution: Program Managers and Systems Engineers should be aware that terms such as “technical data,” “product data,” and “TDP” are imprecise, not equivalent, and often incorrectly used interchangeably.

Resources for establishing and conducting Technical Data Management activities include but are not limited to:

Figure 4.3.8.F2. Data Taxonomy

Figure 4.3.8.F2. Data Taxonomy

- Data Protection

The Program Manager is responsible for protecting system data, whether the data is stored and managed by the Government or by contractors. The DoD policy with regard to data protection, marking, and release can be found in:

Data containing information subject to restrictions are protected in accordance with the appropriate guidance, contract, or agreement. Guidance on distribution statements, restrictive markings, and restrictions on use, release, or disclosure, of data can be found in the DFARS Part 252.227-7013 and 7014, and DoDI 5230.24.

When digital data is used, the data should display applicable restriction markings, legends, and distribution statements clearly visible when the data is first opened or accessed. These safeguards not only ensure Government compliance regarding the use of data but also guarantee and safeguard contractor data delivered to the Government, and extend responsibilities of data handling and use to parties who subsequently use the data.

Section 208 of Public Law 107-347 and DoD Privacy Impact Assessment (PIA) guidance requires that PIA be conducted prior to developing or purchasing any DoD information system that collect, maintain, use, or disseminate personally identifiable information about members of the public, federal personnel, DoD contractors and, in some cases, foreign nationals. Available PIA guidance provides procedures for completing and approving PIAs. For further information, see DAG Chapter 7 Acquiring Information Technology, Including National Security Systems.

All data deliverables should include distribution statements. Processes should be established to protect all data that contain critical technology information, as well as ensure that limited distribution data, intellectual property data, or proprietary data is properly handled throughout the life cycle, whether the data are in hard-copy or digital format.

Previous and Next Page arrows

Previous Page Next Page

List of All Contributions at This Location

No items found.

Popular Tags

Browse

https://acc.dau.mil/UI/img/bo/minus.gifWelcome to the Defense Acquisition...
https://acc.dau.mil/UI/img/bo/plus.gifForeword
https://acc.dau.mil/UI/img/bo/plus.gifChapter 1 -- Department of Defense...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 2 -- Program Strategies
https://acc.dau.mil/UI/img/bo/minus.gifChapter 3 -- Affordability and...
https://acc.dau.mil/UI/img/bo/plus.gif3.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif3.1. Life-Cycle Costs/Total Ownership...
https://acc.dau.mil/UI/img/bo/plus.gif3.2. Affordability
https://acc.dau.mil/UI/img/bo/plus.gif3.3. Analysis of Alternatives
https://acc.dau.mil/UI/img/bo/plus.gif3.4. Cost Estimation for Major Defense...
https://acc.dau.mil/UI/img/bo/minus.gif3.5. Manpower Estimates
https://acc.dau.mil/UI/img/bo/plus.gif3.6. Major Automated Information Systems...
https://acc.dau.mil/UI/img/bo/plus.gif3.7. Principles for Life-Cycle Cost...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 4 -- Systems Engineering
https://acc.dau.mil/UI/img/bo/minus.gif4.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif4.1. Introduction
https://acc.dau.mil/UI/img/bo/plus.gif4.2. Systems Engineering Activities in...
https://acc.dau.mil/UI/img/bo/minus.gif4.3. Systems Engineering Processes
https://acc.dau.mil/UI/img/bo/minus.gif4.3.2. Technical Planning Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.2.1. Work Breakdown Structure
https://acc.dau.mil/UI/img/bo/plus.gif4.3.2.2. Integrated Master...
https://acc.dau.mil/UI/img/bo/minus.gif4.3.3. Decision Analysis Process
https://acc.dau.mil/UI/img/bo/minus.gif4.3.4. Technical Assessment Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.4.1. Technical Measurement and...
https://acc.dau.mil/UI/img/bo/plus.gif4.3.4.2. Technical Performance Measures
https://acc.dau.mil/UI/img/bo/plus.gif4.3.4.3. Program Support Review
https://acc.dau.mil/UI/img/bo/plus.gif4.3.5. Requirements Management Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.6. Risk Management Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.7. Configuration Management Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.8. Technical Data Management Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.9. Interface Management Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.10. Stakeholder Requirements...
https://acc.dau.mil/UI/img/bo/plus.gif4.3.11. Requirements Analysis Process
https://acc.dau.mil/UI/img/bo/minus.gif4.3.12. Architecture Design Process
https://acc.dau.mil/UI/img/bo/minus.gif4.3.13. Implementation Process
https://acc.dau.mil/UI/img/bo/minus.gif4.3.14. Integration Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.15. Verification Process
https://acc.dau.mil/UI/img/bo/minus.gif4.3.16. Validation Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.17. Transition Process
https://acc.dau.mil/UI/img/bo/plus.gif4.3.18. Design Considerations
https://acc.dau.mil/UI/img/bo/plus.gif4.3.19. Tools Techniques and Lessons...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 5 -- Life-Cycle Logistics
https://acc.dau.mil/UI/img/bo/minus.gifChapter 6 -- Human Systems Integration...
https://acc.dau.mil/UI/img/bo/plus.gif6.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif6.1. Total System Approach
https://acc.dau.mil/UI/img/bo/plus.gif6.2 HSI - Integration Focus
https://acc.dau.mil/UI/img/bo/plus.gif6.3. Human Systems Integration Domains
https://acc.dau.mil/UI/img/bo/plus.gif6.4. Human Systems Integration (HSI)...
https://acc.dau.mil/UI/img/bo/plus.gif6.5. Manpower Estimates
https://acc.dau.mil/UI/img/bo/plus.gif6.6. Additional References
https://acc.dau.mil/UI/img/bo/minus.gifChapter 7 -- Acquiring Information...
https://acc.dau.mil/UI/img/bo/plus.gif7.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif7.1. Introduction
https://acc.dau.mil/UI/img/bo/plus.gif7.2. DoD Information Enterprise
https://acc.dau.mil/UI/img/bo/plus.gif7.3. Interoperability and Supportability...
https://acc.dau.mil/UI/img/bo/plus.gif7.4. Sharing Data, Information, and...
https://acc.dau.mil/UI/img/bo/plus.gif7.5. Information Assurance (IA)
https://acc.dau.mil/UI/img/bo/plus.gif7.6. Electromagnetic Spectrum
https://acc.dau.mil/UI/img/bo/plus.gif7.7. Accessibility of Electronic and...
https://acc.dau.mil/UI/img/bo/plus.gif7.8. The Clinger-Cohen Act (CCA) --...
https://acc.dau.mil/UI/img/bo/plus.gif7.9. Post-Implementation Review (PIR)
https://acc.dau.mil/UI/img/bo/plus.gif7.10. Commercial Off-the-Shelf (COTS)...
https://acc.dau.mil/UI/img/bo/plus.gif7.11. Space Mission Architectures
https://acc.dau.mil/UI/img/bo/plus.gifChapter 8 -- Intelligence Analysis...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 9 -- Test and Evaluation (T&E)
https://acc.dau.mil/UI/img/bo/minus.gifChapter 10 -- Decisions Assessments and...
https://acc.dau.mil/UI/img/bo/plus.gif10.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif10.1. Decision Points
https://acc.dau.mil/UI/img/bo/plus.gif10.2. Executive Review Forums
https://acc.dau.mil/UI/img/bo/plus.gif10.3. Integrated Product and Process...
https://acc.dau.mil/UI/img/bo/plus.gif10.4. Role of Exit Criteria
https://acc.dau.mil/UI/img/bo/plus.gif10.5. Role of Independent Assessments
https://acc.dau.mil/UI/img/bo/plus.gif10.5.3. Preliminary Design Review (PDR)...
https://acc.dau.mil/UI/img/bo/plus.gif10.6. Information Sharing and DoD...
https://acc.dau.mil/UI/img/bo/plus.gif10.7. Management Control
https://acc.dau.mil/UI/img/bo/plus.gif10.8. Program Plans
https://acc.dau.mil/UI/img/bo/plus.gif10.9. Acquisition Program Baseline (APB)
https://acc.dau.mil/UI/img/bo/plus.gif10.10. Periodic Reports
https://acc.dau.mil/UI/img/bo/plus.gif10.11. Major Automated Information...
https://acc.dau.mil/UI/img/bo/plus.gif10.12. Defense Acquisition Executive...
https://acc.dau.mil/UI/img/bo/plus.gif10.13. Acquisition Visibility
https://acc.dau.mil/UI/img/bo/plus.gif10.14. Special Interest Programs
https://acc.dau.mil/UI/img/bo/plus.gif10.15. Relationship of Affordability and...
https://acc.dau.mil/UI/img/bo/plus.gif10.16. Acquisition Program Transition...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 11 -- Program Management...
https://acc.dau.mil/UI/img/bo/plus.gif11.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif11.1. Joint Programs
https://acc.dau.mil/UI/img/bo/plus.gif11.2. International Programs
https://acc.dau.mil/UI/img/bo/plus.gif11.3. Integrated Program Management
https://acc.dau.mil/UI/img/bo/plus.gif11.4. Knowledge-Based Acquisition
https://acc.dau.mil/UI/img/bo/plus.gif11.5. Technical Representatives at...
https://acc.dau.mil/UI/img/bo/plus.gif11.6. Contractor Councils
https://acc.dau.mil/UI/img/bo/plus.gif11.7 Property
https://acc.dau.mil/UI/img/bo/plus.gif11.8. Modeling and Simulation (M&S)...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 12 - Defense Business System...
https://acc.dau.mil/UI/img/bo/plus.gif12.0 Overview
https://acc.dau.mil/UI/img/bo/plus.gif12.1 Business Capability Definition...
https://acc.dau.mil/UI/img/bo/plus.gif12.2 Investment Management (IM) Phase
https://acc.dau.mil/UI/img/bo/plus.gif12.3 Execution
https://acc.dau.mil/UI/img/bo/plus.gif12.4 DBS-specific Criteria
https://acc.dau.mil/UI/img/bo/plus.gif12.5 Tools and Methods
https://acc.dau.mil/UI/img/bo/minus.gifChapter 13 -- Program Protection
https://acc.dau.mil/UI/img/bo/plus.gif13.0 Overview
https://acc.dau.mil/UI/img/bo/plus.gif13.1 The Program Protection Process
https://acc.dau.mil/UI/img/bo/plus.gif13.2 The Program Protection Plan (PPP)
https://acc.dau.mil/UI/img/bo/plus.gif13.3 Critical Program Information (CPI)...
https://acc.dau.mil/UI/img/bo/plus.gif13.4. Intelligence and...
https://acc.dau.mil/UI/img/bo/plus.gif13.5. Vulnerability Assessment
https://acc.dau.mil/UI/img/bo/plus.gif13.6. Risk Assessment
https://acc.dau.mil/UI/img/bo/plus.gif13.7. Countermeasures
https://acc.dau.mil/UI/img/bo/plus.gif13.8. Horizontal Protection
https://acc.dau.mil/UI/img/bo/plus.gif13.9. Foreign Involvement
https://acc.dau.mil/UI/img/bo/plus.gif13.10. Managing and Implementing PPPs
https://acc.dau.mil/UI/img/bo/plus.gif13.11. Compromises
https://acc.dau.mil/UI/img/bo/plus.gif13.12. Costs
https://acc.dau.mil/UI/img/bo/plus.gif13.13. Contracting
https://acc.dau.mil/UI/img/bo/plus.gif13.14. Detailed System Security...
https://acc.dau.mil/UI/img/bo/plus.gif13.15. Program Protection Plan (PPP)...
https://acc.dau.mil/UI/img/bo/plus.gif13.16. Program Protection Plan (PPP)...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 14 -- Acquisition of Services
https://acc.dau.mil/UI/img/bo/plus.gif14.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif14.1. Introduction to the Acquisition of...
https://acc.dau.mil/UI/img/bo/plus.gif14.2. The Planning Phase
https://acc.dau.mil/UI/img/bo/plus.gif14.3. The Development Phase
https://acc.dau.mil/UI/img/bo/plus.gif14.4. The Execution Phase
https://acc.dau.mil/UI/img/bo/plus.gifAppendix A -- REQUIREMENTS ROADMAP...
https://acc.dau.mil/UI/img/bo/plus.gifAppendix B -- SERVICE ACQUISITION...
https://acc.dau.mil/UI/img/bo/plus.gifAppendix C -- SERVICE ACQUISITION MALL...
https://acc.dau.mil/UI/img/bo/plus.gifAppendix D -- MARKET RESEARCH RESOURCES
https://acc.dau.mil/UI/img/bo/plus.gifAppendix E -- GLOSSARY
https://acc.dau.mil/UI/img/bo/minus.gifDoD Directive 5000.01
https://acc.dau.mil/UI/img/bo/plus.gifENCLOSURE 1 ADDITIONAL POLICY
https://acc.dau.mil/UI/img/bo/plus.gifDoD Instruction 5000.02
https://acc.dau.mil/UI/img/bo/plus.gifRecent Policy and Guidance
https://acc.dau.mil/UI/img/bo/plus.gifCurrent JCIDS Manual and CJCSI 3170.01 I
https://acc.dau.mil/UI/img/bo/minus.gifDefense Acquisition Guidebook Key...
ACC Practice Center Version 3.2
  • Application Build 3.2.9
  • Database Version 3.2.9