Click Here for SharePoint 2013 Migration Information and News
Click here   image of a classical greek architecture representing DAU's strength as a business university instructing in DoD Acquisition
HomeContactAbout ACCPrivacyTutorialDoD CertificateReport an Issue  
.

CCA Implementation

Community
Welcome

CCA Implementation Risk-Based Oversight CCA Task Guidance CCA in the Acquisition Lifecycle CCA Compliance Confirmation Make a determination that the acquisition supports core, priority functions of the Department. Determine that no private sector or government source can better support the function. Redesign the process that the system supports to reduce costs, improve effectiveness and maximize the use of COTS technology. Establish Outcome-based Measures of Effectiveness, sometimes referred to as outcome-based performance measures, which are linked to strategic goals. There are clearly established measures and accountability for program progress. An Analysis of Alternatives has been conducted. An Economic Analysis has been conducted that includes a calculation of the return on investment; or for non-AIS programs, a Life-Cycle Cost Estimate (LCCE) has been conducted. The acquisition is consistent with the Global Information Grid policies and architecture, to include relevant standards. The Program has an Information Assurance strategy that is consistent with DoD policies, standards and architectures, to include relevant standards. To the maximum extent practicable, (1)modular contracting has been used, and (2) the program is being implemented in phased, successive increments, each of which meets part of the mission need and delivers measurable Benefit, independent of future increments The system being acquired is registered. A Post Implementation Review has been conducted. In DoDI 5000.2 this is referred to as a Post Deployment Production Review (PDPR). The CCA Policy Area provides a bibliography of all policy documents, applicable memos, federal laws and statutes for CCA certification and confirmation. Training Center Community Connection


Update:

The Defense Appropriations Act for FY 2009 (Public Law 110-329) did not reenact the provisions contained in the FY 2008 Act (Section 8068(c)).

As stated in the DoD CIO Memorandum, Clinger-Cohen Act (CCA) Compliance of Major Automated Informations (MAIS) for Fiscal Year (FY) 2009, March 24, 2009, DoD Component CIOs will, however, follow the guidance in Enclosure 5 to the DoD Instruction 5000.02, Operation of Defense Acquisition System, dated December 8, 2008, which states that for all programs that acquire information technology (IT), including a National Security System (NSS), at any Acquisition Category level, the Milestone Decision Authority shall not initiate a program or an increment of a program, or approve entry into any phase of the acquistion process, and the DoD Component shall not award a contract until:

  • The sponsoring DoD Component or PM has satisfied the requirements of Title 40/CCA;
  • The DoD Component CIO, or designee, confirms Titile 40/CCA compliance; and
  • For Major Defense Acquisition Programs and MAIS programs only, the DoD CIO also confirms Title 40/CCA compliance.

News: Risk-based Oversight for Title 40/CCA Compliance: This policy memorandum implements a risk-based approach for oversight of the requirements of Subtitle III of Title 40 of the United States Code (formally Division E of the Clinger-Cohen Act of 1996) for Major Automated Information Systems (MAISs) and Major Defense Acquisition Programs (MDAPS) in the Department of Defense. This policy is part of the evolving implementation of Title 40/CCA aimed at De-centralizing oversight, maximizing up-front involvement in the Information Technology (IT) investment process, and alleviating redundancies. Download the Policy.

Overview: The Clinger-Cohen Act Implementation Special Interest Area is dedicated to collecting and disseminating information about the Clinger-Cohen Act (CCA). CCA is a law that codifies best practices for the Program Management of IT Programs, and applies to all IT systems including National Security Systems (NSS). The requirement for CCA confirmation includes all ACAT programs.


Highlights

List of All Contributions at this location

Helpful Title Type Contributor Date Modified Popularity
0
Related Websites
Private
2016-5-3
125
0
Announcement
Private
2016-5-3
42
0
Related Websites
Private
2016-4-29
48
0
Related Websites
Private
2016-4-29
22
0
References
Private
2016-4-25
202
0
References
Private
2016-1-25
196
0
References
Private
2016-1-25
193
0
References
Private
2016-1-22
156
0
References
Private
2016-1-22
155
0
Tools & Forms
Private
2015-3-31
13
0
Highlight
Private
2015-3-10
--
0
Regulatory
Private
2015-3-10
103
0
Highlight
Private
2015-3-10
--
0
Presentations
Private
2015-3-10
100
0
Presentations
Private
2015-3-10
52
0
References
Private
2015-3-10
25
0
References
Private
2015-3-10
24
0
References
Private
2015-3-10
50
0
References
Private
2015-3-10
23
0
References
Private
2015-3-10
49
0
References
Private
2015-2-11
53
0
Highlight
Private
2009-12-1
--
0
Presentations
Private
2006-6-17
51
Found 23 records

Popular Tags

Page Information

In This Community:
3387502 Page Views 9 Pages Emailed
749 Meta-cards Views 78 Documents and Videos
24 Questions 148694 Attachments Downloaded
12 Answers 0 Videos Downloaded
4 Relationships and Highlights
ID102094
Date CreatedSaturday, June 17, 2006 8:40 AM
Date ModifiedTuesday, September 28, 2010 5:19 PM
Version Comment:

REQUEST AN ACCOUNT Benefits of Membership I Forgot My Login Information
ACC Practice Center Version 3.2
  • Application Build 3.2.9
  • Database Version 3.2.9