Click here
      Home    DAG Tutorial    Search    Available Downloads     Feedback
 
The DAG does not reflect the changes in the DoDI5000.02. Work is in progress to update the content and will be completed as soon as possible.
 
.

7.0. Overview

Topic
Previous Page Next Page

Previous and Next Page arrows

DEFENSE ACQUISITION GUIDEBOOK
Chapter 7 - Acquiring Information Technology

7.0. Overview

7.0.1. Purpose

7.0.2. Contents

7.0.1. Purpose

The goal of this chapter is to help program managers (PMs) and Sponsors/Domain Owners implement Department of Defense (DoD) policies intended to achieve fundamentally joint, net-centric, distributed forces capable of rapid decision superiority and massed effects across the battle space. This chapter explains how the DoD is using a net-centric strategy to transform DoD warfighting, business, and intelligence capabilities. The chapter provides descriptions and explanations of many of the associated topics and concepts. This chapter also discusses many of the activities that enable the development of net-centric systems, however, not all activities are the direct responsibility of the PM. Many activities reflect Department-level effort that occurs prior to, or outside of, the acquisition process. The detailed discussions of such a broad set of activities are presented here to help the PM understand the context of the capabilities described in the Joint Capabilities Integration and Development System (JCIDS) documents and required of the system under development.

7.0.2. Contents

This chapter contains ten sections that present the Program Manager with a comprehensive review of topics, concepts, and activities associated with the acquisition of Information Technology (IT), including National Security Systems (NSS).

Section 7.1, "Introduction," explains net-centric information sharing in the context of the discussions and requirements outlined in the various other sections of this chapter.

Section 7.2, "DoD Information Enterprise (DoD IE)," explains several important concepts that provide a foundation for acquiring net-centric Information Technology (including NSS). The overarching concept is that the DoD Enterprise Architecture (DoD EA) is used to describe and document current and desired relationships among warfighting operations, business, and management processes, the entities involved, and the information used. The IT architectures (i.e., IT solutions) are then aligned with the DoD EA.

DoD Architecture Framework (DoDAF) views that comprise architectures that are the DoD EA, and the DoD EA as a whole:

  • Describe existing and desired capabilities.
  • Provide a basis for interoperability and supportability reviews and certifications.
  • Provide required components of the Capability Development Document (CDD) and Capability Production Document (CPD).
  • Support portfolio management

The section discusses the DoD IEA and its role in helping PMs and Sponsors/Domain Owners describe their transition from the current environment to the future net-centric environment. Sections 7.3 through 7.10 elaborate on specific areas on which the Sponsors/Domain Owners and PMs should focus as they work to deliver and improve the reach, richness, agility, and assurance of net-centric capabilities.

Section 7.3, "Interoperability and Supportability of Information Technology and National Security Systems," explains interoperability and supportability, outlines the use of the Net-Ready Key Performance Parameter in these processes, and describes the process of building an Information Support Plan.

Section 7.4, "Sharing Data, Information, and Information Technology (IT) Service," provides guidance on implementing DoD Net-centric Data Strategy and Goals, and outlines Data, Information, and IT Services Sharing tasks as they relate to the acquisition process.

Section 7.5, "Information Assurance," explains the requirements for Information Assurance (IA) and provides links to resources to assist in developing an IA Strategy.

Section 7.6, "Electromagnetic Spectrum," offers a discussion and explanation of Spectrum Supportability.

Section 7.7, "Accessibility of Electronic and Information Technology," summarizes the requirements of the Workforce Investment Act of 1998, (Section 508 of the Rehabilitation Act (as amended in 1998)), regarding the procurement, development, maintenance, or use of electronics and IT that are accessible to people with disabilities.

Section 7.8, "Clinger-Cohen Act," helps PMs and Sponsors/Domain Owners understand how to implement Subtitle III of title 40 United States Code (formerly known as division E of the Clinger-Cohen Act (CCA) and hereinafter referred to as "Title 40/CCA") and associated regulatory requirements.

Section 7.9, "Post Deployment Reviews," discusses how the Department of Defense (DoD) uses the Post Implementation Review to inform Sponsors of the degree to which their IT/NSS investments closed the needed capability gaps.

Section 7.10, "Commercial, Off-The-Shelf (COTS) Solutions," provides insight into DoD guidance regarding acquisition of COTS software products.

In summary, this chapter should help PMs and Sponsors/Domain Owners understand and apply the tools of the DoD EA so that they can more effectively:

  • Describe and measure the degree to which their programs are interoperable and supportable with the DoD IE.
  • Ensure their programs employ and institutionalize approaches that make data visible, accessible, understandable, trusted, interoperable and responsive.
  • Achieve the Department's objectives for IA.
  • Ensure their programs will have assured interoperable access to electromagnetic spectrum.
  • Achieve these goals within the constraints of the law and where possible, through the use of commercially available solutions.

Previous and Next Page arrows

List of All Contributions at This Location

No items found.

Popular Tags

ACC Practice Center Version 3.2
  • Application Build 3.2.9
  • Database Version 3.2.9