Issues with Access to Acquisition Data and Information in the Department of Defense

Issues with Access to Acquisition Data and Information in the Department of Defense PDF Author: Megan McKernan
Publisher:
ISBN: 9780833099792
Category : Computers
Languages : en
Pages : 0

Get Book Here

Book Description
Acquisition data play a critical role in the management of the U.S. Department of Defense's (DoD's) portfolio of weapon systems. Controlled Unclassified Information (CUI) labels are one of the key methods for protecting sensitive information from disclosure along with appropriate information security. Mandatory U.S. government-wide policies governing handling of unclassified acquisition information exist because of concerns about exploitation by sophisticated adversaries. Executive Order 13556, signed by then-President Barack Obama on November 4, 2010, established a government-wide program for managing CUI, which includes personally identifiable information, proprietary business information, and law enforcement investigation information, among others. As the CUI executive agent, the National Archives and Records Administration is responsible for addressing over 100 ways of characterizing CUI, which it has done in the September 2016 CUI Federal Register. The rules in this register came into effect on November 14, 2016. This report provides a closer look at the current state of the CUI program as well as how the new CUI rules might affect DoD acquisition data management. We found a high degree of overlap in the content, if not the nomenclature, of past and present CUI labels used for acquisition data, but the problem going forward is translating policy into practice.

Issues with Access to Acquisition Data and Information in the Department of Defense

Issues with Access to Acquisition Data and Information in the Department of Defense PDF Author: Megan McKernan
Publisher:
ISBN: 9780833099792
Category : Computers
Languages : en
Pages : 0

Get Book Here

Book Description
Acquisition data play a critical role in the management of the U.S. Department of Defense's (DoD's) portfolio of weapon systems. Controlled Unclassified Information (CUI) labels are one of the key methods for protecting sensitive information from disclosure along with appropriate information security. Mandatory U.S. government-wide policies governing handling of unclassified acquisition information exist because of concerns about exploitation by sophisticated adversaries. Executive Order 13556, signed by then-President Barack Obama on November 4, 2010, established a government-wide program for managing CUI, which includes personally identifiable information, proprietary business information, and law enforcement investigation information, among others. As the CUI executive agent, the National Archives and Records Administration is responsible for addressing over 100 ways of characterizing CUI, which it has done in the September 2016 CUI Federal Register. The rules in this register came into effect on November 14, 2016. This report provides a closer look at the current state of the CUI program as well as how the new CUI rules might affect DoD acquisition data management. We found a high degree of overlap in the content, if not the nomenclature, of past and present CUI labels used for acquisition data, but the problem going forward is translating policy into practice.

Issues with Access to Acquisition Data and Information in the Department of Defense

Issues with Access to Acquisition Data and Information in the Department of Defense PDF Author:
Publisher:
ISBN:
Category : Electronic books
Languages : en
Pages : 15

Get Book Here

Book Description
Acquisition data underpin the management and oversight of the U.S. defense acquisition portfolio. However, balancing security and transparency has been an ongoing challenge. Some acquisition professionals are not getting the data they need to perform their assigned duties or are not getting the data and information in an efficient manner. To help guide the Office of the Secretary of Defense (OSD) in addressing these problems, the RAND Corporation identified access problems at the OSD level - including those organizations that require access to data and information to support OSD, such as analytic support federally funded research and development centers and direct support contractors - and evaluated the role of policy in determining access. Issues with Access to Acquisition Data and Information in the Department of Defense finds that the process for gaining access to data is inefficient and may not provide access to the best data to support analysis, and that OSD analytic groups and support contractors face particular challenges in gaining access to data. Given the inherent complexity in securing data and sharing data, any solutions to problems associated with data sharing must be well thought out to avoid the multitude of unintended consequences that could arise.

Issues with Access to Acquisition Data and Information in the Department of Defense

Issues with Access to Acquisition Data and Information in the Department of Defense PDF Author: Megan McKernan
Publisher:
ISBN: 9780833097552
Category : Computers
Languages : en
Pages : 0

Get Book Here

Book Description
This report examines Department of Defense acquisition data and the information systems where it resides and offers insights into improving the management, availability, and usefulness of this information.

Issues with Access to Acquisition Data and Information in the Department of Defense

Issues with Access to Acquisition Data and Information in the Department of Defense PDF Author: Megan McKernan
Publisher:
ISBN: 9780833095961
Category :
Languages : en
Pages : 80

Get Book Here

Book Description


Issues with Access to Acquisition Information in the Department of Defense

Issues with Access to Acquisition Information in the Department of Defense PDF Author: Jeffrey A. Drezner
Publisher:
ISBN: 9781977403582
Category : Computers
Languages : en
Pages : 0

Get Book Here

Book Description
This research identifies and describes some of the issues related to managing acquisition program information in the emerging acquisition environment resulting from statutory changes within the Department of Defense acquisition community.

Assessing Department of Defense Use of Data Analytics and Enabling Data Management to Improve Acquisition Outcomes

Assessing Department of Defense Use of Data Analytics and Enabling Data Management to Improve Acquisition Outcomes PDF Author: Philip S. Anton
Publisher:
ISBN: 9781977403261
Category : Computers
Languages : en
Pages : 170

Get Book Here

Book Description
Congress asked about acquisition data analytics in the Department of Defense. This report identifies and measures capabilities and recent progress. Barriers to improvement include a culture against data sharing due to security and burden concerns.

Testing of Defense Systems in an Evolutionary Acquisition Environment

Testing of Defense Systems in an Evolutionary Acquisition Environment PDF Author: National Research Council
Publisher: National Academies Press
ISBN: 0309101352
Category : Technology & Engineering
Languages : en
Pages : 76

Get Book Here

Book Description
The Department of Defense (DoD) recently adopted evolutionary acquisition, a dynamic strategy for the development and acquisition of its defense systems. Evolutionary defense systems are planned, in advance, to be developed through several stages in a single procurement program. Each stage is planned to produce a viable system which could be fielded. The system requirements for each stage of development may be specified in advance of a given stage or may be decided at the outset of that stage's development. Due to the different stages that comprise an evolutionary system, there exists a need for careful reexamination of current testing and evaluation policies and processes, which were designed for single-stage developments. The Office of the Under Secretary of Defense for Acquisition, Technology and Logistics (USD-AT&L) and the Director of Operational Testing and Evaluation (DOT&E) asked the Committee on National Statistics (CNSTAT) of the National Academies to examine the key issues and implications for defense testing from the introduction of evolutionary acquisition. The CNSTAT was charged with planning and conducting a workshop to study test strategies for the evolutionary acquisition. The committee reviewed defense materials defining evolutionary acquisition and interviewed test officials from the three major test service agencies to understand the current approaches used in testing systems procured through evolutionary acquisition. The committee also examined possible alternatives to identify problems in implementation. At the workshop that took place on December 13-14, 2004, the committee tried to answer many questions including: What are the appropriate roles and objectives for testing in an evolutionary environment?, Can a systematic, disciplined process be developed for testing and evaluation in such a fluid and flexible environment?, and Is there adequate technical expertise within the acquisition community to fully exploit data gathered from previous stages to effectively combine information from various sources for test design and analysis?. Testing of Defense Systems in an Evolutionary Acquisition Environment provides the conclusions and recommendations of the CNSTAT following the workshop and its other investigations.

Assessing Department of Defense Use of Data Analytics and Enabling Data Management to Improve Acquisition Outcomes

Assessing Department of Defense Use of Data Analytics and Enabling Data Management to Improve Acquisition Outcomes PDF Author: Philip S. Antón
Publisher:
ISBN:
Category : Data mining
Languages : en
Pages : 125

Get Book Here

Book Description
"In the conference report accompanying the National Defense Authorization Act for Fiscal Year 2017, Congress expressed concern that the U.S. Department of Defense (DoD) "does not sufficiently incorporate data into its acquisition-related learning and decision-making" and asked six questions about "the use of data analysis, measurement, and other evaluation-related methods in DoD acquisition programs." In this report, the authors decompose and measure acquisition functions, data governance, and training to assess how data and associated analytics support DoD acquisition decision making. The authors found that the DoD is applying a breadth of data analytics to acquisition. Capabilities range from simple data archives and plotting to archives integrated with commercial analytic tools. The DoD has implemented an array of data governance and management practices, but major challenges remain, including a culture against data sharing and concerns about security and oversight burden. Some commercial breakthroughs in advanced analytics sound promising for DoD acquisition, but some might not be applicable; research is ongoing. Advancement should include developing a data analytics strategy across acquisition domains, expanding data governance and data sharing, and continuing to expand and mature data collection, access, and analytic layers. Also, mechanisms are needed to authorize and ensure protected access to data for both the DoD and external analysts. Improved incentives and understanding of data analytics could encourage decision makers to make better use of capabilities" -- Publisher's description.

Department of Defense Policies and Procedures for the Acquisition of Information Technology

Department of Defense Policies and Procedures for the Acquisition of Information Technology PDF Author:
Publisher: DIANE Publishing
ISBN: 1437917151
Category : Technology & Engineering
Languages : en
Pages : 109

Get Book Here

Book Description
This report examines the challenges facing the DoD in acquiring information technology (IT) and offers recommendations to improve current circumstances. The fundamental problem DoD faces is that the deliberate process through which weapon systems and IT are acquired does not match the speed at which new IT capabilities are being introduced in today¿s information age. Consequently, the principal recommendation of the study is that DoD needs a new acquisition system for IT. Roles and responsibilities for those involved in the acquisition process must be clarified and strengthened and the IT system acquisition skills required in the workforce must also be strengthened. Illustrations.

Achieving Effective Acquisition of Information Technology in the Department of Defense

Achieving Effective Acquisition of Information Technology in the Department of Defense PDF Author: National Research Council
Publisher: National Academies Press
ISBN: 0309148286
Category : Technology & Engineering
Languages : en
Pages : 164

Get Book Here

Book Description
In the military, information technology (IT) has enabled profound advances in weapons systems and the management and operation of the defense enterprise. A significant portion of the Department of Defense (DOD) budget is spent on capabilities acquired as commercial IT commodities, developmental IT systems that support a broad range of warfighting and functional applications, and IT components embedded in weapons systems. The ability of the DOD and its industrial partners to harness and apply IT for warfighting, command and control and communications, logistics, and transportation has contributed enormously to fielding the world's best defense force. However, despite the DOD's decades of success in leveraging IT across the defense enterprise, the acquisition of IT systems continues to be burdened with serious problems. To address these issues, the National Research Council assembled a group of IT systems acquisition and T&E experts, commercial software developers, software engineers, computer scientists and other academic researchers. The group evaluated applicable legislative requirements, examined the processes and capabilities of the commercial IT sector, analyzed DOD's concepts for systems engineering and testing in virtual environments, and examined the DOD acquisition environment. The present volume summarizes this analysis and also includes recommendations on how to improve the acquisition, systems engineering, and T&E processes to achieve the DOD's network-centric goals.