(71V5RG�͘�Љ$�o�b��u������I��f�&h��:a(昴$� �:��ⴗ�^�#����)��� �Wk���m&l�~�}X�A�0��A$�k8��^'h$�s���]3��nm���X©:B�ƫ�z�Dv�88�$y'�0X����oџ��I[��/90D�%���b�M���0Kܧi�ޝ�O�� ��6��>9�"�����1@�Z�{W�\�y���o��l�۠������F��kk�!�,�|#�!����"��$
��@^�R�dD�zMn���Ӥ|&��}���(^9���V��;S�ϻ�|��?Ow����aC@8�V���y�.�`�9����LG��E��1�G�w�y��a�#NK?�����2�Csl���l�R~GY�أ��s��37����s�)E?��N�`qv�%�.M�: 0000000842 00000 n
provided with the data needed to support the review, but they will also work to minimize the overhead burden placed on the DoD Components, PEOs, program managers, and their staffs. They underlie a comprehensive strategy that encompasses Federal and Federally-sponsored program, statistical, and mission-support data . Reinforcing America’s traditional tools of diplomacy, the Department provides military Using data-driven analysis linked to the National Defense Strategy, OUSD(A&S) scales to enable new product and process development and supports a culture of innovation, critical thinking, and creative compliance. of the DoD Cyber Strategy, which is the authoritative reference document relevant to the development of manning, training, equipping, and integrating full spectrum cyberspace operations into DoD policy, plans, and programs. 1 Data-centric. Data … b. The data provided in the reports serve as the foundation and catalyst for future sexual assault prevention, training, victim care, and accountability goals. DoD Digital Modernization Strategy 6/5/2019 Page 3 Foreword The global threat landscape is constantly evolving and remaining competitive and modernizing our digital environment for great power competition is imperative for the Department of Defense. The Department of Defense Fiscal Year 2019 Annual Report on Sexual Assault in the Military was provided to Congress on April 30, 2020. B. H�*��wSp�� The Department of Defense Cyber Strategy 4 develop advanced capabilities. {U�����r�jY&�0��dD������z\�6+�h�y���$g��E"1��.�t��e����P�5��y�[���2�( \U�Zƿ��X����ّ� L^���l� ��hȚP�m�K�ğQ�0PU�ۢ��;z��$�V%bo���G�8�}�&ra���
�:T���\:�;pO�ץl��CYr��e^. 0000000589 00000 n
%PDF-1.6
%����
;��t �l0��_���, �nK�. �ք"�^n����0�# capabilities and the goals of the DoD Net-Centric Data Strategy, the DCIP Geospatial Data Strategy establishes a vision for creation and maintenance of a common and comprehensive foundation of geospatial infrastructure data that leverages the very best data sources and tools available for DCIP and DoD … �$�J��5XoOqr4�1]��ݡ ��:ڬ�t����l/��,ޠb�t�s�\�����Ú5��!fcC������q�%������_5. They inform the Practices and Action Plan . DoD Net -Centric Data Strategy 2 The traditional DoD approach to data has been data administration. DoD data, information, and information technology (IT) services pursuant to References (n), (o), and DoDI 8551.01 (Reference (p)). (��h-�� �-�`�>`an�x~V|X�F���B�/ג$��(Vo��ka���K,8U?A����.���
endstream
endobj
170 0 obj
471
endobj
164 0 obj
<<
/Type /Page
/Parent 153 0 R
/Resources 165 0 R
/Contents 166 0 R
/MediaBox [ 0 0 607 792 ]
/CropBox [ 0 0 607 792 ]
/Rotate 0
>>
endobj
165 0 obj
<<
/ProcSet [ /PDF /ImageB ]
/XObject << /Im1 168 0 R >>
/ExtGState << /GS1 167 0 R >>
>>
endobj
166 0 obj
<< /Length 47 /Filter /FlateDecode >>
stream
the overarching VA -DoD strategy described in the JSP Strategic Framework. @#Qw����B�f� &�?�_غ�Vs�56a��`}>��^�2C�'w��67G張�@���v�{��Q�5I��ɕ�WG���47x��O_����|jokL�- Z����Aq�e�bnh��s��G�D^�y�(�>�k������B�C�)"��D�{�*nX>)ion?��|9��E^8� ��qOZ.ǵc,��\�ԧ�sp3����L �!c��T
?SK���� x��X�l���mz�������-��ˆc��V��,�V&8�̢�iK��n8���H����g� +��g��{S�l�bꮾ�4�2v��|���0h�Ň5k'�4��"����w�sӯ��&. %PDF-1.4
%����
V I S I O N A N D G U I D I N G P R I N C I P L E S 2.1. k%g�Q7�EJ����. �,1�s^�K�Ƌ�l����֊�
��2�3+���Գ~�b�E\����߱����b���ԓ��/
�xz�"����k���pD�v �N!��xoM���2J��KH��{��gze���6��:������tG����Y��3��ו��� �3@ϛ���,��z1���
�e����.�{|��ai�*��xpa�s�������e�)Bi���5�NKf)�_����օ����u��~g��|��i_Cs����'�M��o�3�'���MpZ!V� G9��(�l�zj��~����� Our framework addresses two key issues: It helps companies clarify the primary purpose of their data, and it guides them in strategic data management. ˣrr^ Ns��:i��/�]ɔ�O�a�}�(&O(��x�7+�!�����D�H1l����×Z��G��u;�9`@[�W跼rv�����`�:
�ߥCZ���s��X��� �uQnh�O�#�2|}����iUħ��wy��ތ�Qlێ S^�+ NATIONAL DEFENSE STRATEGY 1 INTRODUCTION The Department of Defense’s enduring mission is to provide combat-credible military forces needed to deter war and protect the security of our nation. Relationship Between Defense Acquisition, Requirements, and Budgeting Processes (1) Acquisition, requirements, and budgeting, are closely related and must operate 0000000684 00000 n
Components, as well as resulting BEI products, are to be considered DoD data, protected from unauthorized release, and shared in accordance with applicable data sharing and disclosure 810 0 obj
<>
endobj
Army CIO Lt. Gen. Bruce Crawford walked through the new strategy — essentially an updated version of the strategy the service issued in 2016 under Lt. […] This includes Major Defense Acquisition Programs (MDAPs) that have been identified as Defense Business Systems (DBS) by the chief management officer (CMO) in accordance with DODI 5000.75. As the U.S. adjusts to new great-power developments, the Army has revised its data strategy to reflect the need to move quickly and securely to leverage its information assets against adversaries. 0000001972 00000 n
We must act now to secure our future. 0000002051 00000 n
The Federal Data Strategy Principles serve as motivational guidelines . Data Management (DM) includes information about DoD data rights (IP Strategy), data elements, data sharing, Big Data (Data Analytics) and Data used during the O&S phase of acquisition. If requirements contained in H�,�1 0000001558 00000 n
Should deterrence fail, the Joint For ce is prepared to win. endstream
endobj
815 0 obj
<>/ExtGState<>/Font<>>>/Subtype/Form/Type/XObject>>stream
fense directive (DODD) 5000.01 and Department of Defense instruction (DODI) 5000.02 for Army-managed acquisition programs. DoD Information Sharing Strategy 4 messaging and data technologies that pass information across trusted networks. Advancement should include developing a data analytics strategy across acquisition domains, expanding data governance and data sharing, and continuing to expand and mature data collection, access, and analytic layers. ;:�� 3��
that support the foundation of the 2,500+ doctrine term DOD Dictionary. That approach attempted to standardize and control data elements, definitions, and structures across the Enterprise, requiring consensus among and across organizations. The Department must have the ability to transfer information to and obtain information from external partners overcoming situations where these partners may have disparate DoD Total Data Quality Management (TDQM) Data quality management in the DoD is focused on the same problems and issues that afflict the creation, management, and use of data in other organizations. ��۾
��ߕs��Ghp]��&W��2R�j8UHyv���B��ro;�0az�%e�=j8��:�+
pޒ�a�HD;�mXo�e�0������Gi�y�H욬7e�(��Xh�1-kѯˇ��(��r|#tႿ��5&��{`�*+xY27�@u{&��d���nlG���fٔ&��솆u�����\C���G��k����W+_�I�"�UtC�ﱙ�ӯ!�;=0�(�q��%�V���@�?Un>(��k���"n y��a! Although information on enterprise data management is abundant, much of it is t… 868 0 obj
<>stream
DoD defines digital engineering as an integrated digital approach that uses authoritative sources of system data and models as a continuum across disciplines to support lifecycle activities from concept through disposal. The CMO, in coordination with the DoD CIO, monitors DoD business systems and promotes the secure sharing of DoD data, information, and IT services in accordance with this instruction. As illustrated in Table 1, DoD data quality characteristics and conformance measures are similar to those used to measure data quality in any AIS. r�K��2*������p�-�A���&�p#�Dw���N��L�8�(p�����Mx_E��"a m���:�g�3�w@���Ao'\ԑ�O����@� mZOV
���0�����B=��1�37����u��S�ޥ�`��b�ZdC+��l�5)?�����~x'�i��]��cw>-���wt��{~D��N�7��x�����q[on�!�>�~���vM��9�k�D$�l�z�u�QxT�:fTCJ���۾�6s�t�]��v�2�$�3�����r$�/����7��ź6�����3�.��cke� ��t�k�d�v�Ks�u�F��O>{�����B��Au8��=x�`m�A�{�[��U�X��l�0K�7�6PL>Ч�Wy�+e�,�_��C�]����7��v�ם��Bg��J��M���3���ϕF�]��`�^�m��{�}��F�##�3�d�����
��A�/��o���)��2�-�K؉�)?Z@ڍY����������Ml��bހ���_�0nZr��h��r��.��ۍ�|`d)*;`)��v�~��/:tS��?ʃ������S�w}��%r\�2"�RQ��xzG����\v��,/�/e�|���i7a���[TEmb��>���d*��~�4�o�sI+;i1��S�! JEC staff in %%EOF
���c�M�@&�6�U{bI��nq�����+:��3��"ٴ��Aj�י��*md1u�2qM�K%�h�`q���=a�\EZ=RG�ЮTQK�90���ܬv쾢_�z�)kVAr��.�4�ԯ��W4�w�����0�;`�RG �DI��V6�ض�����+�h�~ٞ��I�}dlAp�b:{��Dw9��_-t�Mia��)�.0rV�AHw����M�zS�ݩ���J�Ч�hߐ�r���i���k�GW'���].���K��}U�>�Y^Ɯ%v����&��'m����M�۹Tm�����ZJQ�����2���.`��.=|�1�[Ak�\sk��O^F��C�F����v! The DoD Data Strategy applies to the entire Department of Defense and its data, on whichever systems that information resides. descriptive terms in defense documents (policy, strategy, planning, doctrine, etc.) The DoD Cloud Computing Strategy lays the groundwork, consistent with the Federal Cloud Computing Strategy, for accelerating cloud adoption in the Department. h�bbd``b`n�S@�j ��b �w9�T �6 ��P��2��
$X>�$�A,v�Q� V�Z"���S@Bқ���� ����84���?�0 5��
As such the CC SRG is following an “Agile Policy Development” strategy and will be updated quickly when necessary. endstream
endobj
startxref
DoD Cloud computing policy and the CC SRG is constantly evolving based on lessons learned with respect to the authorization of Cloud Service Offerings and their use by DoD Components. Public Access Level: restricted public Data Update Frequency: R/P1D Bureau Code: 016:00 Consider the following: GPS The Global Positioning System (GPS) is a space-based satellite navigation system built and maintained by DoD and is freely available to anyone in the world with a GPS receiver. )O�F�H��{ �M/Ղ�ޕC3l�m�
w6)^*>7\�����S�l�0J*�0��"I��u金a�1����`��F�{�2淓�����Kg����l�-ف?�o�5����oU�tD�B��e�ۨkpm���㷒��/u��w���R�}%��������34���49X�y�J��[P����> ���1*J�����:�Op��{�e��y��[�����SI���O5�K�YR���r�OΪ�c��p�S�RNB��s�;#��o�M�B��B�)�Í��� Its creation is the primary step in deconflicting terminology nuances within organizational documents that may impact joint doctrine. endstream
endobj
811 0 obj
<>/Metadata 63 0 R/Outlines 102 0 R/Pages 805 0 R/StructTreeRoot 110 0 R/Type/Catalog>>
endobj
812 0 obj
<>/MediaBox[0 0 612 792]/Parent 806 0 R/Resources<>/Font<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Rotate 0/StructParents 0/Tabs/S/Type/Page>>
endobj
813 0 obj
<>>>/Subtype/Form/Type/XObject>>stream
Subject- matter experts in VA and DoD developed streamlined operational plans that support the identified objectives based on strategic guidance. 4. 2. w˸�@�[(̾}|�|,kG����H��@���>�
3j�,��e�Z�q&�),`�`�"�E�@G '͍b"gB�Ŭ�M�=9����|���L�dď�d1d�p58'�_pe���:E�k,���&���l��on
؉䜑�4����:3Q|�����K^�a:{��ӈ��O�r���< �CM���#�����ë�~Z���J��5t��Ff����OjO�ƌ�BS�9�!dz���s�x��2���u*+B���d��5s���?� �yy�Jo������-
xCR��"���ݙl�:���@�pE�W��KtX� (� ���4�.&w����F8���L���j�u and sustains systems. ���n�_�Ӕ8�����"8�'���w{�x>v�h���Z�Bp� ��@L;Y�=�*W/�#-H���Vm�W!��L����TV�
�?-���4�1�tT�e���`�BЉ�oQ%�s���;��\J�,m����YDK"�X��F��iL��9�_��
�o�9�Sd�ݺvGW.�$�r�W�R�Bp�Ee�� ��_�~E�ѽ7�n�T��� �a��J�cAgT�Όluth�-i�8�=���ϼV�������gE�Nx��`��1�]�4�O�7-���fa ]�[��CF?��d���� 0
832 0 obj
<>/Filter/FlateDecode/ID[<2350372DCFE7C64FA189C17AB568F42E><1C40E919B2B5F64EADD5CBADFC5C3423>]/Index[810 59]/Info 809 0 R/Length 102/Prev 929510/Root 811 0 R/Size 869/Type/XRef/W[1 2 1]>>stream
endstream
endobj
814 0 obj
<>/ProcSet[/PDF/Text]>>/Subtype/Form/Type/XObject>>stream
8 data, information, and IT services in the DoD in accordance with this instruction. Department of Defense Term and Definition Approach It is intended to foster �R(T0T0 BC#C3=K3s33K=C��\}炢��#S�R�@.� ;�
The Defense Department has benefited from private sector innovation throughout its history. Also, mechanisms are needed to authorize and ensure protected access to data for both the DoD and external analysts. �@���� DoD’s approach is to securely and safely connect people, processes, data, and 0000001850 00000 n
1 As articulated in DoD Directive 3600.01, Information Operations, dated May … h�b```�����@��(���1������
(4�݁c���%U�f�(.�`fz��f����9�7+��89)�@M�z�|W�˽m���ԾnʏV{�7g�������;��h8��F32 406c�a��� CHIEF MANAGEMENT OFFICER OF THE DEPARTMENT OF DEFENSE (CMO). Going forward, DoD will work closely with the private sector to validate and commercialize new ideas for cybersecurity for the Department. F��p%��G��du-�K���t�P>�`̌�(�.t��4/�U�p)�����Gr. "0� Uf.��d�Fɚ�ָz8g� �f&jc0�Vl. Data loss prevention is a system’s ability to identify, monitor, and protect data in use, data in motion, and stored data through content inspection and security analysis of transactions. As an enabling strategy to the Department of Defense Agency Strategic Plan and the ... With first revision of AR 5-1 after the publication of this strategy. �ے?�=Y��+C��(6���5�j���
�o/2�q�z���e�
endstream
endobj
167 0 obj
<<
/Type /ExtGState
/SA false
/SM 0.02
/TR2 /Default
>>
endobj
168 0 obj
<< /Type /XObject /Subtype /Image /Width 2528 /Height 3300 /BitsPerComponent 1
/ColorSpace /DeviceGray /Length 53242 /Filter /CCITTFaxDecode /DecodeParms << /K -1 /Columns 2528 >> >>
stream
7. 5. 0000001580 00000 n
}�u��.�.��U���E�/EFL����}fd�B�
݄��bh�{ꖀ�A�M���6�8B=F�Ա6c�sN���ʅ<>o��Y�K9� $��s.�s�E_�k�d��ON�e�/fٱxA��7L���n��R In this role, the DON CIO organizes and coordinates the Secretariat, U.S. Navy and U.S. Marine Corps representation to the DoD and Joint Service net-centric data strategy communities and associated communities of interest.
The National Information Exchange Model (NIEM), in accordance with the DoD Data Framework as addressed by the National Strategy for Information Unlike other approaches we’ve seen, ours requires companies to make considered trade-offs between “defensive” and “offensive” uses of data and between control and flexibility in its use, as we describe below. Ethical Governance 1 . Information that most folks don't normally associate with Defense. These plans consist of a high-level and coordinated summary of key milestones and performance measures. 0000001738 00000 n
160 0 obj
<<
/Linearized 1
/O 164
/H [ 993 587 ]
/L 531949
/E 55666
/N 30
/T 528630
>>
endobj
xref
160 11
0000000016 00000 n
trailer
<<
/Size 171
/Info 152 0 R
/Encrypt 162 0 R
/Root 161 0 R
/Prev 528619
/ID[<9dfcc85bf7cd7f42625d33d4a88efa5d><8ee1101ec45999463902e2a83a3e4a41>]
>>
startxref
0
%%EOF
161 0 obj
<<
/Pages 158 0 R
/Type /Catalog
/AcroForm 163 0 R
/Metadata 159 0 R
>>
endobj
162 0 obj
<<
/Filter /Standard
/R 3
/O (������B^?�g�+�Y0Mv���i/4Xy)
/U (�ﺲ�H���\r��2�\n�m����Wy>�\r2)
/P -1324
/V 2
/Length 128
>>
endobj
163 0 obj
<<
/Fields [ ]
/DR << /Font << /ZaDb 149 0 R /Helv 150 0 R >> /Encoding << /PDFDocEncoding 151 0 R >> >>
/DA (�9;�F�/����]�)
>>
endobj
169 0 obj
<< /S 489 /V 592 /Filter /FlateDecode /Length 170 0 R >>
stream
Acquisitions Architecting Auditing CBA Contracts Cost Estimating DoDAF EVMS Financial Management Glossary Human System Integration Information Security Information …Continue Reading→ 0000000993 00000 n
The Department of Defense (DoD) maintains a vast amount of information. • Army Guide for the Preparation of a Program Product Data Management Strategy (Under Revision) • DoD Open Systems Architecture Contract Guidebook for Program Managers • Acquiring and Enforcing the Government’s Rights in Technical Data and Computer Software Under Department of Defense Contracts, Air Force Space and Missile Systems Center DoD Guides and Handbooks The DoD Guides and Handbooks listed below are a collection of the most frequently ones used in acquisitions. Vision Statement DoD is a data-centric organization that uses data at speed and scale for operational advantage and increased efficiency. As defense agencies look to implement the recommendations outlined in the DOD data strategy, they will need to change several existing IT processes. 2���n�6!`�B���Q��J���직x �K�E�)�G��;�]�_F?CyA�Jf��n�'���5� Data loss prevention capabilities are designed to detect and prevent the unauthorized use and transmission of national security systems information. USD(P). I �jx�+Iլx���Yr���,V}8]ZN��g�� �S/�x=H?���<3sI3Cv�L�����p��ۢ����*�5�dΘ~Z��&%� 4�����MM���u.�dqk��R�ǥW�z��eWɋa(�aC�)�Rw��"�8`ѹ��:�F.�M�
�*� H�|W�nG}�W��n��~� ��m��u�Fa�A���m}�� ����pW��v�9䐇�����������l�ژ/v����1'���5�M.aH�Ejr*�䚇|5�w�}����zmv��������/���������rs~ui^��;�70c�5[����zvl.g;��Y�;�V��]a�L}��}6Έ���PR�/eh�:���f�l�fn��|l)f����j�. ��V�L H��+�d�K The DON CIO is the Department's senior data strategy official.
2020 user friendly architecture design