(71V؄5RG�͘�Љ$�o�b��u������I��f�&h��:a(昴$� �:��ⴗ�^�#����)��� �Wk���m&l�~�}X�A�0��A$�k8��^'h$�s���]3��nm���X©:B�ƫ�z�Dv�88�$y'�0X����oџ��I[��/90D�%���b�M���0Kܧi�ޝ�O�� ��6��>9�"�����1@�Z�{W�\�y���o��l�۠������F��kk�!�,�|#�!����"��$ ��@^�R�dD�zMn���Ӥ|&��}���(^9���V��;S�ϻ�|��?Ow����aC@8�V���y�.�`�9����LG��E��1�G�w�y��a�#NK?�����2�Csl���l�R~GY�أ��s��37����s�)E?��N�`qv�%�.M�: 0000000842 00000 n provided with the data needed to support the review, but they will also work to minimize the overhead burden placed on the DoD Components, PEOs, program managers, and their staffs. They underlie a comprehensive strategy that encompasses Federal and Federally-sponsored program, statistical, and mission-support data . Reinforcing America’s traditional tools of diplomacy, the Department provides military Using data-driven analysis linked to the National Defense Strategy, OUSD(A&S) scales to enable new product and process development and supports a culture of innovation, critical thinking, and creative compliance. of the DoD Cyber Strategy, which is the authoritative reference document relevant to the development of manning, training, equipping, and integrating full spectrum cyberspace operations into DoD policy, plans, and programs. 1 Data-centric. Data … b. The data provided in the reports serve as the foundation and catalyst for future sexual assault prevention, training, victim care, and accountability goals. DoD Digital Modernization Strategy 6/5/2019 Page 3 Foreword The global threat landscape is constantly evolving and remaining competitive and modernizing our digital environment for great power competition is imperative for the Department of Defense. The Department of Defense Fiscal Year 2019 Annual Report on Sexual Assault in the Military was provided to Congress on April 30, 2020. B. H�*��wSp�� The Department of Defense Cyber Strategy 4 develop advanced capabilities. {U�����r�jY&�0��dD������z\�6+�h�y���$g��E"1��.�t��e����P�5��y�[��޸�2�( \U�Zƿ��X����ّ� L^���l� ��hȚP�m�K�ğQ�0PU�ۢ��;z��$�V%bo���G�8�}�&ra��� �:T���\:�;pO�ץl��CYr��e^. 0000000589 00000 n %PDF-1.6 %���� ;��t �l0��_���, �nK�. �ք"�^n����0�# capabilities and the goals of the DoD Net-Centric Data Strategy, the DCIP Geospatial Data Strategy establishes a vision for creation and maintenance of a common and comprehensive foundation of geospatial infrastructure data that leverages the very best data sources and tools available for DCIP and DoD … �$�J��5XoOqr4�1]��ݡ ��:ڬ�t����l/��,ޠb�t�s�\�����Ú5��!fcC������q�%������_5. They inform the Practices and Action Plan . DoD Net -Centric Data Strategy 2 The traditional DoD approach to data has been data administration. DoD data, information, and information technology (IT) services pursuant to References (n), (o), and DoDI 8551.01 (Reference (p)). (��h-�� �-�`�>`an�x~V|X�F���B�/ג$��(Vo��ka���K,8U?A����.��� endstream endobj 170 0 obj 471 endobj 164 0 obj << /Type /Page /Parent 153 0 R /Resources 165 0 R /Contents 166 0 R /MediaBox [ 0 0 607 792 ] /CropBox [ 0 0 607 792 ] /Rotate 0 >> endobj 165 0 obj << /ProcSet [ /PDF /ImageB ] /XObject << /Im1 168 0 R >> /ExtGState << /GS1 167 0 R >> >> endobj 166 0 obj << /Length 47 /Filter /FlateDecode >> stream the overarching VA -DoD strategy described in the JSP Strategic Framework. @#Qw����B�f� &�?�_غ�Vs�56a��`}>��^�2C�'w��67G張�@���v�{��Q�5I��ɕ�WG���47x��O_����|jokL�- Z����Aq�e�bnh��s��G�D^�y�(�>�k������B�C�)"��D�{�*nX>)ion?��|9��E^8� ��qOZ.ǵc,��\�ԧ�sp3����L �!c��T ?SK���� x��X�l���Œmz�������-��ˆc��V��,�V&8�̢�iK��n8���H����g� +��g��{S�l�bꮾ�4�2v��޵|���0h�Ň5k'�4��"����w�sӯ��&. %PDF-1.4 %���� V I S I O N A N D G U I D I N G P R I N C I P L E S 2.1. k%g�Q7�EJ����. �,1�s^�K�Ƌ�l����֊� ��2�3+���Գ~�b�E\����߱����b���ԓ��/ �xz�"����k���pD�v �N!��xoM���2J��KH��{��gze���6��:������tG����Y��3��ו��� �3@ϛ���,��z1��� �e����.�{|��ai�*��xpa�s�������e�)Bi���5�NKf)�_����օ����u��~g��|��i_Cs����'�M��o�3�'���MpZ!V� G9��(�l�zj��~����� Our framework addresses two key issues: It helps companies clarify the primary purpose of their data, and it guides them in strategic data management. ˣrr^ Ns��:i��/�]ɔ�O�a�}�(&O(��x�7+�!œ�����D�H1l����×Z��G��u;�9`@[�W跼rv�����`�: �ߥCZ���s��X��� �uQnh�O�#�2|}����iUħ��wy��ތ�Qlێ S^�+ NATIONAL DEFENSE STRATEGY 1 INTRODUCTION The Department of Defense’s enduring mission is to provide combat-credible military forces needed to deter war and protect the security of our nation. Relationship Between Defense Acquisition, Requirements, and Budgeting Processes (1) Acquisition, requirements, and budgeting, are closely related and must operate 0000000684 00000 n Components, as well as resulting BEI products, are to be considered DoD data, protected from unauthorized release, and shared in accordance with applicable data sharing and disclosure 810 0 obj <> endobj Army CIO Lt. Gen. Bruce Crawford walked through the new strategy — essentially an updated version of the strategy the service issued in 2016 under Lt. […] This includes Major Defense Acquisition Programs (MDAPs) that have been identified as Defense Business Systems (DBS) by the chief management officer (CMO) in accordance with DODI 5000.75. As the U.S. adjusts to new great-power developments, the Army has revised its data strategy to reflect the need to move quickly and securely to leverage its information assets against adversaries. 0000001972 00000 n We must act now to secure our future. 0000002051 00000 n The Federal Data Strategy Principles serve as motivational guidelines . Data Management (DM) includes information about DoD data rights (IP Strategy), data elements, data sharing, Big Data (Data Analytics) and Data used during the O&S phase of acquisition. If requirements contained in H�,�1 0000001558 00000 n Should deterrence fail, the Joint For ce is prepared to win. endstream endobj 815 0 obj <>/ExtGState<>/Font<>>>/Subtype/Form/Type/XObject>>stream fense directive (DODD) 5000.01 and Department of Defense instruction (DODI) 5000.02 for Army-managed acquisition programs. DoD Information Sharing Strategy 4 messaging and data technologies that pass information across trusted networks. Advancement should include developing a data analytics strategy across acquisition domains, expanding data governance and data sharing, and continuing to expand and mature data collection, access, and analytic layers. ;:�� 3�� that support the foundation of the 2,500+ doctrine term DOD Dictionary. That approach attempted to standardize and control data elements, definitions, and structures across the Enterprise, requiring consensus among and across organizations. The Department must have the ability to transfer information to and obtain information from external partners overcoming situations where these partners may have disparate DoD Total Data Quality Management (TDQM) Data quality management in the DoD is focused on the same problems and issues that afflict the creation, management, and use of data in other organizations. ��۾ ��ߕs��Ghp]��&W��2R�j8UHyv���B��ro;�0az�%e�=j8��:�+ pޒ�a�HD;�mXo�e�0������Gi�y�H욬7e�(��Xh�1-kѯˇ��(��r|#tႿ��5&��{`�*+xY27�@u{&��d���nlG���fٔ&��솆u�����\C���G��k����W+_�I�"�UtC�ﱙ�ӯ!�;=0�(�q��%�V���@�?Un>(��k���"n y��a! Although information on enterprise data management is abundant, much of it is t… 868 0 obj <>stream DoD defines digital engineering as an integrated digital approach that uses authoritative sources of system data and models as a continuum across disciplines to support lifecycle activities from concept through disposal. The CMO, in coordination with the DoD CIO, monitors DoD business systems and promotes the secure sharing of DoD data, information, and IT services in accordance with this instruction. As illustrated in Table 1, DoD data quality characteristics and conformance measures are similar to those used to measure data quality in any AIS. r�K��2*������p�-�A���&�p#�Dw���N��L�8�(p�����Mx_E��"a m���:�g�3�w@���Ao'\ԑ�O����@� mZOV ���0�����B=��1�37����u��S�ޥ�`��b�ZdC+��l�5)?�����~x'�i��]��cw>-���wt��{~D��N�7��x�����q[on�!�>�~���vM��9�k�D$�l�z�u�QxT�:fTCJ���۾΋�6s�t�]��v�2�$�3�����r$�/����7��ź6�����3�.��cke� ��t�k�d�v�Ks�u�F��O>{�����B��Au8��=x�`m�A�{�[��U�X��l�0K�7�6PL>Ч�Wy�+e�,�_��C�]����7��v�ם��Bg��J��M���3���ϕF�]��`�^�m��{�}��F�##�3�d����� ��A�/��o���)��2�-�K؉�)?Z@ڍY����������Ml��bހ���_�0nZr��h��r��.��ۍ�|`d)*;`)��v�~��/:tS��?ʃ������S�w}��%r\�2"�RQ��xzG����\v��,/�/e�|���i7a���[TEmb��>���d*�޿�~�4�o�sI+;i1��S�! JEC staff in %%EOF ���c�M�@&�6�U{bI��nq�����+:��3��"ٴ��Aj�י��*md1u�2qM�K%�h�`q���=a�\EZ=RG�ЮTQK�90���ܬv쾢_�z�)kVAr��޼.�4�ԯ��W4�w�����0�;`�RG �DI��V6�ض�����+�h�~ٞ��I�}dlAp�b:{��Dw9��_-t�Mia��)�.0rV�AHw����M�zS�ݩ���J�Ч�hߐ�r���i���k�GW'���].���K��}U�>�Y^Ɯ%v����&��'m����M�۹Tm�����ZJQ�����2���׹.`��.=|�1�[Ak�\sk��O^F��C�F����v! The DoD Data Strategy applies to the entire Department of Defense and its data, on whichever systems that information resides. descriptive terms in defense documents (policy, strategy, planning, doctrine, etc.) The DoD Cloud Computing Strategy lays the groundwork, consistent with the Federal Cloud Computing Strategy, for accelerating cloud adoption in the Department. h�bbd``b`n�S@�j ��b �w9�T �6 ��P��2�� $X>�$�A,v�Q� V�Z"���S@Bқ���� ����84���?�0 5�� As such the CC SRG is following an “Agile Policy Development” strategy and will be updated quickly when necessary. endstream endobj startxref DoD Cloud computing policy and the CC SRG is constantly evolving based on lessons learned with respect to the authorization of Cloud Service Offerings and their use by DoD Components. Public Access Level: restricted public Data Update Frequency: R/P1D Bureau Code: 016:00 Consider the following: GPS The Global Positioning System (GPS) is a space-based satellite navigation system built and maintained by DoD and is freely available to anyone in the world with a GPS receiver. )O�F�H��{ �M/Ղ�ޕC3l�m� w6)^*>7\�����S�l�0J*�0��"I��u金a�1����`��F�{�2淓�����Kg����l�-ف?�o�5����oU�tD�B��e�ۨkpm���㷒��/u��w���R�}%��������34���49X�y�J��[P����> ���1*J�����:�Op��{�e��y��[�����SI���O5�K�YR���r�OΪ�c��p�S�RNB��s�;#��o�M�B��B�)�Í��� Its creation is the primary step in deconflicting terminology nuances within organizational documents that may impact joint doctrine. endstream endobj 811 0 obj <>/Metadata 63 0 R/Outlines 102 0 R/Pages 805 0 R/StructTreeRoot 110 0 R/Type/Catalog>> endobj 812 0 obj <>/MediaBox[0 0 612 792]/Parent 806 0 R/Resources<>/Font<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]>>/Rotate 0/StructParents 0/Tabs/S/Type/Page>> endobj 813 0 obj <>>>/Subtype/Form/Type/XObject>>stream Subject- matter experts in VA and DoD developed streamlined operational plans that support the identified objectives based on strategic guidance. 4. 2. w˸�@΁�[(̾}|�|,kG����H��@���>� 3j�,��e�Z�q&�),`�`�"�E�@G '͍b"gB�Ŭ�M�=9����|���L�dď�d1d�p58'�_pe���:E�k,���&���l��on ؉䜑�4����:3Q|�����K^�a:{��ӈ��O�r���< �CM���#�����ë�~Z���J��5t��Ff����OjO�ƌ�BS�9�!dz���s�x��2���u*+B���d��5s���?� �yy�Jo������- xCR��"���ݙl�:���@�pE�W��KtX� (� ���4�.&w����F8���L���j�u and sustains systems. ���n�_�Ӕ8�����"8�'���w{�x>v�h���Z�Bp� ��@L;Y�=�*W/�#-H���Vm�W!��L����TV� �?-���4�1�tT�e���`�BЉ�oQ%�s���;��\J�,m����YDK"�X��F��iL��9�_�� �o�9�Sd�ݺvGW.�$�r�W�R�Bp�Ee�� ��_�~E�ѽ7�n�T��� �a��J�cAgT�Όluth�-i�8�=���ϼV�������gE�Nx��`��1�]�4�O�7-���fa ]�[��CF?��d���� 0 832 0 obj <>/Filter/FlateDecode/ID[<2350372DCFE7C64FA189C17AB568F42E><1C40E919B2B5F64EADD5CBADFC5C3423>]/Index[810 59]/Info 809 0 R/Length 102/Prev 929510/Root 811 0 R/Size 869/Type/XRef/W[1 2 1]>>stream endstream endobj 814 0 obj <>/ProcSet[/PDF/Text]>>/Subtype/Form/Type/XObject>>stream 8 data, information, and IT services in the DoD in accordance with this instruction. Department of Defense Term and Definition Approach It is intended to foster �R(T0T0 BC#C3=K3s33K=C��\}炢��#S�R�@.� ;� The Defense Department has benefited from private sector innovation throughout its history. Also, mechanisms are needed to authorize and ensure protected access to data for both the DoD and external analysts. �@���� DoD’s approach is to securely and safely connect people, processes, data, and 0000001850 00000 n 1 As articulated in DoD Directive 3600.01, Information Operations, dated May … h�b```�����@��(���1������ (4�݁c���%U�f�(.�`fz��f����9�7+��89)�@M�z�|W�˽m���ԾnʏV{�7g�������;��h8��F32 406c�a��� CHIEF MANAGEMENT OFFICER OF THE DEPARTMENT OF DEFENSE (CMO). Going forward, DoD will work closely with the private sector to validate and commercialize new ideas for cybersecurity for the Department. F��p%��G��du-�K���t�P>�`̌�(�.t��4/�U�p)�����Gr. "0� Uf.��d�Fɚ�ָz8g� �f&jc0�Vl. Data loss prevention is a system’s ability to identify, monitor, and protect data in use, data in motion, and stored data through content inspection and security analysis of transactions. As an enabling strategy to the Department of Defense Agency Strategic Plan and the ... With first revision of AR 5-1 after the publication of this strategy. �ے?�=Y��+C��(6���5�j��� �o/2�q�z���e� endstream endobj 167 0 obj << /Type /ExtGState /SA false /SM 0.02 /TR2 /Default >> endobj 168 0 obj << /Type /XObject /Subtype /Image /Width 2528 /Height 3300 /BitsPerComponent 1 /ColorSpace /DeviceGray /Length 53242 /Filter /CCITTFaxDecode /DecodeParms << /K -1 /Columns 2528 >> >> stream 7. 5. 0000001580 00000 n }�u��.�.��U���E�/EFL����}fd�B� ݄��bh�{ꖀ΃�A�M���6�8B=F�Ա6c�sN���ʅ<>o��Y�K9� $��s.�s�E_�k�d��ON�e�/؁fٱxA��7L���n��R In this role, the DON CIO organizes and coordinates the Secretariat, U.S. Navy and U.S. Marine Corps representation to the DoD and Joint Service net-centric data strategy communities and associated communities of interest. The National Information Exchange Model (NIEM), in accordance with the DoD Data Framework as addressed by the National Strategy for Information Unlike other approaches we’ve seen, ours requires companies to make considered trade-offs between “defensive” and “offensive” uses of data and between control and flexibility in its use, as we describe below. Ethical Governance 1 . Information that most folks don't normally associate with Defense. These plans consist of a high-level and coordinated summary of key milestones and performance measures. 0000001738 00000 n 160 0 obj << /Linearized 1 /O 164 /H [ 993 587 ] /L 531949 /E 55666 /N 30 /T 528630 >> endobj xref 160 11 0000000016 00000 n trailer << /Size 171 /Info 152 0 R /Encrypt 162 0 R /Root 161 0 R /Prev 528619 /ID[<9dfcc85bf7cd7f42625d33d4a88efa5d><8ee1101ec45999463902e2a83a3e4a41>] >> startxref 0 %%EOF 161 0 obj << /Pages 158 0 R /Type /Catalog /AcroForm 163 0 R /Metadata 159 0 R >> endobj 162 0 obj << /Filter /Standard /R 3 /O (������B^?�g�+�Y0Mv���i/4Xy) /U (�ﺲ�H���\r��2�\n�m����Wy>�\r2) /P -1324 /V 2 /Length 128 >> endobj 163 0 obj << /Fields [ ] /DR << /Font << /ZaDb 149 0 R /Helv 150 0 R >> /Encoding << /PDFDocEncoding 151 0 R >> >> /DA (�9;�F�/����]�) >> endobj 169 0 obj << /S 489 /V 592 /Filter /FlateDecode /Length 170 0 R >> stream Acquisitions Architecting Auditing CBA Contracts Cost Estimating DoDAF EVMS Financial Management Glossary Human System Integration Information Security Information …Continue Reading→ 0000000993 00000 n The Department of Defense (DoD) maintains a vast amount of information. • Army Guide for the Preparation of a Program Product Data Management Strategy (Under Revision) • DoD Open Systems Architecture Contract Guidebook for Program Managers • Acquiring and Enforcing the Government’s Rights in Technical Data and Computer Software Under Department of Defense Contracts, Air Force Space and Missile Systems Center DoD Guides and Handbooks The DoD Guides and Handbooks listed below are a collection of the most frequently ones used in acquisitions. Vision Statement DoD is a data-centric organization that uses data at speed and scale for operational advantage and increased efficiency. As defense agencies look to implement the recommendations outlined in the DOD data strategy, they will need to change several existing IT processes. 2���n�6!`�B���Q��J�׽��직x �K�E�)�G��;�]�_F?CyA�Jf��n�'���5� Data loss prevention capabilities are designed to detect and prevent the unauthorized use and transmission of national security systems information. USD(P). I �jx�+Iլx���Yr���,V}8]ZN��g�� �S/�x=H?���<3sI3Cv�L�����p��ۢ����*�5�dΘ~Z��&%� 4�����MM���u.�dqk��R�ǥW�z��eWɋa(�aC�)�Rw��"�8`ѹ��:�F.�M� �*� H�|W�nG}�W��n��~� ��m��u�Fa�A���m}�� ����pW��΋v�9䐇�����������l�ژ/v����1'���5�M.aH�Ejr*�䚇|5�w�}����zmv��������/���������rs~ui^��;�70c�5[����zvl.g;��Y�;�V��]a�L}��}6Έ���PR�/eh�:���f�l�fn��|l)f����j�. ��V�L H��+�d�K The DON CIO is the Department's senior data strategy official.
2020 user friendly architecture design