UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

DODD 8320.07 CE-01

Implementing the Sharing of Data, Information, and Information Technology (IT) Services in the Department of Defense

active, Most Current
Organization: DODD
Publication Date: 5 December 2017
Status: active
Page Count: 31
scope:

PURPOSE.

In accordance with the authority in DoD Instruction (DoDI) 8320.02 (Reference (a)) and DoD Directive (DoDD) 5144.02 (Reference (b)), this instruction:

a. Establishes policy, assigns responsibilities, and prescribes procedures to implement Reference (a) and to enable a secure sharing environment in the DoD that supports the warfighting, business, DoD intelligence, and enterprise information environment mission areas.

b. Describes or references key enablers necessary for sharing data, information, and IT services and ensuring data, information, and IT services are visible, accessible, understandable, trustworthy, and interoperable. Key enablers include, but are not limited to, concepts, processes, governance forums, standards, models, and shared vocabularies. For the purposes of the instruction, data sharing and information sharing are equivalent terms. Service and IT service, are used interchangeably throughout this instruction. IT services include DoD Enterprise Services; however, not all IT services are DoD Enterprise Services.

c. Guides the use of resources for implementing the sharing of data, information, and IT services within the DoD Information Enterprise (IE) and with mission partners.

d. Incorporates and cancels DoD 8320.02-G (Reference (c)).

APPLICABILITY

a. This instruction applies to:

(1) OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff (CJCS) and the Joint Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities within the DoD (referred to collectively in this instruction as the "DoD Components").

(2) The United States Coast Guard. The U.S. Coast Guard will adhere to DoD requirements, standards, and policies in this instruction in accordance with the direction in Paragraph 4a of the Memorandum of Agreement between the Department of Defense and the Department of Homeland Security (Reference (ay)).

(3) All new data assets, information, IT services, IT systems, and capabilities, as well as existing data assets, information, IT services, IT systems, and capabilities when investment funds are received for modernization, to include those managed as part of a community of interest (COI).

(a) DoD Chief Information Officer (CIO) Memorandum (Reference (d)), key principles, rules, constraints, and best practices apply within the Internet Protocol Boundary of the DoD Information Network (DoDIN), including those devices that are often disconnected if they are used to receive and share data.

(b) Outside of these boundaries, key principles still should be considered, but the rules of the DoD IE Architecture must yield to the state of technology and the needs and imperatives of DoD missions.

(4) Data, information, and IT services in electronic form.

b. This instruction does not apply to data, information, and IT services supporting existing forward deployed systems, or those systems in use in combat operations, except to the extent that they receive investment dollars for modernization. Mandatory retrofitting of existing systems, services, or capabilities is not required.

c. This instruction will not alter or supersede:

(1) The existing authorities and policies of the Director of National Intelligence (DNI) regarding the protection of sensitive compartmented information (SCI) and special access programs (SAP) for intelligence pursuant to Executive Order 12333 (Reference (e)) and other applicable laws and regulations. The application of the provisions and procedures of this instruction to SCI or other SAP for intelligence information systems is encouraged where they may complement or discuss topics not otherwise specifically addressed.

(2) Existing laws and policies regarding the use of existing business information exchange standards to record the initiation of and responses to business events among the DoD, Federal, State, local government, foreign government, and commercial trading partners that comprise the DoD acquisition, logistics, and finance communities.

Document History

DODD 8320.07 CE-01
December 5, 2017
Implementing the Sharing of Data, Information, and Information Technology (IT) Services in the Department of Defense
PURPOSE. In accordance with the authority in DoD Instruction (DoDI) 8320.02 (Reference (a)) and DoD Directive (DoDD) 5144.02 (Reference (b)), this instruction: a. Establishes policy, assigns...
August 3, 2015
Implementing the Sharing of Data, Information, and Information Technology (IT) Services in the Department of Defense
PURPOSE. In accordance with the authority in DoD Instruction (DoDI) 8320.02 (Reference (a)) and DoD Directive (DoDD) 5144.02 (Reference (b)), this instruction: a. Establishes policy, assigns...

References

Advertisement