INTEROPERABILITY AND SUPPORTABILITY OF INFORMATION TECHNOLOGY AND NATIONAL SECURITY SYSTEMS
|Publication Date:||8 March 2006|
Establishes policies and procedures for developing, coordinating, reviewing, and approving Information Technology (IT) and National Security System (NSS) Interoperability and Supportability (I&S) needs.
Establishes procedures to perform I&S Certification and J-6 System Validation of Joint Capabilities Integration and Development System (JCIDS) Acquisition Category (ACAT) programs/systems cited in references a and b.
Establishes procedures to perform I&S Certification and J-6 System Validation of Information Support Plans (ISPs) for all non-ACAT and fielded programs/systems (references c and d).
Defines the four elements of the Net-Ready Key Performance Parameter (NR-KPP).
Provides guidance for NR-KPP development and assessment.
Establishes procedures for Joint Interoperability Test Command (JITC) Joint Interoperability Test Certification.
This instruction applies to:
The Joint Staff, Services, combatant commands, Defense agencies and joint and combined activities. This instruction also applies to other agencies preparing and submitting JCIDS documents in accordance with references a and b.
All IT and NSS (systems or services) acquired, procured or operated by any component of the Department of Defense, to include:
All ACAT programs, non-ACAT activities and procurements, and fielded systems. ACAT programs include all DOD 5000-Series (references e and f) IT and NSS acquisition systems. Non-ACAT activities and procurements include all defense IT and NSS projects, IT and NSS pre-acquisition demonstrations (e.g., Advanced Concept Technology Demonstrations (ACTD), Advanced Technology Demonstrations (ATD), and Coalition Warrior Interoperability Demonstrations (CWID) when selected for acquisition or procurement, joint experimentations, Joint Tests and Evaluations (JTE); non- DOD 5000 Series IT and NSS acquisitions or procurements (e.g., the Combatant Commander Command and Control Initiative Program (C2IP), Combatant Commander Initiatives Fund (CCIF), Combatant Commander Field Assessments, Military Exploitation of Reconnaissance and Technology Programs, and Tactical Exploitation of National Capabilities Programs); and post-acquisition (fielded) IT and NSS systems.
All inter- and intra-component IT and NSS that exchange and use information to enable units or forces to operate effectively in joint, combined, coalition, and interagency operations.
All IT and NSS acquired, procured, or operated by DOD intelligence agencies, DOD component intelligence elements, and other DOD intelligence activities engaged in direct support of DOD missions. This instruction recognizes that special measures may be required for protection and/or handling of foreign intelligence or counterintelligence information, or other need-to-know information. Accordingly, implementation of this instruction must be tailored to comply with Director of National Intelligence (DNI) directives and intelligence community policies.
All DOD IT and NSS external information exchange interfaces with other US government departments and agencies, combined and coalition partners, and multinational alliances (e.g., North Atlantic Treaty Organization).
All DOD component IT and NSS supporting business areas and domains within the Department of Defense.
Any organization that supports the J-6 in its role to perform I&S Certification of IT and NSS.