DoD Internet Services and Internet-Based Capabilities
|Publication Date:||11 September 2012|
PURPOSE. This Instruction, in accordance with the authority in DoD Directive (DoDD) 5144.1 (Reference (a)) and DoD Instruction (DoDI) 5025.01 (Reference (b)) and the requirements of the Office of Management and Budget (OMB) Memorandum M-05-04 (Reference (c)):
a. Incorporates and cancels Deputy Secretary of Defense (DepSecDef) Memorandum (Reference (d)), and Directive-Type Memorandum (DTM) 09-026 (Reference (e)).
b. Establishes policy, assigns responsibilities, and provides instructions for: (1) Establishing, operating, and maintaining DoD Internet services on unclassified networks to collect, disseminate, store, and otherwise process unclassified DoD information. (2) Use of Internet-based capabilities (IbC) to collect, disseminate, store, and otherwise process unclassified DoD information.
APPLICABILITY. This Instruction:
a. Applies to OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities within the DoD (hereinafter referred to collectively as the "DoD Components").
b. Applies to DoD Internet services and use of IbC provided by morale, welfare, and recreation (MWR), military exchanges, and lodging programs for use by authorized patrons.
c. Applies to contractors and other non-DoD entities that are supporting DoD missionrelated activities or accessing DoD Internet services or IbC via DoD information systems, to the extent provided in the contract or other instrument by which such authorized support or access is provided.
d. Does NOT:
(1) Prevent unit commanders or Heads of the DoD Components from providing alternate, stand-alone capabilities to allow access to IbC for mission or morale purposes.
(2) Prohibit DoD employees from using IbC from personal Internet-capable devices for personal purposes.
(3) Apply to using IbC specifically for penetration testing,
communications security monitoring, network defense, personnel
misconduct and law enforcement investigations, and