Sharing Data, Information, and Information Technology (IT) Services in the Department of Defense
|Publication Date:||5 August 2013|
PURPOSE. This instruction:
a. Reissues DoD Directive (DoDD) 8320.02 (Reference (a)) as a DoD Instruction (DoDI) in accordance with the guidance in DoDI 5025.01 (Reference (b)) and the authority in DoDD 5144.02 (Reference (c)).
b. Establishes policies, assigns responsibilities, and prescribes procedures for securely sharing electronic data, information, and IT services and securely enabling the discovery of shared data throughout the DoD in accordance with DoDD 8000.01 (Reference (d)), Department of Defense Chief Information Officer (DoD CIO) Memorandum (Reference (e)), and DoD CIO Memorandum (Reference (f)).
c. Facilitates the shift from the transport medium to a focus on content and guides the use of resources to implement the secure sharing of data, information, and IT services within the DoD Information Enterprise (IE) and with mission partners.
a. This instruction applies to:
(1) OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff (CJCS) and the Joint Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities within the DoD (referred to collectively in this instruction as the "DoD Components").
(2) All data assets, information, and IT services that are or may be available within the DoD IE and all programs, projects, and initiatives developing or implementing them, including those managed as part of a community of interest (COI).
(3) Data, information, and IT services in electronic form.
(4) All new systems, services, or capabilities, as well as existing systems and services when investment dollars are received for modernization.
b. This instruction does not apply to data, information, and IT services supporting existing, deployed systems, except to the extent they receive investment dollars for modernization. In other words, this instruction does not require a mandatory retrofitting of existing systems, services, or capabilities.
c. Nothing in this instruction alters or supersedes the existing authorities and policies of the Director of National Intelligence regarding the protection of intelligence sources and methods, including the exchange of sensitive compartmented information and special access programs for intelligence as directed by Executive Order 12333 (Reference (g)).
d. In limited cases, exceptions to the policy and requirements in this instruction may be granted by the DoD CIO.