MEMORANDUM FOR DOD ACTIVITY ADDRESS DIRECTORY (DoDAAD) PROCESS REVIEW COMMITTEE (PRC)
|
|
|
- Dorthy Lee
- 10 years ago
- Views:
Transcription
1 DEFENSE LOGISTICS AGENCY HEADQUARTERS 8725 JOHN J. KINGMAN ROAD FORT BELVOIR, VIRGINIA May 6, 2015 MEMORANDUM FOR DOD ACTIVITY ADDRESS DIRECTORY (DoDAAD) PROCESS REVIEW COMMITTEE (PRC) SUBJECT: Approved Defense Logistics Management Standards (DLMS) Change (ADC) 1143 for DoDAAD Data Security Controls (DoDAAD) The attached change to DLM , Defense Logistics Management System, is approved for immediate implementation. Addressees may direct questions to Tad DeLaney, DoDAAD PRC Chair, at , DSN , or Others must contact their Component/ Agency designated representative. Attachment As stated cc: ODASD(SCI) ODASD(DP AP) OUSD(C) Defense Logistics Management Standards Office
2 ADC 1143 DoDAAD Data Security Controls (DoDAAD) 1. ORIGINATING SERVICE/AGENCY AND POC INFORMATION: a. Technical POC: Defense Logistics Management Standards Office, DoDAAD PRC Chair, Tad DeLaney, at , b. Functional POC: Defense Logistics Management Standards Office, DoDAAD PRC Chair, Tad DeLaney, at , 2. FUNCTIONAL AREA: a. Primary Functional Area: DoDAAD b. Secondary Functional Processes: MAPAD, Supply, and Finance 3. REFERENCES: a. DLM , Defense Logistics Management System (DLMS), Volume 6, Chapter 2, Department of Defense Activity Address Directory. b. ADC 385, DoD Activity Address Directory (DoDAAD) Enhanced Inquiry and Download for Multiple DoDAACs (DoDAAD). c. OSD Director of Administration Determination of December 18, d. DoDD , DoD Internet Services and Internet-Based Capabilities, September 11, e. DoDM , DoD Information Security Program: Marking of Classified Information, Volume 2, February 24, APPROVED CHANGE(S): (Changes from PDC 1143 are highlighted in yellow.) For the purposes of this DLMS Change, DoDAAD data means multiple DoDAACs and/or RICs and their associated data elements. It does not mean a single DoDAAC or RIC and its own data elements. Additionally, for the purpose of this DLMS Change, the access to DoDAAD data being addressed is that of read access that enables a user to dynamically query the database and extract multiple DoDAACs, RICs, and/or their respective data attributes, en masse -- also known as Enhanced Defense Automatic Address System Inquiry (edaasinq). a. Brief Overview of Change: Implement additional controls for access to DoDAAD data that safeguard the handling of DoDAAD data, which has been designated as Controlled Unclassified Information (CUI) For Official Use Only (FOUO), and that assure proper management control on behalf of the Federal Departments to whom the data belongs (i.e., Department of Defense (DoD), Department of Justice (DOJ), Department of Transportation (DOT), etc.). Note: For the purposes of this DLMS Change, use of the term Components used herein is intended to mean all Departments of the Federal Government who use the DoDAAD (i.e., DoD, Federal Agencies, etc.). Page 1
3 b. Background: Reference 3.b. requested designation of DoDAAD data as being For Official Use Only (FOUO). In response to this, a pop-up screen was implemented in edaasinq that notified users that the capability to download edaasinq data is restricted to Common Access Card (CAC)/Public Key Infrastructure (PKI) protection and requires a System Authorization Access Request. This is not the same as designating the data (in all its various exportable formats) as being FOUO and does not meet the requirement levied by the Intelligence Community to assure the data is safeguarded. In response to this, reference 3.c. determined that the DoDAAD meets the criteria for Exemption 3 of the Freedom of Information Act (5 U.S.C. 552(b)(3)) because it meets the requirements for exemption under 10 U.S.C. 130e. Specifically, the Director of Administration made the following determination: In accordance with 10 U.S.C. 130e, I reviewed the information provided to me by the Defense Logistics Agency concerning the Department of Defense Activity Address Directory (DoDAAD) database as a single authoritative source for the Department of Defense (DoD) business enterprise architecture and determined that it qualifies as DoD critical infrastructure security information (CISI). As defined by 10 U.S.C. 130e, CISI includes: sensitive but unclassified information that, if disclosed, would reveal vulnerabilities in Department of Defense critical infrastructure that, if exploited, would likely result in the significant disruption, destruction, or damage of or to Department of Defense operations, property, or facilities, including information regarding the securing and safeguarding of explosives, hazardous chemicals, or pipelines, related to critical infrastructure or protected systems owned or operated by or on behalf of the Department of Defense, including vulnerability assessments prepared by or on behalf of the Department of Defense, explosives safety information (including storage and handling), and other site-specific information on or relating to installation security. The DoDAAD meets this definition of CISI because it is comprised of both Department of Defense Activity Address Code (DoDAAC) and Routing Identifier Code (RIC) identifiers in an interactive relational database serving as a single authoritative source of identification, routing, and address information for authorized users, including Military Components and Agencies, participating Federal Agencies, authorized contractors, and authorized special program activities such as state and local governments (DLM Volume 6, December 19, 2013). DoDAAD supports business application systems data and interoperability requirements, including (but not limited to) supply chain, materiel procurement, and acquisition systems. Each activity that requisitions, contracts for, receives, has custody of, issues, or ships DoD assets, or funds/pays bills for materials and/or services is identified by a DoDAAC (six-position alphanumeric code). DoDAACs are used in a myriad of business systems spanning the entirety of the DoD s business enterprise architecture, including acquisition, procurement, contracting, requisitioning, shipping, billing, pay, maintenance, installations management, human resources, energy resources, and the accountability and requisition of ordnance, ammunition, and perishables in logistics systems across the DoD. DoDAACs are also used for business operations involving the accountability of property and facilities, as well as for hazardous material management. Access to the DoDAAD allows access to these DoDAACs. When coupled with access to other unclassified logistic systems, users are provided with multiple data points which, when combined, disclose Page 2
4 location of materials and operational status and plans. If the DoDAAD is released it would reveal vulnerabilities in Department of Defense critical infrastructure that, if exploited, would likely result in the significant disruption, destruction, or damage of or to DoD operations, property, or facilities related to critical infrastructure or protected systems owned or operated by or on behalf of the DoD. The contents of the DoDAAD are sensitive for a number of reasons: DoDAACs are created to support sensitive operations and to facilitate the business process associated with them. DoDAACs for the following locations include names of employees and Service members as well as duty station addresses for: a. Department of Defense installations and ports that are outside the contiguous United States (OCONUS) b. Deployed units and activities performing real world contingency operations or exercises from both contiguous United States (CONUS) and OCONUS bases c. Ships afloat d. Ships still in CONUS ports but scheduled to go afloat e. Ships still in OCONUS ports but scheduled to go afloat f. Embassies g. War Reserve Equipment sets pre-positioned OCONUS If an adversary had the DoDAAD they could determine the issuance of orders; the movement of specially qualified personnel to units and the installation of special capabilities, as well as the conduct of activities in a way that will reveal intensification of preparations before initiating operations. From this information, the adversary could identify very sensitive DoD activities including clandestine locations of DoD activities, force structure, and even troop movement. In addition, a DoDAAC could be used in an unauthorized way whereby the internal controls of the Agency can be circumvented and appropriations obligated without the proper authority being involved in the process. A DoDAAC is very much like a credit card number which, in the wrong hands, can be used to spend money without the rightful owner of the code (i.e., the entity with authority to use the code) being aware that the Agency s appropriations are being spent. Individuals have been prosecuted who have used a DoDAAC to purchase items (i.e., televisions) for personal gain. Therefore, effective management, control, and use of DoDAACs by all DoD Components is critical to ensure DoD fiscal responsibility. Moreover, the public interest in disclosure of the DoDAAD is minimal. FOIA requests for the DoDAAD are made by commercial entities with commercial interests. Therefore, the public interest consideration in the disclosure of this information does not outweigh preventing the disclosure of the information. c. Handling of DoDAAD Data. Currently, the manner in which DoDAAD data is treated has remained unchanged since the DoDAAD was created, in spite of the implementation of system access controls. Anyone with access to the system can download and retransmit data through unclassified means without any published guidance as to the sensitivity of this data or the potential damage that can be caused by its open release. There is currently no guidance provided on how to assure users Page 3
5 requesting access have a legitimate need to know. That determination rests with the owners of the data and not necessarily those who maintain the system. (1) System Management. Management of the DoDAAD as a system is the shared responsibility of DLMSO and DLA Transaction Services. To that end, the security protocols that have been put in place to safeguard access, and which require a Common Access Card (CAC), or Public Key Infrastructure (PKI) Certificate, and an approved System Access Request (SAR) through the DLA Transaction Services Customer Support Desk, do not address the underlying and more important criterion of ensuring need to know has been determined by the rightful owners of the data, as well as providing further guidance on how the data should be handled and safeguarded by those granted access to it. Although the DoDAAD was reengineered into a database, and updates to it (write access) were modernized away from individually-submitted transactions at the unit/user level to a web-based update tool (the DoDAAD Update Application) that facilitates Service-level management, aggregate read access to the database itself (edaasinq) has remained largely as it was decades ago granted at the individual unit/user level by the DLA Transaction Services Customer Support Desk. (2) Data Management. Data management of the DoDAAD is the responsibility of the Components who actually own the activities who have DoDAACs in the DoDAAD, and thus the data entered therein for each. Management of this data is accomplished by two functions: write access and read access. (a) Write access to the DoDAAD is facilitated through the use of the DoDAAD Update Application. Accounts are established for this application by formal appointment of Central Service Points (CSP) and Monitors by the Components to the DoDAAD Administrator at DLMSO. The Administrator forwards the appointment letters to the System Access Control Point (SACP formerly known as the Central Control Point or CCP) at Transaction Services. Once the SACP receives the formal appointment letter, the CSPs/Monitors submit System Authorization Access Requests through the DLA Transaction Services website which are subsequently approved by the SACP who, in turn, establishes access controls for these individuals in the Application based on the information provided in their appointment letter (i.e., Service Series, MAJCOM, Range, etc.). The SACP thus serves as the System Access Control Point for the ability to update the database. (b) Read access to the DoDAAD (in aggregate) is facilitated through the use of the Enhanced DAAS Inquiry (edaasinq) application. These accounts are established by any user requesting access through the submission of a System Authorization Access Request to the DLA Transaction Services Customer Support Desk. There is currently no review by the Components for access requests by its members. Read access can be granted to contractors, as well as Civilian and Military personnel of the Federal Government. In the case of contractors, however, there is an additional requirement for a U.S. Government Sponsorship letter to be submitted along with the System Authorization Access Request. edaasinq accounts are not limited to read access to the DoDAAD. An edaasinq account also affords read access to the MAPAD, and allows single-record searches (i.e., DAASINQ) for Communication Routing Identifier (COMMRI), Distribution Code, and National Item Identification Number (NIIN). Additionally, it has several file downloads available for various other types of data: Fund Code, DoDAAD, MAPAD, and United States Postal Service (USPS) City/Zone Improvement Plan (ZIP) Code errors. (3) Read Access Controls. While write access to the database is formally approved and controlled by the Components at the Service level through the appointment of CSPs to the Administrator, there is currently no read access control on the part of the Components that safeguards Page 4
6 the data content of the DoDAAD and whether or not the individuals requesting access to this data have a need to know, as determined and approved by the owners of the data the Components. This DLMS Change is intended to identify the requirement for Components to implement the proper controls for read access to the DoDAAD that is in keeping with Reference 3.c, and safeguards the proper labeling and handling of this data as CUI/FOUO. d. Describe Approved Change in Detail: To implement this Change, the following actions are to be taken: (1) All Users. Per references 3.d. and 3.e., all users with edaasinq access shall handle the data as FOUO and shall not re-transmit, save, or otherwise share this data in any means that would jeopardize its security except on a need-to-know basis. The following applies: (a) Printouts or Reports Containing FOUO Data. Each page of a printout or report generated from databases containing FOUO data will display a pre-programmed header and footer containing the FOUO handling legend. Where practical, the legend may be rubber stamped on the document. (b) Unclassified Electronic Mail ( ) Messages Containing FOUO Data. When transmitting FOUO data via electronic mail ( ), the message will be encrypted and digitally signed using Common Access Card (CAC) based DOD public key (PK) certificates. The opening line of an message is to call attention to the fact that it contains FOUO data, e.g., "This message is to be handled as For Official Use Only." Similarly, if a FOUO document has been attached to the , the opening line of the message is to state that fact; e.g., "The attachment to this message is to be handled as For Official Use Only." Within the body of the message, each part containing FOUO information will be marked at the beginning with the FOUO legend in parentheses. (c) Facsimile Cover Sheets. Where FOUO data is sent via facsimile message, the facsimile cover sheet is to call attention to the fact that the attachment is to be handled as FOUO." (d) Marking Other Types of Housing Devices. Compact Disks, diskettes, canisters, cartridges, tapes, cassettes, and similar housing devices used to permanently store FOUO data will be marked "For Official Use Only" or "FOUO" in a manner that ensures that a recipient or viewer is aware of the status of the information therein. DLA Label 1804, For Official Use Only Pressure Sensitive Label, may be used for this purpose. If the data is also subject to the Privacy Act, DLA Form 1462, Pressure Sensitive Privacy Act Label may be used to mark housing devices in lieu of DLA Label (2) DLMSO. Update DLM , Volume 6, Chapter 2 to include the process outlined in this DLMS Change. See paragraph 4.e. below. (3) DLA Transaction Services. Per references 3.d. and 3.e., the following changes will be necessary to implement this DLMS Change (see also the enclosures to this attachment). (a) Prominently label all user screens for edaasinq, and the DoDAAD Update Application with the FOUO handling legend. Access screens to these applications will display, at a minimum, the following warning: Page 5
7 The DoDAAD is DoD Critical Infrastructure Security Information (CISI), in accordance with 10 U.S.C. 130e, and is designated as Controlled Unclassified Information For Official Use Only (FOUO). This data is maintained and owned by the Departments of the Federal Government via their respective DoDAAD Central Service Points (CSPs). The designation and protective marking of the DoDAAD, identifying it as FOUO, deems that its disclosure to the public would reasonably be expected to cause a foreseeable harm to an interest protected by one or more provisions of the Freedom of Information Act (FOIA). Because there is a potential for abuse in the use of these DoDAACs and RICs, and the data associated with them in the DoDAAD, Departments of the Federal Government shall establish stringent internal controls to ensure that the codes and data are used only by authorized personnel. It is imperative that all requests for activity address codes, deletions to codes, or changes thereto, be forwarded to the appropriate CSP, or delegated Monitor, in order to assure proper validity of the request. Furthermore, personnel with access to the DoDAAD are responsible for safeguarding it, and will ensure that further distribution is restricted to personnel with an official need to know and proper authorization. Any such further distribution will be minimized, encrypted, and documented accordingly as FOUO. (b) Output. Each page of a printout or report generated from the database containing FOUO data will display a pre-programmed header and footer containing the FOUO handling legend -- For Official Use Only (FOUO). The following applies: 1. DAASINQ. Since the FOUO requirement applies to aggregate data, beyond the initial DAASINQ warning screen, there is no need to label follow-on screens or any printed output obtained by users via DAASINQ. 2. edaasinq. Since edaasinq allows the ability to download aggregate data, all screens and every format of output obtained through this application shall be subject to the warnings and FOUO marking labels (i.e., delimited downloads, TA_ format downloads, Excel output,.dat output, etc.). (c) For DAASINQ, implement an additional CAPTCHA test after every tenth DoDAAC query attempt. This would limit the number of back-to-back queries by a customer to ten queries before having to revalidate, thereby precluding users from extracting aggregate data through DAASINQ. (4) Components. To safeguard DoDAAD data, Components shall review requests for access to edaasinq by their members, prior to them being submitted to the DLA Transaction Services Customer Support Desk. Recommend the following be implemented to facilitate this: (a) Recommend that the Central Service Points be responsible for receiving, reviewing, and formally approving all access to the DoDAAD through the edaasinq, before any user submits a request to the DLA Transaction Services Customer Support Desk. As the only Service-appointed personnel responsible for managing the DoDAAD, the CSPs could ensure need-to-know status is verified on the part of users within their Service who request access to the DoDAAD. CSPs should maintain record of requests they ve approved at their level as part of their overall DoDAAD management responsibilities. (b) Contractors who request/require access to edaasinq must not only request access through their CSP, but they must obtain a Government Sponsorship letter. Contractor requests will Page 6
8 only be granted access if they include a CSP-approved request and the approved sponsorship letter, both of which should be kept on file by the CSP. (c) Component system requirements for aggregate DoDAAD data should be submitted to the CSP for review and approval before forwarding to the DoDAAD Administrator to obtain enterprise-level DoDAAD output (i.e., system-to-system interface). (d) Update Component-level policies and procedures to include the process and procedures outlined in this DLMS Change. Any system dependent upon DoDAAD data, or which receives and stores DoDAAD data, and allows users to download the data and/or retransmit it, must apply the same warning statement as identified above, to ensure FOUO compliance is maintained (e.g., USTRANSCOM TRDM, GSA, DSS, et al.). See paragraph 9.c. below. e. Revisions to DLM Manuals: The following paragraph will be added to Chapter 2 of Volume 6: C2.8. DoDAAD Data Security. The DoDAAD shall be marked and handled by all users as Controlled Unclassified Information For Official Use Only (FOUO). C The aggregated content of the DoDAAD (i.e., multiple DoDAACs and/or RICs and their respective data elements) is exempted from Public Release under the Freedom of Information Act (5 U.S.C. 552(b)(3)) because it meets the requirements for exemption under 10 U.S.C. 130e. Specifically, the DoDAAD database, as a single authoritative source for the Department of Defense (DoD) business enterprise architecture, qualifies as DoD critical infrastructure security information (CISI). CISI is categorized as FOUO, and as defined by 10 U.S.C. 130e, it includes: sensitive but unclassified information that, if disclosed, would reveal vulnerabilities in Department of Defense critical infrastructure that, if exploited, would likely result in the significant disruption, destruction, or damage of or to Department of Defense operations, property, or facilities, including information regarding the securing and safeguarding of explosives, hazardous chemicals, or pipelines, related to critical infrastructure or protected systems owned or operated by or on behalf of the Department of Defense, including vulnerability assessments prepared by or on behalf of the Department of Defense, explosives safety information (including storage and handling), and other site-specific information on or relating to installation security. C The DoD Director of Administration and Management (DA&M) has issued a Determination that the DoDAAD meets this definition of CISI, because it is comprised of both DoDAACs and RICs in an interactive relational database serving as a single authoritative source of identification, routing, and address information for authorized users, including Military Components and Agencies, participating Federal Agencies, authorized contractors, and authorized special program activities such as state and local governments. C DoDAAD supports business application systems data and interoperability requirements, including (but not limited to) supply chain, materiel procurement, and Page 7
9 acquisition systems. Each activity that requisitions, contracts for, receives, has custody of, issues, or ships DoD assets, or funds/pays bills for materials and/or services is identified by a DoDAAC (six-position alphanumeric code). C DoDAACs are used in a myriad of business systems spanning the entirety of the DoD s business enterprise architecture, including acquisition, procurement, contracting, requisitioning, shipping, billing, pay, maintenance, installations management, human resources, energy resources, and the accountability and requisition of ordnance, ammunition, and perishables in logistics systems across the DoD. DoDAACs are also used for business operations involving the accountability of property and facilities, as well as for hazardous material management. Access to the DoDAAD allows access to these DoDAACs. When coupled with access to other unclassified logistic systems, users are provided with multiple data points which, when combined, disclose location of materials and operational status and plans. The contents of the DoDAAD are sensitive for a number of reasons: DoDAACs are created to support sensitive operations and to facilitate the business process associated with them. DoDAACs for the following locations include names of employees and Service members as well as duty station addresses for: a. Department of Defense installations and ports that are outside the contiguous United States (OCONUS). b. Deployed units and activities performing real world contingency operations or exercises from both contiguous United States (CONUS) and OCONUS bases. c. Ships afloat. d. Ships still in CONUS ports but scheduled to go afloat. e. Ships still in OCONUS ports but scheduled to go afloat. f. Embassies. g. War Reserve Equipment sets pre-positioned OCONUS. C In addition, a DoDAAC could be used in an unauthorized way whereby the internal controls of the Agency can be circumvented and appropriations obligated without the proper authority being involved in the process. A DoDAAC is very much like a credit card number which, in the wrong hands, can be used to spend money without the rightful owner of the code (i.e., the entity with authority to use the code) being aware that the Agency s appropriations are being spent. Individuals have been prosecuted who have used a DoDAAC to purchase items (i.e., televisions) for personal gain. Therefore, effective management, control, and use of DoDAACs by all DoD Components is critical to ensure DoD fiscal responsibility. C If the DoDAAD were released, it would reveal vulnerabilities in Department of Defense critical infrastructure that, if exploited, would likely result in the significant disruption, destruction, or damage of or to DoD operations, property, or facilities related to critical infrastructure or protected systems owned or operated by or on behalf of the DoD. C If an adversary of the United States Government had the DoDAAD, they could determine the issuance of orders; the movement of specially qualified personnel to units and Page 8
10 the installation of special capabilities, as well as the conduct of activities in a way that will reveal intensification of preparations before initiating operations. From this information, the adversary could identify very sensitive DoD activities including clandestine locations of DoD activities, force structure, and even troop movement. f. Alternatives: None. 5. REASON FOR CHANGE: See Background above. 6. ADVANTAGES AND DISADVANTAGES: a. Advantages: (1) Implements required security controls for CISI/FOUO data. (2) Transfers the responsibility for granting access to the content of the DoDAAD away from the DLA Transaction Services Customer Support Desk and places it upon the individuals appointed by the Components with overall responsibility for the data the CSPs. b. Disadvantages: None. 7. ADDITIONAL FUNCTIONAL REQUIREMENTS: None noted. 8. ESTIMATED TIME LINE/IMPLEMENTATION TARGET: This change will be authorized for immediate implementation when this DLMS change is released as an ADC. DLA Transaction Services will implement these additional controls within 30 days of this ADC. 9. IMPACTS: a. New DLMS Data Elements: No new DLMS data elements. b. Changes to DLMS Data Elements: No changes to existing DLMS data elements. c. Automated Information Systems (AIS): Any system dependent upon DoDAAD data, or which receives and stores DoDAAD data, and allows users to download the data and/or retransmit it, must apply the same warning statement as identified in paragraph 3.d.(2)(a) above, to ensure CUI/FOUO compliance is maintained, and that proper handling instructions for such data is both published and adhered to accordingly. This applies to systems which obtain data directly from the DoDAAD, as well as any systems which obtain DoDAAD data via manual downloads by users from edaasinq. The following organizations/systems currently obtain data directly from the DoDAAD through replication: (1) OSD: Joint Organization Query (JOQ) (2) DLA: (a) DLA Logistics Information Systems (DLIS) (b) Enterprise Business System (EBS) (c) Wide Area Workflow System (WAWF) (d) Distribution Standard System (DSS) (3) U.S. TRANSCOM (4) U.S. Air Force: AFMC LSO Page 9
11 (5) U.S. Army: (a) Army Surface Deployment and Dist. Command (SDDC) (b) Logistics Support Activity (LOGSA) (c) Joint Munitions Command (JMC) (6) U.S. Navy: (a) Navy NCDOC (b) Navy Supply Information Systems Activity (NAVSISA) (7) U.S. Marine Corps: USMC Master Data Repository (MDR) (8) General Services Administration (GSA) (9) FAA Logistics Center Support (10) Coast Guard Business Intelligence (CGBI) d. DLA Transaction Services: See detailed change section above. e. Non-DLM Series Publications: The changes identified in this DLMS Change will need to be incorporated into the relevant Component-level DoDAAD management publications, including (but not limited to) the following: (1) U.S. Army: AR (2) U.S. Navy: NAVSO P (3) U.S. Air Force: AFI (4) U.S. Marine Corps: MCO H (5) U.S. Coast Guard: COMDTINST M (6) Defense Logistics Agency: DLAI 1401 (7) Defense Information Systems Agency: DISA Instruction (8) USTRANSCOM: DTR R 10. STAFFING RESPONSE/COMMENT RESOLUTION: PDC 1143 Comments Submitted Response Resolution Air Force Concurs without comment Noted Army Concurs without comment Noted DLA Silent Concurrence Noted DLA Transaction Services Concurs with comment Noted Marine Corps Concurs without comment Noted Navy Concurs with comment Navy commented on the implementation timeline. Page 10
DEFENSE LOGISTICS AGENCY HEADQUARTERS 8725 JOHN J. KINGMAN ROAD FORT BELVOIR, VIRGINIA 22060-6221
DEFENSE LOGISTICS AGENCY HEADQUARTERS 8725 JOHN J. KINGMAN ROAD FORT BELVOIR, VIRGINIA 22060-6221 April 01, 2014 MEMORANDUM FOR SUPPLY PROCESS REVIEW COMMITTEE (PRC) MEMBERS SUBJECT: Approved Defense Logistics
VOLUME 6 LOGISTICS SYSTEMS INTEROPERABILITY SUPPORT SERVICES
DLM 4000.25, Volume 6 DEFENSE LOGISTICS MANAGEMENT SYSTEM VOLUME 6 LOGISTICS SYSTEMS INTEROPERABILITY SUPPORT SERVICES June 5, 2012 DEPUTY ASSISTANT SECRETARY OF DEFENSE (SUPPLY CHAIN INTEGRATION) LOGISTICS
DLMS INTRODUCTORY TRAINING Module 6 Changing Logistics Business Processes
Defense Logistics Management Standards (DLMS) Introductory Training Creating/Reengineering DOD Logistics Business Processes Module 6 1 DLMS Training Catalog Module 1 - Introduction to the DLMS Module 2
PDC 459 Establish Utilization Code H/New MILSTRIP-Authorized Value for First Position of Requisition Document Number Serial Number for MSC
PDC 459 Establish Utilization Code H/New MILSTRIP-Authorized Value for First Position of Requisition Document Number Serial Number for MSC 1. ORIGINATING SERVICE/AGENCY AND POC INFORMATION: a. Technical
DLMSO June 1, 1998 MEMORANDUM FOR: DISTRIBUTION
DLMSO June 1, 1998 MEMORANDUM FOR: DISTRIBUTION SUBJECT: Approved Defense Logistics Standard System(DLMS) Change 9A, Validation of Force or Activity Designator (F/AD) I Activities The attachment is forwarded
PDC 294 FMS Requisitioning Procedures for Use of DoD EMALL. a. Service/Agency: Headquarters, Defense Logistics Agency
1. ORIGINATOR: PDC 294 FMS Requisitioning Procedures for Use of DoD EMALL a. Service/Agency: Headquarters, Defense Logistics Agency b. Originator: International Programs, Operations and Readiness Directorate
USMC DoDAAD Management. Tom Russell, Wellington Federal Jonathan Miller, One Network
USMC DoDAAD Tom Russell, Wellington Federal Jonathan Miller, One Network Opening Premise How do we definitively identify an organization? Reporting Unit Code Reporting Identification Code Unit Identification
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 7750.07 October 10, 2014 DoD CIO SUBJECT: DoD Forms Management Program References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD Instruction (DoDI)
Department of Defense MANUAL. b. Volume. This Volume provides guidance for the identification and protection of CUI.
Department of Defense MANUAL NUMBER 5200.01, Volume 4 February 24, 2012 USD(I) SUBJECT: DoD Information Security Program: Controlled Unclassified Information (CUI) References: See Enclosure 1 1. PURPOSE
Department of Defense MANUAL
Department of Defense MANUAL NUMBER 4140.01, Volume 8 February 10, 2014 USD(AT&L) SUBJECT: DoD Supply Chain Materiel Management Procedures: Materiel Data Management and Exchange References: See Enclosure
DEFENSE LOGISTICS AGENCY HEADQUARTERS 8725 JOHN J. KINGMAN ROAD FORT BELVOIR, VIRGINIA 22060-6221
DEFENSE LOGISTICS AGENCY HEADQUARTERS 8725 JOHN J. KINGMAN ROAD FORT BELVOIR, VIRGINIA 22060-6221 June 20, 2016 MEMORANDUM FOR SUPPLY DISCREPANCY REPORT (SDR) PROCESS REVIEW COMMITTEE (PRC) MEMBERS SUBJECT:
Welcome Package UPDATED July 2015 ` 2
1 Welcome Package UPDATED July 2015 ` 2 Table of Contents 1.0 Introduction to the Subsistence Prime Vendor Program 4 2.0 Introduction to the STORES Customer User Guide.5 3.0 Frequently Asked Questions..7
Department of Defense MANUAL. DoD Integrated Materiel Management (IMM) for Consumable Items: Operating Procedures for Item Management Coding (IMC)
Department of Defense MANUAL NUMBER 4140.26-M, Volume 1 September 24, 2010 USD(AT&L) SUBJECT: DoD Integrated Materiel Management (IMM) for Consumable Items: Operating Procedures for Item Management Coding
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5015.02 February 24, 2015 DoD CIO SUBJECT: DoD Records Management Program References: See Enclosure 1 1. PURPOSE. This instruction reissues DoD Directive (DoDD)
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8910.01 May 19, 2014 DoD CIO SUBJECT: Information Collection and Reporting References: See Enclosure 1 1. PURPOSE. This instruction: a. Reissues DoD Instruction
Movement of Cargo by Scheduled Military Air Transportation
Army Regulation 59 3 Air Transportation Movement of Cargo by Scheduled Military Air Transportation Headquarters Department of the Army Washington, DC 28 June 2013 UNCLASSIFIED SUMMARY of CHANGE AR 59 3
ATTACHMENT V5 AIR FORCE TRANSPORTATION ACCOUNT CODES (TACS)
A. GENERAL ATTACHMENT V5 AIR FORCE TRANSPORTATION ACCOUNT CODES (TACS) 1. This attachment provides guidance pertaining to the assignment of Air Force TACs for movement of Air Force sponsored cargo. Guidance
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5400.11 October 29, 2014 DCMO SUBJECT: DoD Privacy Program References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues DoD Directive (DoDD) 5400.11 (Reference
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5230.20 June 22, 2005 USD(P) SUBJECT: Visits and Assignments of Foreign Nationals References: (a) DoD Directive 5230.20, "Visits, Assignments, and Exchanges of Foreign
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
UNITED STATES POSTAL SERVICE. postal agreement with the department of defense
UNITED STATES POSTAL SERVICE postal agreement with the department of defense PUBLICATION 38 February 1980 FOREWORD Postal service for all branches of the Armed Forces is provided jointly by the U.S. Postal
1. ORIGINATOR: Defense Logistics Agency (DLA) J-331, 703-325-1924 (DSN 427)
ATTACHMENT TO PDC 412, New Denial Management Code to Support the New Protection Process at the NSYs when Protection Document Number/Job Order does not DSS Match Records under BRAC SS&D/IMSP 1. ORIGINATOR:
SECRETARY OF THE ARMY WASHINGTON
SECRETARY OF THE ARMY WASHINGTON 2 2 JUN 2016 MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Army Directive 2016-18 (Divesting Legacy Information Technology Hardware, Software, and Services in Support of the
Department of Defense MANUAL. DoD Integrated Materiel Management (IMM) for Consumable Items: Reporting, Auditing, and Financial Management
Department of Defense MANUAL NUMBER 4140.26-M, Volume 5 September 24, 2010 USD(AT&L) SUBJECT: DoD Integrated Materiel Management (IMM) for Consumable Items: Reporting, Auditing, and Financial Management
PERFORMANCE WORK STATEMENT. for. United States Air Forces in Europe (USAFE)/ Air Forces Africa (AFAFRICA)
PERFORMANCE WORK STATEMENT for United States Air Forces in Europe (USAFE)/ Air Forces Africa (AFAFRICA) Communications Directorate (A6) Task Management Tool (TMT) Support 1 TABLE OF CONTENTS Contract Number
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) 2. Name of IT System: Defense Biometric Identification System (DBIDS)
DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) (Use N/A where appropriate) 1. DoD Component: Defense Manpower Data Center (DMDC) 2. Name of IT System: Defense Biometric Identification System (DBIDS) 3. Budget
SUMMARY: The Office of the Secretary of Defense proposes to. alter a system of records notice DPFPA 02, entitled Pentagon
This document is scheduled to be published in the Federal Register on 02/11/2016 and available online at http://federalregister.gov/a/2016-02788, and on FDsys.gov Billing Code: 5001-06 DEPARTMENT OF DEFENSE
HTTPS://WWW.CPARS.CSD.DISA.MIL
User Manual for Contractor Performance Assessment Reporting System (CPARS) February 2010 Current Version 3.3.0 HTTPS://WWW.CPARS.CSD.DISA.MIL Foreword The purpose of this manual is to provide working-level
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1322.24 October 6, 2011 ASD(HA) SUBJECT: Reference: Medical Readiness Training (a) DoD Directive 5124.02, Under Secretary of Defense for Personnel and Readiness
Department of Defense INSTRUCTION. 1. PURPOSE. In accordance with DoD Directive (DoDD) 5124.02 (Reference (a)), this Instruction:
Department of Defense INSTRUCTION NUMBER 6430.02 August 17, 2011 USD(P&R) SUBJECT: Defense Medical Materiel Program References: See Enclosure 1 1. PURPOSE. In accordance with DoD Directive (DoDD) 5124.02
CASE MATTER MANAGEMENT TRACKING SYSTEM
for the CASE MATTER MANAGEMENT TRACKING SYSTEM September 25, 2009 Contact Point Mr. Donald A. Pedersen Commandant (CG-0948) (202) 372-3818 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
INSTRUCTION. Department of Defense. NUMBER 5230.24 August 23, 2012 USD(AT&L) Distribution Statements on Technical Documents
Department of Defense INSTRUCTION NUMBER 5230.24 August 23, 2012 USD(AT&L) SUBJECT: Distribution Statements on Technical Documents References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues
DEPARTMENT OF THE NAVY RECORDS MANAGEMENT PROGRAM
...-=". DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASH INGTON, D.C. 20350 2000 IN REPLY RE FER T O SECNAVINST 5210.8D DONCIO SECNAV INSTRUCTION 5210.8D From: Subj:
Subj: NAVY IMPLEMENTATION OF DEPARTMENT OF DEFENSE INTELLIGENCE INFORMATION SYSTEM (DODIIS) PUBLIC KEY INFRASTRUCTURE (PKI)
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 IN REPLY REFER TO OPNAVINST 5239.3A N2 OPNAV INSTRUCTION 5239.3A From: Chief of Naval Operations
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Assistance Reporting Tool (ART) Defense Health Agency (DHA) SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system or electronic
Defense Logistics Agency Effectively Managed Continental U.S. Mission-Critical Batteries
Report No. DoDIG-2014-032 I nspec tor Ge ne ral U.S. Department of Defense JA N UA RY 2 7, 2 0 1 4 Defense Logistics Agency Effectively Managed Continental U.S. Mission-Critical Batteries I N T E G R I
APPENDIX V TRANSPORTATION ACCOUNT CODE (TAC) PROCEDURES
A. PURPOSE APPENDIX V TRANSPORTATION ACCOUNT CODE (TAC) PROCEDURES This appendix establishes guidance, provides direction, and assigns responsibility for the assignment, use, and maintenance of TACs and
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3204.01 August 20, 2014 USD(AT&L) SUBJECT: DoD Policy for Oversight of Independent Research and Development (IR&D) References: See Enclosure 1 1. PURPOSE. This
TITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
Defense Logistics Agency. Turn-in Guidance for Disposition of Unclassified Computer Hard Drives
Defense Logistics Agency Turn-in Guidance for Disposition of Unclassified Computer Hard Drives 1 Foreword It is very important to check all your computer equipment and property prior to turn-in to the
This directive applies to all DHS organizational elements with access to information designated Sensitive Compartmented Information.
Department of Homeland Security Management Directives System MD Number: 11043 Issue Date: 09/17/2004 SENSITIVE COMPARTMENTED INFORMATION PROGRAM MANAGEMENT I. Purpose This directive establishes Department
The Defense Logistics Agency has provided supplies to America s fighting forces for 50 years. DLA was, and is, a vital player in America s national
The Defense Logistics Agency has provided supplies to America s fighting forces for 50 years. DLA was, and is, a vital player in America s national security infrastructure. Self Help Tools DLA s network
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1336.08 November 13, 2009 USD(P&R) SUBJECT: Military Human Resource Records Life Cycle Management References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
GOVERNMENT-INDUSTRY DATA EXCHANGE PROGRAM (GIDEP) REQUIREMENTS GUIDE
GIDEP PUBLICATION 1 GOVERNMENT-INDUSTRY DATA EXCHANGE PROGRAM (GIDEP) REQUIREMENTS GUIDE STATEMENT A APPROVED FOR PUBLIC RELEASE DISTRIBUTION UNLIMITED GOVERNMENT-INDUSTRY DATA EXCHANGE PROGRAM APRIL 2008
WIDE AREA WORKFLOW (WAWF) Electronic Invoicing
NAVFAC PACIFIC WIDE AREA WORKFLOW (WAWF) Electronic Invoicing 2012 NAVFAC Pacific Industry Forum Sherry Diones e-business Administrator i Acquisition, NAVFAC Pacific 26 March 2012 Background Problem: Acceptance
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Healthcare Continuing Education and Training Enterprise Subscription Service (Swank Healthcare) US Army Medical Command - Defense Health Program (DHP) Funded Application
Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
COMMAND, CONTROL, COMMUNICATIONS, COMPUTERS AND INFORMATION TECHNOLOGY (C4&IT) INFRASTRUCTURE MANAGEMENT POLICY
Commandant United States Coast Guard 2100 Second Street, S.W. Washington, DC 20593-0001 Staff Symbol: CG-6 Phone: (202) 267-2767 Fax: (202) 267-2598 COMDTINST 5230.70 FEB 11 2005 COMMANDANT INSTRUCTION
2. APPLICABILITY AND SCOPE
Department of Defense DIRECTIVE NUMBER 1000.25 July 19, 2004 Certified Current as of April 23, 2007 USD(P&R) SUBJECT: DoD Personnel Identity Protection (PIP) Program References: (a) DoD Directive 1000.22,
DSS Secret Internet Protocol Router Network (SIPRnet) Processing Procedures
DSS Secret Internet Protocol Router Network (SIPRnet) Processing Procedures Introduction DSS is the Cognizant Security Authority (CSA) for contractors participating in the National Industrial Security
Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System
Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the TOTAL WORKFORCE MANAGEMENT SERVICES (TWMS) Department of the Navy - CNIC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense (DoD) information system
ELECTRONIC SIGNATURES AND MANAGEMENT OF ELECTRONICALLY SIGNED RECORDS
Commandant United States Coast Guard 2100 Second Street, S.W. STOP 7101 Washington, DC 20593-7101 Staff Symbol: CG-6 Phone: (202) 475-3518 Fax: (202) 475-3929 COMDTINST 5200.5 FEB 3 2011 COMMANDANT INSTRUCTION
Privacy Impact Assessment for TRUFONE Inmate Telephone System
Federal Bureau of Prisons Privacy Impact Assessment for TRUFONE Inmate Telephone System Issued by: Sonya D. Thompson Reviewed by: Approved by: Vance E. Hitch, Chief Information Officer, Department of Justice
FACT SHEET. General Information About the Defense Contract Management Agency
FACT SHEET General Information About the Defense Contract Management Agency Mission: We provide Contract Administration Services to the Department of Defense Acquisition Enterprise and its partners to
Army Regulation 702 11. Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED
Army Regulation 702 11 Product Assurance Army Quality Program Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED SUMMARY of CHANGE AR 702 11 Army Quality Program This major
Selected Troublesome/Unacceptable Clauses Related to Information Release and Foreign Nationals
Selected Troublesome/Unacceptable Clauses Related to Information Release and Foreign Nationals (Note: Please review the applicable clause in the most current version available to you to ensure you have
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 6000.11 May 4, 2012 USD(P&R) SUBJECT: Patient Movement (PM) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Reissues DoD Instruction (DoDI) 6000.11
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Naval Audit Service Information Management System (NASIMS) Department of the Navy - DON/AA - NAVAUDSVC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 6010.22 January 21, 2003 Certified Current as of November 24, 2003 SUBJECT: National Disaster Medical System (NDMS) ASD(HA) References: (a) DoD Directive 3020.36,
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1322.19 March 14, 2013 USD(P&R) SUBJECT: Voluntary Education Programs in Overseas Areas References: See Enclosure 1. 1. PURPOSE. This instruction: a. Reissues DoD
Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise
Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 7050.06 April 17, 2015 IG DoD SUBJECT: Military Whistleblower Protection References: See Enclosure 1 1. PURPOSE. This directive reissues DoD Directive (DoDD) 7050.06
NAVY RECORDS MANAGEMENT PROGRAM COMMAND PROGRAM GUIDE
NAVY RECORDS MANAGEMENT PROGRAM COMMAND PROGRAM GUIDE Ref: (a) SECNAVINST 5210.8D, Department of the Navy Records Management Program, 31 December 2005 (b) SECNAV Manual M-5210.1, Department of the Navy,
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8320.03 November 4, 2015 USD(AT&L) SUBJECT: Unique Identification (UID) Standards for Supporting DoD Net-Centric Operations References: See Enclosure 1 1. PURPOSE.
Protected Critical Infrastructure Information Program Procedures Manual
Protected Critical Infrastructure Information Program Procedures Manual April 2009 PCII PROGRAM PROCEDURES AND GUIDANCE MANUAL As you read this Manual and participate in the PCII Program, you may have
Department of Defense INSTRUCTION. Presidential Recognition on Retirement from Military Service
Department of Defense INSTRUCTION NUMBER 1348.34 September 1, 2011 USD(P&R) SUBJECT: Presidential Recognition on Retirement from Military Service References: (a) DoD Instruction 1348.34, Presidential Recognition
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 2311.01E May 9, 2006 Incorporating Change 1, November 15, 2010 Certified Current as of February 22, 2011 GC, DoD SUBJECT: DoD Law of War Program References: (a) DoD
One Hundred Twelfth Congress of the United States of America
S. 3454 One Hundred Twelfth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday, the third day of January, two thousand and twelve An Act
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5154.31, Volume 2 October 16, 2015 USD(P&R) SUBJECT: Commercial Travel Management: General Travel Provisions References: See Enclosure 1 1. PURPOSE a. Instruction.
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1000.13 January 23, 2014 USD(P&R) SUBJECT: Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other Eligible Individuals References:
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course
U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
United States Antarctic Program Information Resource Management Directive 5000.01 The USAP Information Security Program
The National Science Foundation Office of Polar Programs United States Antarctic Program Information Resource Management Directive 5000.01 The USAP Information Security Program Organizational Function
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5144.02 November 21, 2014 DCMO SUBJECT: DoD Chief Information Officer (DoD CIO) References: See Enclosure 1. PURPOSE. Under the authority vested in the Secretary
Department of Defense INSTRUCTION. Telecommunications Services in the National Capital Region (NCR)
Department of Defense INSTRUCTION NUMBER 4640.07 September 24, 2009 Incorporating Change 2, August 10, 2012 DA&M SUBJECT: Telecommunications Services in the National Capital Region (NCR) References: See
DEFENSE LOGISTICS. Actions Needed to Improve Department-Wide Management of Conventional Ammunition Inventory
United States Government Accountability Office Report to the Chairman, Committee on Homeland Security and Governmental Affairs, U.S. Senate March 2014 DEFENSE LOGISTICS Actions Needed to Improve Department-Wide
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1100.13 January 15, 2015 USD(P&R) SUBJECT: DoD Surveys REFERENCES: See Enclosure 1 1. PURPOSE. In accordance with the authority in DoD Directive (DoDD) 5124.02
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5105.64 January 10, 2013 DA&M SUBJECT: Defense Contract Management Agency (DCMA) References: See Enclosure 1 1. PURPOSE. Pursuant to the authority vested in the Secretary
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 4205.01 March 10, 2009 USD(AT&L) SUBJECT: DoD Small Business Programs References: See Enclosure 1 1. PURPOSE. This Directive: a. Reissues DoD Directive 4205.01 (Reference
Military Uniform Procurement: Questions and Answers
Military Uniform Procurement: Questions and Answers Valerie Bailey Grasso Specialist in Defense Acquisition December 10, 2009 Congressional Research Service CRS Report for Congress Prepared for Members
Standards for Security Categorization of Federal Information and Information Systems
FIPS PUB 199 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Standards for Security Categorization of Federal Information and Information Systems Computer Security Division Information Technology
Defense Security Service (DSS)
Defense Security Service (DSS) Center for Development of Security Excellence (CDSE) ADMINISTRATIVE INQUIRY (AI) PROCESS JOB AID July 2011 TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 Scope... 1 2. PRELIMINARY
Acquisition. Controls for the DoD Aviation Into-Plane Reimbursement Card (D-2003-003) October 3, 2002
October 3, 2002 Acquisition Controls for the DoD Aviation Into-Plane Reimbursement Card (D-2003-003) Department of Defense Office of the Inspector General Quality Integrity Accountability Report Documentation
Introduction to The Privacy Act
Introduction to The Privacy Act Defense Privacy and Civil Liberties Office dpclo.defense.gov 1 Introduction The Privacy Act (5 U.S.C. 552a, as amended) can generally be characterized as an omnibus Code
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Enterprise Laboratory Information Management System (ELIMS) US Army Medical Command - DHP Funded System SECTION 1: IS A PIA REQUIRED? a. Will this Department of
Corporate Property Automated Information System CPAIS. Privacy Impact Assessment
Corporate Property Automated Information System CPAIS Privacy Impact Assessment May 2003 CONTENTS Background...3 Access to the Data...5 Maintenance of Administrative Controls...9 1 Introduction The Office
