10 USC Ch. 345: Front Matter
Result 1 of 1
   
 
10 USC Ch. 345: Front Matter
From Title 10-ARMED FORCESSubtitle A-General Military LawPART V-ACQUISITIONSubpart G-Other Special Categories Of ContractingCHAPTER 345-ACQUISITION OF INFORMATION TECHNOLOGY

CHAPTER 345-ACQUISITION OF INFORMATION TECHNOLOGY

Sec.
4571.
Information technology acquisition: planning and oversight processes.
4572.
[Reserved].
4573.
[Reserved].
4574.
[Reserved].
4575.
[Reserved].
4576.
Requirement for consideration of certain matters during acquisition of noncommercial computer software.

        

Editorial Notes

Prior Provisions

A prior chapter 345 "ACQUISITION OF INFORMATION TECHNOLOGY", consisting of reserved section 4571, was repealed by Pub. L. 116–283, div. A, title XVIII, §1857(a), Jan. 1, 2021, 134 Stat. 4276 .

Another prior chapter 345 was renumbered chapter 725 of this title.


Statutory Notes and Related Subsidiaries

Guidance on Acquisition of Business Systems

Pub. L. 114–92, div. A, title VIII, §883(e), Nov. 25, 2015, 129 Stat. 947 , provided that: "The Secretary of Defense shall issue guidance for major automated information systems acquisition programs to promote the use of best acquisition, contracting, requirement development, systems engineering, program management, and sustainment practices, including-

"(1) ensuring that an acquisition program baseline has been established within two years after program initiation;

"(2) ensuring that program requirements have not changed in a manner that increases acquisition costs or delays the schedule, without sufficient cause and only after maximum efforts to reengineer business processes prior to changing requirements;

"(3) policies to evaluate commercial off-the-shelf business systems for security, resilience, reliability, interoperability, and integration with existing interrelated systems where such system integration and interoperability are essential to Department of Defense operations;

"(4) policies to work with commercial off-the-shelf business system developers and owners in adapting systems for Department of Defense use;

"(5) policies to perform Department of Defense legacy system audits to determine which systems are related to or rely upon the system to be replaced or integrated with commercial off-the-shelf business systems;

"(6) policies to perform full backup of systems that will be changed or replaced by the installation of commercial off-the-shelf business systems prior to installation and deployment to ensure reconstitution of the system to a functioning state should it become necessary;

"(7) policies to engage the research and development activities and laboratories of the Department of Defense to improve acquisition outcomes; and

"(8) policies to refine and improve developmental and operational testing of business processes that are supported by the major automated information systems."

Designation of Military Department Entity Responsible for Acquisition of Critical Cyber Capabilities

Pub. L. 114–92, div. A, title XVI, §1645, Nov. 25, 2015, 129 Stat. 1117 , which required the Secretary of Defense to designate an entity within a military department to be responsible for the acquisition of certain critical cyber capabilities, was repealed by Pub. L. 117–263, div. A, title XV, §1509(j), Dec. 23, 2022, 136 Stat. 2890 .

Supervision of the Acquisition of Cloud Computing Capabilities

Pub. L. 113–66, div. A, title IX, §938, Dec. 26, 2013, 127 Stat. 835 , provided that:

"(a) Supervision.-

"(1) In general.-The Secretary of Defense shall, acting through the Under Secretary of Defense for Acquisition, Technology, and Logistics, the Under Secretary of Defense for Intelligence [now Under Secretary of Defense for Intelligence and Security], the Chief Information Officer of the Department of Defense, and the Chairman of the Joint Requirements Oversight Council, supervise the following:

"(A) Review, development, modification, and approval of requirements for cloud computing solutions for data analysis and storage by the Armed Forces and the Defense Agencies, including requirements for cross-domain, enterprise-wide discovery and correlation of data stored in cloud and non-cloud computing databases, relational and non-relational databases, and hybrid databases.

"(B) Review, development, modification, approval, and implementation of plans for the competitive acquisition of cloud computing systems or services to meet requirements described in subparagraph (A), including plans for the transition from current computing systems to systems or services acquired.

"(C) Development and implementation of plans to ensure that the cloud systems or services acquired pursuant to subparagraph (B) are interoperable and universally accessible and usable through attribute-based access controls.

"(D) Integration of plans under subparagraphs (B) and (C) with enterprise-wide plans of the Armed Forces and the Department of Defense for the Joint Information Environment and the Defense Intelligence Information Environment.

"(2) Direction.-The Secretary shall provide direction to the Armed Forces and the Defense Agencies on the matters covered by paragraph (1) by not later than March 15, 2014.

"(b) Integration With Intelligence Community Efforts.-The Secretary shall coordinate with the Director of National Intelligence to ensure that activities under this section are integrated with the Intelligence Community Information Technology Enterprise in order to achieve interoperability, information sharing, and other efficiencies.

"(c) Limitation.-The requirements of subparagraphs (B), (C), and (D) of subsection (a)(1) shall not apply to a contract for the acquisition of cloud computing capabilities in an amount less than $1,000,000.

"(d) Rule of Construction.-Nothing in this section shall be construed to alter or affect the authorities or responsibilities of the Director of National Intelligence under section 102A of the National Security Act of 1947 (50 U.S.C. 3024)."