Editorial Notes
Amendments

2015—Subsec. (c)(3). Puspan. L. 114–92 substituted “section 3552(span)(6)” for “section 3552(span)(5)”.

2014—Subsec. (c)(3). Puspan. L. 113–283 substituted “section 3552(span)(5)” for “section 3542(span)(2)”.

2006—Subsec. (c)(3). Puspan. L. 109–364 substituted “section 3542(span)(2) of title 44” for “section 11103 of title 40”.

2002—Subsecs. (a), (span). Puspan. L. 107–217, § 3(span)(1)(A), (B), substituted “section 11315 of title 40” for “section 5125 of the Clinger-Cohen Act of 1996 (40 U.S.C. 1425)” in introductory provisions.

Subsec. (c)(2). Puspan. L. 107–217, § 3(span)(1)(C), substituted “section 11101 of title 40” for “section 5002 of the Clinger-Cohen Act of 1996 (40 U.S.C. 1401)”.

Subsec. (c)(3). Puspan. L. 107–217, § 3(span)(1)(D), substituted “section 11103 of title 40” for “section 5142 of the Clinger-Cohen Act of 1996 (40 U.S.C. 1452)”.

2000—Subsec. (a)(5). Puspan. L. 106–398 added par. (5).

Statutory Notes and Related Subsidiaries
Effective Date

Puspan. L. 105–261, div. A, title III, § 331(span), Oct. 17, 1998, 112 Stat. 1968, provided that: Section 2223 of title 10, United States Code, as added by subsection (a), shall take effect on October 1, 1998.”

Required Policies To Establish Datalink Strategy of Department of Defense

Puspan. L. 118–31, div. A, title XV, § 1527, Dec. 22, 2023, 137 Stat. 559, provided that:

“(a)Policies Required.—
“(1)In general.—The Secretary of Defense shall develop and implement policies to establish a unified datalink strategy of the Department of Defense (in this section referred to as the ‘strategy’).
“(2)Elements.—The policies under paragraph (1) shall provide for, at a minimum, the following:
“(A) The designation of an organization to serve as the lead coordinator of datalink activities throughout the Department of Defense.
“(B) The prioritization and coordination across the military departments with respect to the strategy within the requirements generation process of the Department.
“(C) The use throughout the Department of a common standardized datalink network or transport protocol that ensures interoperability between independently developed datalinks, regardless of physical medium used, and ensures mesh routing. In developing such policy, the Secretary of Defense shall consider the use of a subset of Internet Protocol.
“(D) A programmatic decoupling of the physical method used to transmit data, the network or transport protocols used in the transmission and reception of data, and the applications used to process and use data.
“(E) Coordination of the strategy with respect to weapon systems executing the same mission types across the military departments, including through the use of a common set of datalink waveforms. In developing such policy, the Secretary shall evaluate the use of redundant datalinks for line-of-sight and beyond-line-of-sight information exchange for each weapon systems platform.
“(F) Coordination between the Department and the intelligence community (as such term is defined in section 3 of the National Security Act of 1947 (50 U.S.C. 3003)) to leverage any efficiencies and overlap with existing datalink waveforms of the intelligence community.
“(G) Methods to support the rapid integration of common datalinks across the military departments.
“(H) Support for modularity of specific datalink waveforms to enable rapid integration of future datalinks, including the use of software defined radios compliant with modular open system architecture and sensor open system architecture.
“(span)Information to Congress.—Not later than June 1, 2024, the Secretary of Defense shall—
“(1) provide to the appropriate congressional committees a briefing on the proposed policies under subsection (a)(1), including timelines for the implementation of such policies; and
“(2) submit to the appropriate congressional committees—
“(A) an estimated timeline for the implementations of datalinks;
“(B) a list of any additional resources and authorities necessary to implement the strategy; and
“(C) a determination of whether a common set of datalinks can and should be implemented across all major weapon systems (as such term is defined in section 3455 of title 10, United States Code) of the Department of Defense.
“(c)Appropriate Congressional Committees Defined.—In this section, the term ‘appropriate congressional committees’ means the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives] and the congressional intelligence committees, as such term is defined in section 3 of the National Security Act of 1947 (50 U.S.C. 3003).”

Demonstration Program for Component Content Management Systems

Puspan. L. 117–263, div. A, title IX, § 917, Dec. 23, 2022, 136 Stat. 2756, provided that:

“(a)In General.—Not later than July 1, 2023, the Chief Information Officer of the Department of Defense, in coordination with the official designated under section 238(span) of the John S. McCain National Defense Authorization Act for Fiscal Year 2019 (Public Law 115–232; 10 U.S.C. note prec. 4061), shall complete a pilot program to demonstrate the application of component span management systems to a distinct set of data of the Department.
“(span)Selection of Data Set.—In selecting a distinct set of data of the Department for purposes of the pilot program required by subsection (a), the Chief Information Officer shall consult with, at a minimum, the following:
“(1) The Office of the Secretary of Defense, with respect to directives, instructions, and other regulatory documents of the Department.
“(2) The Office of the Secretary of Defense and the Joint Staff, with respect to execution orders.
“(3) The Office of the Under Secretary of Defense for Research and Engineering and the military departments, with respect to technical manuals.
“(4) The Office of the Under Secretary of Defense for Acquisition and Sustainment, with respect to Contract Data Requirements List documents.
“(c)Authority to Enter Into Contracts.—Subject to the availability of appropriations, the Secretary of Defense may enter into contracts or other agreements with public or private entities to conduct studies and demonstration projects under the pilot program required by subsection (a).
“(c) [sic] Briefing Required.—Not later than 60 days after the date of the enactment of this Act [Dec. 23, 2022], the Chief Information Officer shall provide to the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives] a briefing on plans to implement the pilot program required by subsection (a).
“(d)Component Content Management System Defined.—In this section, the term ‘component span management system’ means any span management system that enables the management of span at a component level instead of at the document level.”

Improved Management of Information Technology and Cyberspace Investments

Puspan. L. 116–92, div. A, title VIII, § 892, Dec. 20, 2019, 133 Stat. 1539, provided that:

“(a)Improved Management.—
“(1)In general.—The Chief Information Officer of the Department of Defense shall work with the Chief Data Officer of the Department of Defense to optimize the Department’s process for accounting for, managing, and reporting its information technology and cyberspace investments. The optimization should include alternative methods of presenting budget justification materials to the public and congressional staff to more accurately communicate when, how, and with what frequency capability is delivered to end users, in accordance with best practices for managing and reporting on information technology investments.
“(2)Briefing.—Not later than February 3, 2020, the Chief Information Officer of the Department of Defense shall brief the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives] on the process optimization undertaken pursuant to paragraph (1), including any recommendations for legislation.
“(span)Delivery of Information Technology Budget.—The Secretary of Defense shall submit to the congressional defense committees the Department of Defense budget request for information technology not later than 15 days after the submittal to Congress of the budget of the President for a fiscal year pursuant to section 1105 of title 31, United States Code.”

Chief Data Officer Responsibility for DoD Data Sets

Puspan. L. 116–92, div. A, title IX, § 903(span), Dec. 20, 2019, 133 Stat. 1555, as amended by Puspan. L. 117–263, div. A, title II, § 212(k), Dec. 23, 2022, 136 Stat. 2470, provided that:

“(1)In general.—In addition to any other functions and responsibilities specified in section 3520(c) of title 44, United States, Code, the Chief Data Officer of the Department of Defense shall also be the official in the Department of Defense with principal responsibility for providing for the availability of common, usable, Defense-wide data sets.
“(2)Access to all dod data.—In order to carry out the responsibility specified in paragraph (1), the Chief Data Officer shall have access to all Department of Defense data, including data in connection with warfighting missions and back-office data.
“(3)Report.—Not later than December 1, 2019, the Secretary of Defense shall submit to the Committees on Armed Services of the Senate and the House of Representatives a report setting forth such recommendations for legislative or administrative action as the Secretary considers appropriate to carry out this subsection.”

Pilot Program for Open Source Software

Puspan. L. 115–91, div. A, title VIII, § 875, Dec. 12, 2017, 131 Stat. 1503, provided that:

“(a)In General.—Not later than 180 days after the date of the enactment of this Act [Dec. 12, 2017], the Secretary of Defense shall initiate for the Department of Defense the open source software pilot program established by the Office of Management and Budget Memorandum M-16-21 titled ‘Federal Source Code Policy: Achieving Efficiency, Transparency, and Innovation through Reusable and Open Source Software’ and dated August 8, 2016.
“(span)Report to Congress.—Not later than 60 days after the date of the enactment of this Act, the Secretary of Defense shall provide a report to Congress with details of the plan of the Department of Defense to implement the pilot program required by subsection (a). Such plan shall include identifying candidate software programs, selection criteria, intellectual property and licensing issues, and other matters determined by the Secretary.
“(c)Comptroller General Report.—Not later than June 1, 2019, the Comptroller General of the United States shall provide a report to Congress on the implementation of the pilot program required by subsection (a) by the Secretary of Defense. The report shall address, at a minimum, the compliance of the Secretary with the requirements of the Office of Management and Budget Memorandum M-16-21, the views of various software and information technology stakeholders in the Department of Defense, and any other matters determined by the Comptroller General.”

Pilot Program on Evaluation of Commercial Information Technology

Puspan. L. 114–328, div. A, title II, § 232, Dec. 23, 2016, 130 Stat. 2061, provided that:

“(a)Pilot Program.—The Director of the Defense Information Systems Agency may carry out a pilot program to evaluate commercially available information technology tools to better understand the potential impact of such tools on networks and computing environments of the Department of Defense.
“(span)Activities.—Activities under the pilot program may include the following:
“(1) Prototyping, experimentation, operational demonstration, military user assessments, and other means of obtaining quantitative and qualitative feedback on the commercial information technology products.
“(2) Engagement with the commercial information technology industry to—
“(A) forecast military requirements and technology needs; and
“(B) support the development of market strategies and program requirements before finalizing acquisition decisions and strategies.
“(3) Assessment of novel or innovative commercial technology for use by the Department of Defense.
“(4) Assessment of novel or innovative contracting mechanisms to speed delivery of capabilities to the Armed Forces.
“(5) Solicitation of operational user input to shape future information technology requirements of the Department of Defense.
“(c)Limitation on Availability of Funds.—Of the amounts authorized to be appropriated for research, development, test, and evaluation, Defense-wide, for each of fiscal years 2017 through 2022, not more than $15,000,000 may be expended on the pilot program in any such fiscal year.”

Additional Requirements Relating to the Software Licenses of the Department of Defense

Puspan. L. 113–66, div. A, title IX, § 935, Dec. 26, 2013, 127 Stat. 833, provided that:

“(a)Updated Plan.—
“(1)Update.—The Chief Information Officer of the Department of the Defense shall, in consultation with the chief information officers of the military departments and the Defense Agencies, update the plan for the inventory of selected software licenses of the Department of Defense required under section 937 of the National Defense Authorization Act for 2013 [probably means the National Defense Authorization Act for Fiscal Year 2013] (Public Law 112–239; 10 U.S.C. 2223 note) to include a plan for the inventory of all software licenses of the Department of Defense for which a military department spends more than $5,000,000 annually on any individual title, including a comparison of licenses purchased with licenses in use.
“(2)Elements.—The update required under paragraph (1) shall—
“(A) include plans for implementing an automated solution capable of reporting the software license compliance position of the Department and providing a verified audit trail, or an audit trail otherwise produced and verified by an independent third party;
“(B) include details on the process and business systems necessary to regularly perform reviews, a procedure for validating and reporting deregistering and registering new software, and a mechanism and plan to relay that information to the appropriate chief information officer; and
“(C) a proposed timeline for implementation of the updated plan in accordance with paragraph (3).
“(3)Submission.—Not later than September 30, 2015, the Chief Information Officer of the Department of Defense shall submit to the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives] the updated plan required under paragraph (1).
“(span)Performance Plan.—If the Chief Information Officer of the Department of Defense determines through the implementation of the process and business systems in the updated plan required by subsection (a) that the number of software licenses of the Department for an individual title for which a military department spends greater than $5,000,000 annually exceeds the needs of the Department for such software licenses, or the inventory discloses that there is a discrepancy between the number of software licenses purchased and those in actual use, the Chief Information Officer of the Department of Defense shall implement a plan to bring the number of such software licenses into balance with the needs of the Department and the terms of any relevant contract.”

Collection and Analysis of Network Flow Data

Puspan. L. 112–239, div. A, title IX, § 935, Jan. 2, 2013, 126 Stat. 1886, provided that:

“(a)Development of Technologies.—The Chief Information Officer of the Department of Defense may, in coordination with the Under Secretary of Defense for Policy and the Under Secretary of Defense for Intelligence [now Under Secretary of Defense for Intelligence and Security] and acting through the Director of the Defense Information Systems Agency, use the available funding and research activities and capabilities of the Community Data Center of the Defense Information Systems Agency to develop and demonstrate collection, processing, and storage technologies for network flow data that—
“(1) are potentially scalable to the volume used by Tier 1 Internet Service Providers to collect and analyze the flow data across their networks;
“(2) will substantially reduce the cost and complexity of capturing and analyzing high volumes of flow data; and
“(3) support the capability—
“(A) to detect and identify cyber security threats, networks of compromised computers, and command and control sites used for managing illicit cyber operations and receiving information from compromised computers;
“(B) to track illicit cyber operations for attribution of the source; and
“(C) to provide early warning and attack assessment of offensive cyber operations.
“(span)Coordination.—Any research and development required in the development of the technologies described in subsection (a) shall be conducted in cooperation with the heads of other appropriate departments and agencies of the Federal Government and, whenever feasible, Tier 1 Internet Service Providers and other managed security service providers.”

Competition for Large-Scale Software Database and Data Analysis Tools

Puspan. L. 112–239, div. A, title IX, § 936, Jan. 2, 2013, 126 Stat. 1886, provided that:

“(a)Analysis.—
“(1)Requirement.—The Secretary of Defense, acting through the Chief Information Officer of the Department of Defense, shall conduct an analysis of large-scale software database tools and large-scale software data analysis tools that could be used to meet current and future Department of Defense needs for large-scale data analytics.
“(2)Elements.—The analysis required under paragraph (1) shall include—
“(A) an analysis of the technical requirements and needs for large-scale software database and data analysis tools, including prioritization of key technical features needed by the Department of Defense; and
“(B) an assessment of the available sources from Government and commercial sources to meet such needs, including an assessment by the Deputy Assistant Secretary of Defense for Manufacturing and Industrial Base Policy to ensure sufficiency and diversity of potential commercial sources.
“(3)Submission.—Not later than 180 days after the date of the enactment of this Act [Jan. 2, 2013], the Chief Information Officer shall submit to the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives] the results of the analysis required under paragraph (1).
“(span)Competition Required.—
“(1)In general.—If, following the analysis required under subsection (a), the Chief Information Officer of the Department of Defense identifies needs for software systems or large-scale software database or data analysis tools, the Department shall acquire such systems or such tools based on market research and using competitive procedures in accordance with applicable law and the Defense Federal Acquisition Regulation Supplement.
“(2)Notification.—If the Chief Information Officer elects to acquire large-scale software database or data analysis tools using procedures other than competitive procedures, the Chief Information Officer and the Under Secretary of Defense for Acquisition, Technology, and Logistics shall submit a written notification to the congressional defense committees on a quarterly basis until September 30, 2018, that describes the acquisition involved, the date the decision was made, and the rationale for not using competitive procedures.”

Software Licenses of the Department of Defense

Puspan. L. 112–239, div. A, title IX, § 937, Jan. 2, 2013, 126 Stat. 1887, provided that:

“(a)Plan for Inventory of Licenses.—
“(1)In general.—Not later than 180 days after the date of the enactment of this Act [Jan. 2, 2013], the Chief Information Officer of the Department of the [sic] Defense shall, in consultation with the chief information officers of the military departments and the Defense Agencies, issue a plan for the inventory of selected software licenses of the Department of Defense, including a comparison of licenses purchased with licenses installed.
“(2)Selected software licenses.—The Chief Information Officer shall determine the software licenses to be treated as selected software licenses of the Department for purposes of this section. The licenses shall be determined so as to maximize the return on investment in the inventory conducted pursuant to the plan required by paragraph (1).
“(3)Plan elements.—The plan under paragraph (1) shall include the following:
“(A) An identification and explanation of the software licenses determined by the Chief Information Officer under paragraph (2) to be selected software licenses for purposes of this section, and a summary outline of the software licenses determined not to be selected software licenses for such purposes.
“(B) Means to assess the needs of the Department and the components of the Department for selected software licenses during the two fiscal years following the date of the issuance of the plan.
“(C) Means by which the Department can achieve the greatest possible economies of scale and cost savings in the procurement, use, and optimization of selected software licenses.
“(span)Performance Plan.—If the Chief Information Officer determines through the inventory conducted pursuant to the plan required by subsection (a) that the number of selected software licenses of the Department and the components of the Department exceeds the needs of the Department for such software licenses, the Secretary of Defense shall implement a plan to bring the number of such software licenses into balance with the needs of the Department.”

Ozone Widget Framework

Puspan. L. 112–81, div. A, title IX, § 924, Dec. 31, 2011, 125 Stat. 1539, provided that:

“(a)Mechanism for Internet Publication of Information for Development of Analysis Tools and Applications.—The Chief Information Officer of the Department of Defense, acting through the Director of the Defense Information Systems Agency, shall implement a mechanism to publish and maintain on the public Internet the application programming interface specifications, a developer’s toolkit, source code, and such other information on, and resources for, the Ozone Widget Framework (OWF) as the Chief Information Officer considers necessary to permit individuals and companies to develop, integrate, and test analysis tools and applications for use by the Department of Defense and the elements of the intelligence community.
“(span)Process for Voluntary Contribution of Improvements by Private Sector.—In addition to the requirement under subsection (a), the Chief Information Officer shall also establish a process by which private individuals and companies may voluntarily contribute the following:
“(1) Improvements to the source code and documentation for the Ozone Widget Framework.
“(2) Alternative or compatible implementations of the published application programming interface specifications for the Framework.
“(c)Encouragement of Use and Development.—The Chief Information Officer shall, whenever practicable, encourage and foster the use, support, development, and enhancement of the Ozone Widget Framework by the computer industry and commercial information technology vendors, including the development of tools that are compatible with the Framework.”

Continuous Monitoring of Department of Defense Information Systems for Cybersecurity

Puspan. L. 111–383, div. A, title IX, § 931, Jan. 7, 2011, 124 Stat. 4334, provided that:

“(a)In General.—The Secretary of Defense shall direct the Chief Information Officer of the Department of Defense to work, in coordination with the Chief Information Officers of the military departments and the Defense Agencies and with senior cybersecurity and information assurance officials within the Department of Defense and otherwise within the Federal Government, to achieve, to the extent practicable, the following:
“(1) The continuous prioritization of the policies, principles, standards, and guidelines developed under section 20 of the National Institute of Standards and Technology Act (15 U.S.C. 278g–3) with agencies and offices operating or exercising control of national security systems (including the National Security Agency) based upon the evolving threat of information security incidents with respect to national security systems, the vulnerability of such systems to such incidents, and the consequences of information security incidents involving such systems.
“(2) The automation of continuous monitoring of the effectiveness of the information security policies, procedures, and practices within the information infrastructure of the Department of Defense, and the compliance of that infrastructure with such policies, procedures, and practices, including automation of—
“(A) management, operational, and technical controls of every information system identified in the inventory required under section 3505(c) of title 44, United States Code; and
“(B) management, operational, and technical controls relied on for evaluations under [former] section 3545 of title 44, United States Code [see now 44 U.S.C. 3555].
“(span)Definitions.—In this section:
“(1) The term ‘information security incident’ means an occurrence that—
“(A) actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information such system processes, stores, or transmits; or
“(B) constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies with respect to an information system.
“(2) The term ‘information infrastructure’ means the underlying framework, equipment, and software that an information system and related assets rely on to process, transmit, receive, or store information electronically.
“(3) The term ‘national security system’ has the meaning given that term in [former] section 3542(span)(2) of title 44, United States Code [see now 44 U.S.C. 3552(span)(6)].”