Friday 28 February 2014

Commanders of Army components, Army commands, Army service component commands

 The Army CIO/G–6, Army Cyber Command/Second U.S. Army, and ACOM, ASCC, and DRU (as authorized by their respective HQDA elements) commanders are strategic partners. Together, they achieve the standardization, compatibili-ty, interoperability Enterprise Email, security, and resourcing of the LandWarNet global network enterprise to ensure Warfighter decision superiority. For the internal IM and IT responsibilities of their commands, commanders will—

a. Establish a senior IM official who is responsible for implementing the command’s IM and IT program in accordance with IM and IT policies, as prescribed by the Army CIO. Command senior IM officials will directly supervise the IM staff, related programs, and activities as prescribed by the Army Cyber Command/Second U.S. Army, including to—
http://www.nationalguard.mil/news/archives/2012/04/images/043012-Kuwait-full.jpg
(1)    Provide, as required, representation to the Army CIO EB and associated working groups and committees.

(2)    Identify the command’s IT requirements and ensure that mission requirements are validated, coordinated, and integrated in accordance with AR 71–9. Collaborate with NECs to obtain command-unique IT requirements beyond common-use services and when acquiring any mission-unique IT products.

(3)    Monitor command mission-related IM requirements throughout their life cycle, including those requirements for subordinate organizations located on other installations for IT requirements not included as part of established, common use IT.
(4)    Submit requests and requirements for mission-driven, installation-level IT infrastructure implementations (out-side cable plant connectivity, campus area switching upgrades, and so forth) to the local installation NEC for processing through NETCOM to the Army CIO/G–6 for ultimate approval or disapproval (see DA Pam 25–1–1 for complete process).

(5)    Fund command-unique IT requirements in support of mission and business, including long-haul communications, IA, and other IT requirements not identified as part of common-use IT or LandWarNet global network enterprise capability.

(6)    Coordinate IT plans, programs, and requirements with appropriate information assurance managers in accordance with AR 25–2.

(7)    Develop, manage, and maintain IT contingency plans, as prescribed by NETCOM, to ensure the uninterrupted execution of essential missions and functions under all conditions (see DA Pam 25–1–2).

(8)    Obtain certificates of networthiness supported by the application Security Technical Implementation Guide (STIG), authority to operate, and AIC.

Validate IP address requests from subordinates and ensure that only IP addresses registered by the Army through the procedures published by Army Cyber Command/Second U.S. Army are employed on networks within their purview.
http://usarmy.vo.llnwd.net/e2/rv5_images/yearinphotos/2011/photos/october/full/army_2011_1008-2.jpg
(10)    Develop AEA artifacts for respective command-unique functions and act as the integrator for any “system of systems” under their purview, as prescribed by the Army CIO (see DA Pam 25–1–1).

(11)    Enforce DISR compliance for designated systems.

Analyze and revise mission-related and administrative work processes necessary to complement pending, significant IT investments.

Administrative Assistant to the Secretary of the Army


http://usarmy.vo.llnwd.net/e2/-images/2011/01/26/97453/size0-army.mil-97453-2011-01-26-060145.jpg
In addition to the duties listed in paragraph 2–4, the AASA will—

a.    Serve as Archivist of the Army.

b.    As the Archivist of the Army, the AASA will designate a Senior Agency Official (SAO) to oversee and review the Army records management program. Ensure that records related to matters involved in administrative or legal proceedings are retained until the staff judge advocate or legal advisor authorizes resumption of normal disposition.

c.    Oversee the ARIMS, including to—

(1)    Serve as the proponent for AR 25–400–2.

(2)    Advise the Secretary of the Army (SECARMY) concerning the destruction of records in legal custody in an Army repository outside the continental United States (OCONUS) during a state of war between the United States and another nation or when hostile action (by a foreign power, terrorist agents, or public demonstrators) seems imminent in accordance with 44 USC 3311.

(3)    Establish life-cycle management instructions for the systematic identification, maintenance, storage, retrieval, retirement, and destruction of Army information recorded on any medium (for example, paper, microforms, and electronic records).

(4)    Ensure that mission-essential records are available in a usable format; and created, maintained, used, and disposed of at the least possible cost.

(5) Preserve records needed to protect the rights and interests of the Army and its current and former members, and records that are of permanent value (see AR 25–55 and AR 340–21).

d.    Develop and maintain the Army Information Collection Budget required by 44 USC 35.

e.    Establish records declassification requirements in accordance with Executive Order (EO) 12958.

f.    Advise the SECARMY concerning the destruction of records that are in legal custody in an Army repository OCONUS during a state of war between the United States and another nation; or when hostile action (by a foreign power, terrorist agents, or public demonstrators) seems imminent.

g.    Oversee the Army Privacy Program.

h.    Serve as the records official for HQDA as an ACOM.

i.    Serve as the Army’s representative to receive and resolve claims that allege Army information disseminated to the public does not comply with information quality standards issued by the OMB. (See also chap 5 of this publication.)

j.    Oversee the Army Publishing Program (APP), including to—

(1)    Be the proponent for AR 25–30.

(2)    Establish policy and exercise program management for Army publications and printing, except areas defined in AR 115–11, which governs Army topography.

(3)    Establish policy, procedures, and standards for control, production, issue, storage, and distribution of Army publications and forms.

(4)    Serve as the HQDA point of contact (POC) on publishing policy issues with the chairman of the Joint Committee on Printing, the Public Printer, the Government Printing Office Enterprise Email, the Director of Bureau of Engraving and Printing, and the Administrator of the General Services Administration (GSA).

(5)    Oversee modernized processes for the paperless development, storage, and distribution of Army publications. k. Manage Army Multimedia and Visual Information Directorate (AMVID) operations.
l. Serve as the authenticating official for all departmental publications, except Army General Orders that the
SECARMY authenticates.

m.    Serve as the sole Army organization authorized to execute contracts for productions in their entirety for the Army, Defense agencies, and as required, other components and Federal agencies.

n.    Monitor IT for HQDA internal use. The IM function within HQDA is prescribed by the Army CIO and Army Cyber Command/Second U.S. Army, and executed by the HQDA Information Technology Agency. The Information Technology Agency will—

(1)    Integrate and act as the functional and process proponent of internal HQDA information requirements common to more than one HQDA element or agency.

(2)    Accomplish all the IM and IT responsibilities for HQDA as those assigned to ACOM commanders (see 2–16 for more information).

(3)    Provide IM common services and operational information support to HQDA.

(4)    Provide an HQDA perspective to the Army IM and IT strategic planning.

(5)    Provide information management officer (IMO) support for the Office of the Secretary of the Army; the Office of the Chief of Staff, Army; and supported activities.

o.    Manage and oversee the HQDA Telework Program as prescribed in DA Memo 690–8.

Formulate, operate, maintain, and defend the Defense Telecommunication Service-Washington, in accordance with DODI 4640.07.

Assistant Secretary of the Army (Acquisition, Logistics, and Technology)

In addition to the duties listed in paragraph 2–4, the Army CIO/G–6 and the ASA (ALT) are strategic partners in transforming Warfighter-required capabilities into standardized, compatible, interoperable, secure, and resourced DM and PfM solutions. Responsibilities for the ASA (ALT) are defined in AR 70–1. The ASA (ALT) responsibilities unique to IT are to—

a. Serve as the source selection authority (or delegate the source selection authority responsibility) for acquiring IT

systems, working together with the Army CIO/G–6. This includes assisting the GFEA lead in the Acquisition IT Program implementation.

b. Direct and review command, control, communications, and intelligence systems; target acquisition systems; and direct tactical IT requiring research, development, test, and evaluation (RDT&E) efforts.

c. Execute the planning, programming Enterprise Email, budgeting, and life cycle management necessary for the research, develop-ment, and acquisition of ISs required for strategic and tactical programs.

d. Execute the RDT&E and procurement portions of IT programs and budgets, in collaboration with the Army CIO/ G–6.
http://usarmy.vo.llnwd.net/e2/c/images/2012/01/20/232645/original.jpg
e. Oversee the IT base relative to its impact on the Army industrial base.

f.    Review IT system readiness for testing during full-scale development.

g.    Participate as a core member of the BSIT-ESG in the role of materiel provider.

h.    Ensure that project managers (PMs) and program executive officers (PEOs) successfully complete developmental interoperability assessments prior to AIC.

i.    Ensure that PMs and PEOs design, build, test, and field IP-enabled IT and NSSs to efficiently use IP address space. Coordinate materiel solution, and IP address space requirements with TRADOC and Army Cyber Command/ Second U.S. Army as required.

j.    Review and approve the Army position for acquisition category (ACAT) ID and ACAT IAM programs at each decision milestone, before the Defense Acquisition Board or IT Acquisition Board review. This includes the review and approval of acquisition program baselines (see DODI 5000.2 for further clarification on ACAT programs).

k.    Serve as the milestone decision authority for Army ACAT IC, ACAT IAC, and ACAT II programs.

l.    Serve as the Army executive architect for mission command system architectures. In the mission command segment, validate Army system views and ensure managed programs develop system views that are integrated with approved operational views (OVs), as prescribed by TRADOC and approved standards views as prescribed by the Army CIO/G–6.

m.    Approve and assign software reuse domains and domain management responsibility, based on recommendations from the CIO/G–6.

n.    Ensure that materiel developers comply with software assurance, technical architecture (TA), AIC, and baseline configuration management policies and procedures.

o.    Ensure that PEOs and PMs comply with AIC policy (chap 6) and configuration-management procedures, and that they resource adequately for systems to undergo AIC testing (see DA Pam 25–1–1).

p.    Serve as the Army’s domain lead for the acquisition sub-segment within the GFEA segment.

Serve as the Army’s system engineer responsible for planning, developing, acquiring, fielding, sustaining, and properly disposing of equipment and services; and leveraging technologies and capabilities to meet current and future Army needs. Apply approved system-engineering methods to ensure the integration and interoperability of all Army C4ISR programs of record.

Principal officials, Headquarters, Department of the Army

Within their respective areas of functional and process proponency, principal officials, HQDA will—

a.    Serve as the HQDA proponent for information requirements and associated capabilities within assigned functional areas of responsibility.

b.    Oversee functional processes within respective functional portfolio areas to maximize end-to-end enterprise processes and reduce redundancy in systems and local processes.

c.    Analyze their missions and revise their mission-related and administrative work processes, as appropriate, before making significant IT investments in support of those processes.

d.    Request and defend the capabilities and supporting resources needed for the development, deployment, operation, security, logistics support, and modification of ISs through the PPBE process.

e.    In coordination with their mission area architect, develop rules-based architectures for their respective functional segments; act as the integrator for any “system of systems” under their purview Enterprise Email; and coordinate with CIO/G–6, as needed, on AEA documentation.

f.    Use E-Gov technologies to the maximum extent practicable to promote the goal of a paper-free (or nearly paper-free) business environment within the Army.

g.    Manage and oversee the records of respective functional areas to appropriately secure, maintain, and preserve them throughout their life cycle (see DA Pam 25–1–1, AR 25–400–2, DA Memo 25–51, and DA Pam 25–403 for additional responsibilities and information on the life cycle of records).
http://www.nationalguard.mil/news/archives/2008/07/images/072808-British_soldiers-full.jpg
h.    Identify functional requirements for Army enterprise ISs and, as required, participate in related governance and advisory board activities.

i.    Establish IT PfM processes for assigned mission areas in order to define and justify planned IT expenditures that are consistent with DOD and Army guidance.

j.    Administer a telework program for their respective organizations and subordinate elements as prescribed in DOD and HQDA policy and guidance (see DA Memo 690–8 for more information).

k.    Provide a subject matter expert who will serve as a data steward under the direction of the Chief Data Officer; and who will also be responsible to develop, implement, and enforce Federal, Army, and organizational data standards, processes, and procedures.

Under Secretary of the Army 

In addition to the duties listed in paragraph 2–4, the Under Secretary of the Army, or a designated representative, will—

a. Serve as the Army’s lead for generating force enterprise activities (GFEAs).

b.    Serve as the Chief Management Officer (CMO) for the management, coordination, oversight, and synchronization of the generating force’s business operations, processes, and decisionmaking procedures. This includes assisting with the integration and management of IT capabilities and services within the Generating Force through the Office of Business Transformation’s (OBT) Directorate of Business Operations.

c.    Preside over the BSIT-ESG.

Ensure that a single, integrated architecture for GFEA exists to support the Business Enterprise Architecture (BEA) and provide architecture products for integration into the AEA.

The U.S. Army Network Enterprise Technology Command

NETCOM will provide enterprise management and services, including to—

a.    Serve as the DAA for the Army enterprise, as directed by the CIO/G6.

b.    Serve as the Army IT integrator to achieve a single, virtual, Enterprise Network by advising the end-to-end management of the Army’s enterprise service area (service delivery, service operations, and infrastructure management) using the AEA and IEA. Provide Army network enterprise services and capabilities, including the mandated core enterprise services of the DOD Information Enterprise Architecture, installation IT services, and network connectivity. Prescribe the Army’s IT Service Management Program—
(1)    Prescribe all service delivery activities, policies, processes, procedures, and protocols for configuration manage-ment, availability management, capacity management, change management, and release management for the Army’s networks Enterprise Email, systems, and functional processing centers. This includes technical and operational authority for any system architecture design or device that impacts the Army global-enterprise network and enabling technologies.

(2)    Prescribe all service operations activities, policies, processes, procedures, and protocols for incident manage-ment, event management, problem management, spectrum management, and database and Internet Web management for the Army’s networks, systems, and functional processing centers. This includes technical and operational authority over capabilities that impact the Army global-enterprise network and enabling technologies.

(3)    Prescribe all infrastructure management activities, policies, processes, procedures, and protocols for network and telecommunications management, facilities management, data storage management, IT services continuity management, and mid- and mainframe management for the Army’s networks, systems, and functional processing centers. This includes technical and operational authority over capabilities that impact the global-enterprise network and enabling technologies.

c.    Prescribe security of assigned fixed-station communications facilities and Army contractor telecommunications.

d.    Prescribe requirements for mobile or transportable communications assets to support assigned missions and functions.

e.    Organize and chair the LandWarNet technical configuration control board, and direct the Army enterprise configuration control and release management.

f.    Advocate for transformation, and engineer the enterprise network to efficiently and effectively serve the needs of the Army.

g.    Oversee Army leases of telecommunications services, and ensure that such services conform to DOD and National Communications Systems guidance.
http://www.eur.army.mil/21tsc/16sb/images/ClipArt/US_Army_logo.png
h.    Oversee the Army Military Affiliate Radio System program, including amateur radio operators licensed to operate as a Military Affiliate Radio System member (see AR 25–6).

i.    Support CIO/G6 to prescribe resources (people, projects, technology, and infrastructure) for service delivery, service operations, infrastructure management, IA, and network defense.

j.    Prescribe communication services in support of the news media during field exercises, contingencies, and combat operations when commercial capabilities are not available.

k.    Prescribe thees Army’s Networthins Program; and the operational assessment of systems, applications, or devices to determine security, interoperability, supportability, sustainability, usability (SISSU), and compliance with Federal,

DOD, combatant commanders, Services, and agency regulations, policies, and guidelines.

l.    Require mission application owners and maintainers to provide evidence of a rigorous source code validation and remediation program for Government-developed or -maintained software and applications components submitted for certificates of networthiness. This ensures adherence to secure coding practices and provides evidence of due diligence with respect to software assurance considerations in the selection of commercial off-the-shelf (COTS) products integrated into systems or submitted for certificates of networthiness.

m.    Prescribe the Army’s IT Service Management Program.

n.    Provide combat camera (COMCAM) documentation support for theater Army, Joint military operations, and operations other than war, including to develop and maintain appropriate plans.

o. Oversee the formulation, operation, maintenance, and defense of the Defense Telecommunication Service-Washington, in accordance with DODI 4640.07.

Army Cyber Command/Second U.S. Army

Army Cyber Command/Second U.S. Army will conduct cyber operations, including to—

a.    Exercise a single command and control authority for all collateral top secret and below Army network operations in accordance with Army Enterprise Email, Joint, and DOD regulations.

b.    Serve as the single authority for the operation, management, and defense of the LandWarNet global enterprise network, including as follows—

(1)    Prescribe all common-user IT services and capabilities.

(2)    With exception to Joint Worldwide Intelligence Communications System (JWICS), serve as the single authority to implement Army IP policy, conduct Army IP registration, and manage Army IP address space.

(3)    Prescribe “army.mil” and “army.smil.mil” Internet domains and the assignment of sub-domains requested by other Army organizations.

(4)    Manage Army IT network and system capabilities to achieve survival, recovery, and reconstitution for COOP support requirements in accordance with AR 525–27.

(5)    Execute Army Computer Network Defense-Service Provider (CND-SP) responsibilities to include incident, event, and problem management, in accordance with DODD 0–8530.1. Serve as the Army’s primary general service CND-SP, which includes responsibility for executing, monitoring, and managing CND services for Army-controlled networks. In addition, also be responsible for coordinating Army CND-SP support for networks supported by Army Forces but not under direct Army control.

c.    Oversee and report threats to the Army global enterprise network and, as required, other DOD agencies and their enabling technologies.

d.    Prescribe the operational activities, policies, processes, procedures, and protocols for reportable intelligence and information; in addition to incident management, event management, problem management, and database and Internet/ Web management.
http://usarmy.vo.llnwd.net/e2/rv5_images/values/bg/2013/soldiers.png
e.    Prepare and rehearse a network operations COOP plan, to include resolving actual or potential interruptions in service or reductions in quality of service in mutually agreed upon response times; identifying and prioritizing infrastructure, service, and security events; establishing appropriate responses to those events; defining and eliminating problems that have detrimental impact on quality and cost of services; mitigating probability of problem occurrence; and ensuring optimal performance, security and functionality of enterprise databases and hosted applications.

f. In coordination with CIO/G–6, support information security and information assurance compliance for collateral top secret and below networks and systems—

(1) Prescribe the operational aspects of information protection and data security, including processes that enforce Armywide compliance with the Federal Information Security Management Act of 2002 and OMB Circular A–130. Identify and analyze threats to the Army global enterprise network and its enabling technologies.

(2) Measure Army compliance with IA requirements and prescribe IA program operational execution activities, processes, and practices (see AR 25–2).g. Enable external engagement—

(1)    Formulate Army military telecommunications exchange agreements between the United States and regional defense organizations or friendly foreign nations, and coordinate each agreement’s procedural details with the com-mander of the relevant theater of operations.

(2)    In support of Joint staff information requirements—

(a)    Develop and maintain plans.

(b)    Provide reports on JS-controlled communications assets, as required.

(3) Fund (as appropriate), operate, maintain, and defend equipment, facilities, systems, and required services supporting the United States, the North Atlantic Treaty Organization (NATO), and NATO-member communications objectives, as assigned; and provide subject-matter expertise in negotiations for communications agreements.

h. Oversee operational review and coordination of information infrastructure or architectures. Advise the CIO/G–6 on AEA, in support of implementation, management, and security of the global enterprise network.

i. Operate Army communications facilities and circuitry as part of the Defense Information Systems Network (DISN), including to—

(1) Approve and validate telecommunication requests for service, to include special-access requirements.

(2) Operate, maintain, and defend the Defense Red Switch Network, as well as the Army’s portion of military satellite communications for Defense satellite communications systems; Defense Information Infrastructure (microwave and fiber optic cable systems); and routers on the non-secure Internet protocol router network (NIPRNET), secret Internet protocol router network (SIPRNET), and defense switched network (DSN).

j. Develop, validate, and execute approved Army telecommunications requirements to DISA and overseeing imple-mentation of Army telecommunication requirements.

The Army Chief Information Officer/Deputy Chief of Staff, G–6

a. The Army has consolidated the Army Chief Information Officer (CIO) and the DCS, G–6 positions as the Army CIO/G–6. This allows the Army to better synchronize the Army’s global network activities; to achieve secure, seamless interdependent global network processes and services Enterprise Email; and, to better synchronize Warfighter requirements with global network capabilities and services. The Office of the Army CIO/G–6 serves as the principal focal point in Headquarters, DA (HQDA) for IM matters with Congress; the Government Accountability Office; the Office of Management and Budget (OMB); other Federal agencies; DOD; Joint Staff (JS); Army organizations and commands; and, other military departments, academia, and industry. The Army CIO/G–6 provides policy and guidance on IT systems and networks in accordance with General Order 2012–01. This includes reviewing and evaluating existing Army IM and IT policies to determine their adequacy and overseeing the implementation of DOD IT or IM-related policies or guidance. The CIO/ G–6 provides oversight and coordination for the implementation of policies in—

(1)          44 USC 29, 44 USC 31, and 44 USC 33 (Public Law 94575, Federal Records Management); and 44 USC 35 (Federal Information Security Management Act (FISMA)), and 44 USC 36 (E-Gov Act).

(2)    5 USC 552 (Freedom of Information Act).

(3)    5 USC 552a (Privacy Act of 1974).

(4)    10 USC 3014 and 10 USC 2223(b).

(5)    40 USC Subtitle III (Clinger-Cohen Act).

(6)    DODD 8000.01.

b.             The CIO/G–6, as the Army CIO, is the principal staff assistant and advisor to the Secretary of the Army on Army IM, pursuant to 10 USC 3014(c)(1)(D), including but not limited to information enterprise (IE) networks and network-centric policies and concepts; command, control, communications, and computers (C4); non-intelligence space matters; and enterprise-wide integration of Army information matters. The CIO sets the strategic direction for and supervises the execution of Army IM policies and programs, including the global network, network architecture, and information-sharing policy. The CIO directs information resources management, including the allocation and obligation of IT capital assets in accordance with 40 USC Subtitle III; 44 USC 35; and, 44 USC 36. The CIO is the principal official within HQDA with oversight responsibilities for all IT resources under the provisions of the Clinger-Cohen Act. The CIO/G–6 coordinates with the Under Secretary of the Army, in his role as Chief Management Officer, to develop Army enterprise-wide business system architecture that supports Army business operations management.

c.    The Army CIO/G–6, as the Army CIO, will—

(1) Serve as the Army’s lead agent for LandWarNet to enhance the ability to reconcile current to future force LandWarNet capabilities, improve business agility, and achieve Warfighter decision superiority. The CIO is the single authority responsible and accountable to—

(a) Deliver structured, controlled, repeatable, and measurable processes that drive accountability and compliance for the management of the Army’s information technology enterprise.

(b) Ensure secure LandWarNet capabilities and services to Army leadership and Warfighters.

(c) Enable agile responses to rapidly changing operational requirements for Army and Joint missions.

(2) Direct IM function within the DA, including to—

(a)          Develop the DA’s IM strategy, policies, and guidance that are in compliance with laws, regulations, and standards.
http://usarmy.vo.llnwd.net/e2/-images/2009/05/12/37936/army.mil-37936-2009-05-13-130534.jpg


(b)    Oversee IM and IT resources planning, programming, budgeting, and execution;

(c)           Develop and implement the IM and IT capital planning and investment-control strategy, including the design and operation of all major information resources management processes.

(d)          Develop, coordinate, and implement an assessment process for Army IM programs; including compliance with IM policies, guidance, standards, and monitoring.

(3)          Support the Assistant Secretary of the Army for Acquisition, Logistics, and Technology (ASA (ALT)) through the development of policy on the acquisition of IM, IT, and information resources. Ensure that acquisitions are managed in a manner that implements CIO/G–6 policies and procedures to maximize value while assessing and managing the risks for acquiring IT.

(4)          Serve as the appeal authority to receive and resolve appeal requests for ensuring the quality, objectivity, and integrity of Army information disseminated to the public in accordance with FOIA and Privacy Act programs.

(5)    Establish, maintain, facilitate, and guide the implementation of the Armywide EA.

(6)    Prescribe Army strategy, policy, and portfolio management for Army bandwidth capabilities and activities.

(7)    Serve as member of the Federal CIO Council and the DOD CIO Executive Board (EB).

(8)    Chair the Army CIO EB.

(9)    Develop, promulgate, and direct compliance with information security and IA policy (see AR 25–2).

(10)       Review, coordinate, and co-certify the IT Budget in conjunction with the Assistant Secretary of the Army (Financial Management and Comptroller) (ASA (FM&C)).

(11)    Represent the Army on the Committee on National Security Systems.

(12)    Oversee the Armywide implementation and modernization of LandWarNet.

(13)       Prescribe Army IE strategy, policy, portfolio management, architecture, and strategic communications that result in effective IT investments Armywide.

(14)       Participate as a core member of the Business Systems Information Technology–Executive Steering Group (BSIT–ESG) in the role of standards provider.
http://usarmy.vo.llnwd.net/e2/rv5_images/yearinphotos/2010/photos/july/full/army_2010_0727.jpg
(15)       Serve as the Army designated approval authority (DAA) for the certification and accreditation (C&A) of collateral top secret and below Army information systems (see AR 25–2).

(16)       Monitor the operations and structure of the military and civilian personnel management systems to ensure that the Army’s requirements for qualified IT and communications personnel are addressed and that IT career development plans, programs, and objectives are established. Duties include serving as the functional chief for the ITM career program 34 (CP–34) and as the principal coordination point for designated military specialties. The CIO is responsible for the policy, oversight, and management of the Army civilian ITM CP–34. (See also DA Pam 25–1–1, AR 690–950, and AR 350–1.)

(17)       Prescribe IT portfolio management (PfM) policy and oversee implementation of mission area (MA) IT portfo-lios to ensure they are aligned with Army enterprise solutions.

(18)       Serve as the Army’s lead for the Enterprise Information Environment Mission Area (EIEMA) to support the DOD EIEMA lead and ensure enterprise information environment efforts are traceable to, and fully enable, the required capabilities for the Warfighting and business MAs.

(19)       In coordination with Army Cyber Command, direct research of new IT technologies and training venues that deliver value across the enterprise.

(20)       Reduce the introduction of vulnerabilities and system interoperability performance problems by controlling and approving changes to the Army’s authorized software baseline that constitutes its operational network. For additional information, see the Configuration Management Plan at https://ctsf.army.mil/cmweb/librarian.htm and scroll down to click on the “SOPs” tab.

(21)       Serve as functional proponent for the Army enterprise portals (that is, AKO, enterprise collaboration services, and so forth).

(22)    Serve as the functional proponent of AEA, to include establishing, implementing, leading, and managing the AEA.

(23)       Establish and oversee the Army Data Management Program (ADMP) to include the appointment of the Army Chief Data Officer (see also chapter 5 of this publication).

(24)       Provide oversight and direction for network-centric concepts and management, including the Army Networthi-ness Program.

Serve as the functional proponent and primary interface with the Defense Information Systems Agency (DISA) on existing and emerging DOD enterprise services such as email, data center consolidation, collaboration, and unified communications.

Force generation through information sharing

When IT capabilities are focused to meet the information needs of the Warfighter, information can be employed as a force multiplier.

a.             Force-multiplier benefits of information. Information becomes a force multiplier when it provides a capability that, when added to and employed by a combat force, significantly increases the combat potential of that force and enhances the probability of successful mission accomplishment. Information technology and DM provide tools that enable the Army to achieve force multiplication through information sharing and network-centric operations. Command and control has been a recognized force multiplier, and improvements in information technologies offer opportunities to improve existing information sharing and explore new approaches.
                                       http://warriorcare.dodlive.mil/files/2012/05/army.mil-2006-12-12-164009.jpg
b.             Customer-focused information technology management. The IT community professionals will maintain customer focus in their support of system users and the Warfighter.


(1)          The Army IT community provides information capabilities and services for the benefit of Army, DOD, non-Defense Federal agencies, coalition partners Enterprise Email, and the general public. The IT capabilities and services are not ends in themselves. Ultimately, they have value only when they support the Warfighter and the Army’s mission. Because of the strategic and tactical roles of IT in support of the Army’s missions, the IT community must maintain focus on the needs of its customers.


(2)   This customer focus should include awareness of current user requirements, the quantity and quality of the support provided, future customer requirements, and emerging IT capabilities. The Army’s use of IT requires a strong relationship between the IT community and its customer, where both the customer and the service provider take responsibility for communicating with one another. Each organization’s ITM process must have that same communica-tion strength. Although primary responsibility must be assigned to the various aspects of this process, both IT providers and their customers must remain actively engaged for the process to succeed.

c. Customer participation in information technology management.

(1)          Army customers must be sensitive to the IT community’s need for customer involvement in seemingly unrelated management issues because of the potential IT impacts to Army organizations. Customers must also be willing to participate actively in the support process, especially in defining their requirements. Customers must identify their IT requirements and communicate these clearly to IT personnel (that is, information management officers (IMOs), S–6, G–6, or network enterprise centers (NECs)) throughout the procurement process to ensure the customers’ needs are fulfilled.

The IT community must embrace accountability to the customer. Ensuring that customer requirements are identified and met are essential elements of the ITM process. The IT community’s acceptance of an agreed-upon customer support level must be fully backed with adequate IT staff and resources in order to meet the commitment at the supported installation site. Service and accountability to the customer will be incorporated into the analysis to outsource or consolidate, and included in agreements and contracts for IT support capabilities.

Information accountability and transparency

a.                                                          Record-keeping requirements. Records created under the purview of this regulation, regardless of content or format, will be kept, at a minimum, in accordance with the retention schedules found at https://www.arims.army.mil. The Army Records Information Management System (ARIMS) is a role-based system managed and operated by the U.S. Army Records Management and Declassification Agency (RMDA). The primary purpose of ARIMS is to provide authorized personnel with Web-based tools and technology to manage both hardcopy and electronic Army records. Additional requirements at the State level, including statutory, legal, financial, or administrative by the authority of the State’s governor and adjutant general, will be governed by Title 32 of the United States Code and managed in accordance with State policy. Note that information used in decision-making and business processes is Army record material (whether stored electronically or as a hard copy), and is scheduled, maintained, and preserved in accordance with AR 25–400–2.

b.                                                          Information as a resource.



(1)          Except where restricted for reasons of national security, privacy, sensitivity, or proprietary rights, personnel will manage information as a shared resource and make it available to all authorized to access the information to accomplish their mission and functions. The cost to the Army of collecting Enterprise Email, processing, distributing, and storing information makes it impossible to view information as a free commodity. Army personnel must carefully plan requirements for information and supporting IT. The management of information resources and IT is applicable to all Army organizations.

 http://usarmy.vo.llnwd.net/e2/c/images/2012/01/06/231752/original.jpg

(2)          The IT and related investments will be evaluated in terms of direct support and compatibility with Army enterprise (AE) solutions, mandates, and processes and their corresponding information requirements.



(3)          The IT embedded in or integral to weapon systems, machines, medical instrumentation, servomechanisms, training devices, or test and evaluation (TE) systems, except for those systems with no external interface, are included in the provisions of this regulation. This regulation supports the precept that information is a strategic defense asset during peacetime and wartime, and the peacetime information infrastructure must support wartime requirements by providing information services for rapid deployment and sustainment of U.S. Armed Forces around the world.


The Army information architecture (AIA) was developed based on DOD’s information enterprise architecture (IEA) in order to enable better understanding and interoperability of shared information by providing guidance and compliance requirements to Army stakeholders. The AIA enables the design, development, deployment, and use of information systems that are consistent, comprehensive, compatible, and integrated across the Army enterprise. This multiplies the impact of agile, adaptive IT by leading to more efficient and effective computing environments; which as part of the common operating environment are less costly to develop, design, field, and support. In addition, the AIA aligns to the Army and DOD data strategy to make data visible, accessible, understandable, trusted (to include protection, assurance, and security), and interoperable throughout their life cycle to any authorized Army consumer or mission partner possessing the appropriate security clearance and need to know. The end state of the LandWarNet, enabled by integrating the AIA into overall Army Enterprise Architecture (AEA) activities, will consist of data-enriched applications with an increased ability to access, interact with, and use diverse data stores. This is done via a layer of standard data services, informed as needed by information exchange standards specifications (IESS) within or among communities of interest (COIs).

Army Information Technology

This regulation establishes policies and assigns responsibilities for in-formation management and information technology. It applies to information tech-nology contained in both business systems and national security systems (except as noted) developed for or purchased by the Department of Army. It addresses the management of information as an Army resource, the technology supporting infor-mation requirements, and the resources supporting information technology. This regulation implements 40 United States Code, Subtitle III; 44 United States Code, Chapters 35 and 36; 10 United States Code, Sections 2223 and 3014; and DODD 8000.01. It establishes the Army’s Chief Information Officer. The full scope of the Chief Information Officer’s respon-sibilities and management processes are delineated throughout this regulation. These management processes involve stra-tegic planning Enterprise Email, capital planning, business process analysis and improvement, assess-ment of proposed systems, information re-s o u r c e m a n a g e m e n t ( t o i n c l u d e investment strategy), performance meas-urements, acquisition, and training.

 https://milgaming.army.mil/portalImages/ArmyLogo.png

Applicability. This regulation applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve, unless otherwise stated. Portions of this regula-tion prescribe specific prohibitions that are punitive, and violations of these provi-sions may subject offenders to non-judi-cial or judicial action under the Uniform Code of Military Justice. During mobili-zation, procedures in this publication can be modified to support policy changes as necessary.

Proponent and exception authority.

The proponent of this regulation is Chief Information Officer/G–6. The proponent has the authority to approve exceptions or waivers to this regulation that are consis-tent with controlling law and regulations. The proponent may delegate this approval authority, in writing, to a division chief within the proponent agency or its direct reporting unit or field operating agency, in the grade of colonel or the civilian equiv-alent. Activities may request a waiver to this regulation by providing justification that includes a full analysis of the ex-pected benefits and must include formal review by the activity’s senior legal offi-cer. All waiver requests will be endorsed by the commander or senior leader of the requesting activity and forwarded through their higher headquarters to the policy proponent. Refer to AR 25–30 for specific guidance.

Army internal control process. This regulation contains internal control provi-sions and provides an Internal Control Evaluation for use in evaluating key inter-nal controls (see appendix C).

S u p p l e m e n t a t i o n . Supplementation of this regulation and establishment of com-mand and local forms are prohibited with-out prior approval from the Chief Information Officer/G–6 (SAIS–PRG), 107 Army Pentagon, Washington, DC 20310–0107.

Suggested improvements. Users are invited to send comments and suggested improvements on DA Form 2028 (Recom-mended Changes to Publications and Blank Forms) directly to Office of the C h i e f I n f o r m a t i o n O f f i c e r / G – 6 (SAIS–PRG), 107 Army Pentagon, Wash-ington, DC 20310–0107 (cio-g6.policy.in-box@mail.mil).

Committee management. AR 15–1 re-quires the proponent to justify establishing or continuing committee(s), coordinate draft publications, and coordinate changes in committee status with the U.S. Army Resources and Programs Agency, Depart-ment of the Army Committee Manage-ment Office (AARP–ZA), 9301 Chapek Road, Building 1458, Fort Belvoir, VA 22060-5527. Further, if it is determined that an established “group” identified within this regulation, later takes on the characteristics of a committee, as found in the AR 15–1, then the proponent will fol-low all AR 15-1 requirements for es-tablishing and continuing the group as a committee.

Distribution. This publication is availa-ble in electronic media only and is in-tended for command levels B, C, D, and E for the Active Army, the Army Na-tional Guard/Army National Guard of the United States, and the U.S. Army Reserve.