G2TT
来源类型Research Reports
规范类型报告
DOIhttps://doi.org/10.7249/RR880
ISBN9780833088925
来源IDRR-880-OSD
Issues with Access to Acquisition Data and Information in the Department of Defense: Policy and Practice
Jessie Riposo; Megan McKernan; Jeffrey A. Drezner; Geoffrey McGovern; Daniel Tremblay; Jason Kumar; Jerry M. Sollinger
发表日期2015
出版年2015
页码88
语种英语
结论

The Process for Gaining Access to Data Is Inefficient and May Not Provide Access to the Best Data to Support Analysis

  • Government personnel and those supporting the government do not always get their first choice of data.
  • Alternative sources often have data of lower quality, that are older and thus less accurate, or that are subject to a number of caveats.

OSD Analytic Groups and Support Contractors Face Particular Challenges in Gaining Access to Data

  • OSD analytic groups often do not have access to the originators of the data, which precludes them from going to the primary source. They may also have poor visibility of all viable data sources.
  • Direct support contractors have problems similar to OSD analysts, but these problems can be compounded by laws, regulations, and policy that restrict access to certain types of information. Support contractors require special permissions to view nontechnical proprietary data.

Access Problems Occur for Several Reasons

  • Data access policy is highly decentralized, not well known, and subject to a wide range of interpretation.
  • The markings for unclassified information play a significant role in access. The owner or creator of a document determines what protections or markings are required. However, marking criteria are not always clear or consistently applied.
  • Institutional and cultural barriers inhibit sharing.
摘要

Options for solving the proprietary data-access problem:

  • The Under Secretary of Defense for Acquisition, Technology and Logistics (USD[AT&L]) could seek additional billets and insource any functions that require access to proprietary data; this would require Office of Professional Management and congressional support.
  • USD[AT&L] could reallocate billets to functions that currently require access to proprietary information; this would require cross-organizational prioritization — a difficult process that might be insufficient.
  • General access could be established for all direct support contractors; this would require legislative or contractual changes.
  • Additional contractual language could be placed on all DoD acquisition contracts, granting support contractors restricted access to their data. Contractors who receive the data would have to demonstrate company firewalls, training, personal agreements, and need to know akin to those for classified information.
  • The government could seek an alternative ruling on the nondisclosure requirements, whereby blanket nondisclosure agreements could be signed between the government and a direct support organization, or a company and a direct support organization to cover multiple tasks.

Options to address the confusion regarding policy:

  • The Office of the Under Secretary of Defense for Acquisition, Technology and Logistics (OUSD[AT&L]) could create and maintain a central, authoritative online resource that references all relevant guidance on information management, handling, access, and release for acquisition data.
  • OUSD(AT&L) could consider providing additional training for its staff on the identification and protection of data.
  • In areas where conflicting interpretations of guidance are particularly problematic (e.g., For Official Use Only and proprietary information), additional guidance on how to identify this type of information upfront would be useful.
  • Directives and incentives could be established so that markings that appear to be incorrect are challenged.
主题Critical Infrastructure Protection ; Cyber and Data Sciences ; Cybersecurity ; Databases and Data Collection ; Analysis ; and Processing ; Military Acquisition and Procurement ; Military Information Technology Systems ; United States Department of Defense
URLhttps://www.rand.org/pubs/research_reports/RR880.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/108143
推荐引用方式
GB/T 7714
Jessie Riposo,Megan McKernan,Jeffrey A. Drezner,et al. Issues with Access to Acquisition Data and Information in the Department of Defense: Policy and Practice. 2015.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
x1516280682924.jpg(8KB)智库出版物 限制开放CC BY-NC-SA浏览
RAND_RR880.pdf(968KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Jessie Riposo]的文章
[Megan McKernan]的文章
[Jeffrey A. Drezner]的文章
百度学术
百度学术中相似的文章
[Jessie Riposo]的文章
[Megan McKernan]的文章
[Jeffrey A. Drezner]的文章
必应学术
必应学术中相似的文章
[Jessie Riposo]的文章
[Megan McKernan]的文章
[Jeffrey A. Drezner]的文章
相关权益政策
暂无数据
收藏/分享
文件名: x1516280682924.jpg
格式: JPEG
文件名: RAND_RR880.pdf
格式: Adobe PDF

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。