10 USC 2222 – Defense business systems: business process reengineering; enterprise architecture; management
(a)
Terms Used In 10 USC 2222
- Budget authority: Authority provided by law to enter into obligations that will result in outlays of Federal funds. Budget authority may be classified by the period of availability (one-year, multiyear, no-year), by the timing of congressional action (current or permanent), or by the manner of determining the amount available (definite or indefinite).
- Fiscal year: The fiscal year is the accounting period for the government. For the federal government, this begins on October 1 and ends on September 30. The fiscal year is designated by the calendar year in which it ends; for example, fiscal year 2006 begins on October 1, 2005 and ends on September 30, 2006.
- Obligation: An order placed, contract awarded, service received, or similar transaction during a given period that will require payments during the same or a future period.
- officer: includes any person authorized by law to perform the duties of the office. See 1 USC 1
(b)
(1) supports efficient business processes that have been reviewed, and as appropriate revised, through business process reengineering;
(2) is integrated into a comprehensive defense business enterprise architecture;
(3) is managed in a manner that provides visibility into, and traceability of, expenditures for the system; and
(4) uses an acquisition and sustainment strategy that prioritizes the use of commercial software and business practices.
(c)
(1)
(2)
(d)
(1) Policy to ensure that the business processes of the Department of Defense are continuously reviewed and revised—
(A) to implement the most streamlined and efficient business processes practicable; and
(B) to eliminate or reduce the need to tailor commercial off-the-shelf systems to meet or incorporate requirements or interfaces that are unique to the Department of Defense.
(2) A process to establish requirements for covered defense business systems.
(3) Mechanisms for the planning and control of investments in covered defense business systems, including a process for the collection and review of programming and budgeting information for covered defense business systems.
(4) Policy requiring the periodic review of covered defense business systems that have been fully deployed, by portfolio, to ensure that investments in such portfolios are appropriate.
(5) Policy to ensure full consideration of sustainability and technological refreshment requirements, and the appropriate use of open architectures.
(6) Policy to ensure that best acquisition and systems engineering practices are used in the procurement and deployment of commercial systems, modified commercial systems, and defense-unique systems to meet Department of Defense missions.
(7) Policy to ensure a covered defense business system is in compliance with the Department’s auditability requirements.
(8) Policy to ensure approvals required for the development of a covered defense business system.
(e)
(1)
(2)
(3)
(A) include policies, procedures, business data standards, business performance measures, and business information requirements that apply uniformly throughout the Department of Defense; and
(B) enable the Department of Defense to—
(i) comply with all applicable law, including Federal accounting, financial management, and reporting requirements;
(ii) routinely produce verifiable, timely, accurate, and reliable business and financial information for management purposes;
(iii) integrate budget, accounting, and program information and systems; and
(iv) identify whether each existing business system is a part of the business systems environment outlined by the defense business enterprise architecture, will become a part of that environment with appropriate modifications, or is not a part of that environment.
(4)
(B) The Chief Information Officer of the Department of Defense shall develop an information technology enterprise architecture. The architecture shall describe a plan for improving the information technology and computing infrastructure of the Department of Defense, including for each of the major business processes conducted by the Department of Defense.
(5)
(6)
(A) The Chief Information Officer of the Department of Defense, in coordination with the Chief Data and Artificial Intelligence Officer, shall have primary decision-making authority with respect to the development of common enterprise data. In consultation with the Defense Business Council, the Chief Information Officer shall—
(i) develop an associated data governance process; and
(ii) oversee the preparation, extraction, and provision of data across the defense business enterprise.
(B) The Chief Information Officer and the Under Secretary of Defense (Comptroller) shall—
(i) in consultation with the Defense Business Council, document and maintain any common enterprise data for their respective areas of authority;
(ii) participate in any related data governance process;
(iii) extract data from defense business systems as needed to support priority activities and analyses;
(iv) when appropriate, ensure the source data is the same as that used to produce the financial statements subject to annual audit;
(v) in consultation with the Defense Business Council, provide access, except as otherwise provided by law or regulation, to such data to the Office of the Secretary of Defense, the Joint Staff, the military departments, the combatant commands, the Defense Agencies, the Department of Defense Field Activities, and all other offices, agencies, activities, and commands of the Department of Defense; and
(vi) ensure consistency of the common enterprise data maintained by their respective organizations.
(C) The Director of Cost Assessment and Program Evaluation shall have access to data for the purpose of executing missions as designated by the Secretary of Defense.
(D) The Secretary of Defense, the Chairman of the Joint Chiefs of Staff, the Secretaries of the military departments, commanders of combatant commands, the heads of the Defense Agencies, the heads of the Department of Defense Field Activities, and the heads of all other offices, agencies, activities, and commands of the Department of Defense shall provide access to the relevant system of such department, combatant command, Defense Agency, Defense Field Activity, or office, agency, activity, and command organization, as applicable, and data extracted from such system, for purposes of automatically populating data sets coded with common enterprise data.
(f)
(1)
(2)
(A) The Chief Information Officers of the military departments, or their designees.
(B) The Chief Management Officers of the military departments, or their designees.
(C) The following officials of the Department of Defense, or their designees:
(i) The Under Secretary of Defense for Acquisition and Sustainment with respect to acquisition, logistics, and installations management processes.
(ii) The Under Secretary of Defense (Comptroller) with respect to financial management and planning and budgeting processes.
(iii) The Under Secretary of Defense for Personnel and Readiness with respect to human resources management processes.
(iv) The Chief Data and Artificial Intelligence Officer of the Department of Defense.
(g)
(1)
(A) the system has been, or is being, reengineered to be as streamlined and efficient as practicable, and the implementation of the system will maximize the elimination of unique software requirements and unique interfaces;
(B) the system and business system portfolio are or will be in compliance with the defense business enterprise architecture developed pursuant to subsection (e) or will be in compliance as a result of modifications planned;
(C) the system has valid, achievable requirements and a viable plan for implementing those requirements (including, as appropriate, market research, business process reengineering, and prototyping activities);
(D) the system has an acquisition strategy designed to eliminate or reduce the need to tailor commercial off-the-shelf systems to meet unique requirements, incorporate unique requirements, or incorporate unique interfaces to the maximum extent practicable; and
(E) the system is in compliance with the Department’s auditability requirements.
(2)
(A) Except as may be provided in subparagraph (C), in the case of a priority defense business system, the Chief Information Officer of the Department of Defense.
(B) Except as may be provided in subparagraph (C), for any defense business system other than a priority defense business system—
(i) in the case of a system of a military department, the Chief Information Officer of that military department; and
(ii) in the case of a system of a Defense Agency or Department of Defense Field Activity, or a system that will support the business process of more than one military department or Defense Agency or Department of Defense Field Activity, the Chief Information Officer of the Department of Defense.
(C) In the case of any defense business system, such official other than the applicable official under subparagraph (A) or (B) as the Secretary designates for such purpose.
(3)
(4)
(h)
(i)
(1)(A)
(i) A financial system.
(ii) A financial data feeder system.
(iii) A contracting system.
(iv) A logistics system.
(v) A planning and budgeting system.
(vi) An installations management system.
(vii) A human resources management system.
(viii) A training and readiness system.
(B) The term does not include—
(i) a national security system; or
(ii) an information system used exclusively by and within the defense commissary system or the exchange system or other instrumentality of the Department of Defense conducted for the morale, welfare, and recreation of members of the armed forces using nonappropriated funds.
(2)
(3)
(4)
(5)
(A) expected to have a total amount of budget authority over the period of the current future-years defense program submitted to Congress under section 221 of this title in excess of $250,000,000; or
(B) designated by the Chief Information Officer of the Department of Defense as a priority defense business system, based on specific program analyses of factors including complexity, scope, and technical risk, and after notification to Congress of such designation.
(6)
(7)
(8)
(9)
(10)
(11)