Technical Data Management

digits

About

The Technical Data Management process provides a framework to acquire, manage, maintain and ensure access to the technical data and computer software required to manage and support a system throughout the acquisition life cycle (see Systems Engineering (SE) Guide, Section 5.24 System Security Engineering for information regarding protection of critical program information).

Key Technical Data Management considerations include understanding and protecting Government intellectual property and data rights, achieving competition goals, maximizing options for product support and enabling performance of downstream life-cycle functions. DoDI 5000.85, 3D.2.b.(5)(k) IP and 3D.3.c.(5) IP Strategy contains IP and IP Strategy policy for Major Capability Acquisition programs.

Acquiring the necessary data and data rights, in accordance with Military Standard (MIL-STD)-31000, for acquisition, upgrades, and management of technical data provide:

Technical Data Management Activities and Products

The Program Manager (PM), Systems Engineer, and Lead Software Engineer, in conjunction with the Product Support Manager, should ensure that life-cycle requirements for weapon system-related data products and data rights are identified early and appropriate contract provisions are put in place to enable deliveries of these products. SE Guidebook Figure 4-12 below shows the activities associated with Technical Data Management.

image containing five rectangles. The first 3 are lableed identify data requirements, acquire data, receive verify and accept data. These are grouped with the caption Data acquisition and are lifecycle impacting decision points. The last two are labeled sore, maintain and control data; and use and exchange data - these correspond to data management and use

SE Guidebook Figure 4-12: Data Management Activities

Identify Data Requirements

Acquire Data

Receive, Verify and Accept Data

Caution: Acceptance of delivered data not marked consistent with the contract can result in the Government "losing" legitimate rights to technical data and can incur significant legal liability on the Government and the individual Government employees. Regaining those rights generally requires costly and time-consuming legal actions.

Store, Maintain and Control Data

Use and Exchange Data

Plan for and establish methods for access and reuse of product data by all personnel and organizations that perform life-cycle support activities. In support of the Government???s requirement for a Technical Data Package (TDP), the PM should also consider all product-related data (e.g., technical manuals, repair instructions and design/analysis data) to:

Contractually deliverable data should be identified and ordered at the specific "data product" level, (e.g., two-dimensional drawings, three-dimensional Computer-Aided Design (CAD) models, technical manuals, etc.). SE Guidebook, Figure 4-13 below provides a notional representation of different types of product-related data.

Caution: PMs, Systems Engineers and Lead Systems Engineers should be aware that terms such as "technical data," "product data," and "TDP" are imprecise, not equivalent, and often incorrectly used interchangeably.

Resources for establishing and conducting Technical Data Management activities include but are not limited to:

figure showing taxonomy of data with data at the top in level 1. Level two shows technical data and management info, computer software, and financial info. Level 3 is product data. Level 4: Product definition info, product associated info, and product operational info. Product definition info splits into requirements info, design info, and manufacturing info. Product associated info splits into ocnfiguration control info and verification info. Product Operational Info splits into logistics management info and in-service info. Design info goes into technical data package.

Data Protection

The Program Manager is responsible for protecting system data, whether the data is stored and managed by the Government or by contractors. The DoD policy with regard to data protection, marking, and release can be found in:

Data containing information subject to restrictions are protected in accordance with the appropriate guidance, contract, or agreement. Guidance on distribution statements, restrictive markings and restrictions on use, release or disclosure of data can be found in the DFARS (Subpart 252.227-7013 and 7014), and DoDI 5230.24.

When digital data are used, the data should display applicable restriction markings, legends and distribution statements clearly and visibly when the data are first opened or accessed. These safeguards not only ensure Government compliance regarding the use of data but also guarantee and safeguard contractor data delivered to the Government and extend responsibilities of data handling and use to parties who subsequently use the data.

P.L. 107-347 (SEC 208 para (b)) and DoDI 5400.16, "DoD Privacy Impact Assessment (PIA) Guidance" requires that PIA be conducted before developing or purchasing any DoD information system that collects, maintains, uses or disseminates personally identifiable information about members of the public, federal personnel, DoD contractors and, in some cases, foreign nationals. Available PIA guidance provides procedures for completing and approving PIAs.

All data deliverables should include distribution statements. Processes should be established to protect all data that contain critical technology information, as well as ensure that limited distribution data, intellectual property data or proprietary data are properly handled throughout the life cycle, whether the data are in hard-copy or digital format.

Products and Tasks

Product Tasks
18-1-1: Verify technical data acquisition, access, management and protection policies and procedures
  1. Assess the technical data needs required for the program.
  2. Identify policies and procedures for information technology and technical data applicable to the system / program.
  3. Develop statement of work tasks to generate technical data to be acquired for a system, and submit to the decision maker for inclusion in contract documentation.
  4. Identify data item descriptions (DIDs) and contract data requirements lists (CDRLs) to acquire technical data for the system from the developer, and submit to the decision maker for inclusions in contract documentation.
  5. Document technical data needs, SOW tasks and technical data deliverables, along with associated technical data management processes, and incorporate into the intellectual property (IP) strategy.
  6. Receive, verify, and accept contractually ordered technical data.
  7. Verify contractually ordered technical data is stored, maintained, and has access controlled in accordance with the configuration management plan and the IP strategy.

Source: AWQI eWorkbook


Resources

Key terms

Source:
DAU ACQuipedia
DAU Glossary

Policy and Guidance

Other

OUSD R&E Digital Engineering, Modeling and Simulation

DAU Training Courses

Media

Communities of Practice

On this page

  1. About
  2. Technical Data Management Activities and Products
  3. Resources
Back to top