16.10.2014 Views

DoD Instruction 8500.2 - Common Access Card (CAC)

DoD Instruction 8500.2 - Common Access Card (CAC)

DoD Instruction 8500.2 - Common Access Card (CAC)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DODI <strong>8500.2</strong>, February 6, 2003<br />

E2.1.31. IA Support Environment (IASE). A web-based resource providing access<br />

to current <strong>DoD</strong> and Federal IA and IA-related policy and guidance, including recent and<br />

pending legislation.<br />

E2.1.32. IA Technology Analysis Center (IATAC). A formally chartered <strong>DoD</strong><br />

institution that helps researchers, engineers, and program managers locate, analyze, use,<br />

and exchange scientific and technical information about information assurance.<br />

E2.1.33. Information Owner. Official with statutory or operational authority for<br />

specified information and responsibility for establishing the controls for its generation,<br />

collection, processing, dissemination, and disposal (reference (a)).<br />

E2.1.34. Information System Security Engineering (ISSE). An engineering process<br />

that captures and refines information protection requirements and ensures their<br />

integration into IT acquisition processes through purposeful security design or<br />

configuration.<br />

E2.1.35. Information Technology (IT). Any equipment or interconnected system or<br />

subsystem of equipment that is used in the automatic acquisition, storage, manipulation,<br />

management, movement, control, display, switching, interchange, transmission or<br />

reception of data or information by the <strong>DoD</strong> Component. For purposes of the<br />

preceding sentence, equipment is used by a <strong>DoD</strong> Component if the equipment is used by<br />

the <strong>DoD</strong> Component directly or is used by a contractor under a contract with the <strong>DoD</strong><br />

Component that (1) requires the use of such equipment, or (2) requires the use, to a<br />

significant extent, of such equipment in the performance of a service or the furnishing<br />

of a product. The term "information technology" includes computers, ancillary<br />

equipment, software, firmware and similar procedures, services (including support<br />

services), and related resources. Notwithstanding the above, the term "information<br />

technology" does not include any equipment that is acquired by a Federal contractor<br />

incidental to a Federal contract.<br />

E2.1.36. IT Position Category. Applicable to unclassified <strong>DoD</strong> information<br />

systems, a designator that indicates the level of IT access required to execute the<br />

responsibilities of the position based on the potential for an individual assigned to the<br />

position to adversely impact <strong>DoD</strong> missions or functions. Position categories include:<br />

IT-I (Privileged), IT-II (Limited Privileged) and IT-III (Non-Privileged), as defined in<br />

<strong>DoD</strong> 5200.2-R (reference (r)). Investigative requirements for each category vary,<br />

depending on role and whether the incumbent is a U.S. military member, U.S. civilian<br />

government employee, U.S. civilian contractor, or a foreign national. The term IT<br />

21 ENCLOSURE 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!