DoD Instruction 8500.2 - Common Access Card (CAC)
DoD Instruction 8500.2 - Common Access Card (CAC)
DoD Instruction 8500.2 - Common Access Card (CAC)
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
DODI <strong>8500.2</strong>, February 6, 2003<br />
E2.1.31. IA Support Environment (IASE). A web-based resource providing access<br />
to current <strong>DoD</strong> and Federal IA and IA-related policy and guidance, including recent and<br />
pending legislation.<br />
E2.1.32. IA Technology Analysis Center (IATAC). A formally chartered <strong>DoD</strong><br />
institution that helps researchers, engineers, and program managers locate, analyze, use,<br />
and exchange scientific and technical information about information assurance.<br />
E2.1.33. Information Owner. Official with statutory or operational authority for<br />
specified information and responsibility for establishing the controls for its generation,<br />
collection, processing, dissemination, and disposal (reference (a)).<br />
E2.1.34. Information System Security Engineering (ISSE). An engineering process<br />
that captures and refines information protection requirements and ensures their<br />
integration into IT acquisition processes through purposeful security design or<br />
configuration.<br />
E2.1.35. Information Technology (IT). Any equipment or interconnected system or<br />
subsystem of equipment that is used in the automatic acquisition, storage, manipulation,<br />
management, movement, control, display, switching, interchange, transmission or<br />
reception of data or information by the <strong>DoD</strong> Component. For purposes of the<br />
preceding sentence, equipment is used by a <strong>DoD</strong> Component if the equipment is used by<br />
the <strong>DoD</strong> Component directly or is used by a contractor under a contract with the <strong>DoD</strong><br />
Component that (1) requires the use of such equipment, or (2) requires the use, to a<br />
significant extent, of such equipment in the performance of a service or the furnishing<br />
of a product. The term "information technology" includes computers, ancillary<br />
equipment, software, firmware and similar procedures, services (including support<br />
services), and related resources. Notwithstanding the above, the term "information<br />
technology" does not include any equipment that is acquired by a Federal contractor<br />
incidental to a Federal contract.<br />
E2.1.36. IT Position Category. Applicable to unclassified <strong>DoD</strong> information<br />
systems, a designator that indicates the level of IT access required to execute the<br />
responsibilities of the position based on the potential for an individual assigned to the<br />
position to adversely impact <strong>DoD</strong> missions or functions. Position categories include:<br />
IT-I (Privileged), IT-II (Limited Privileged) and IT-III (Non-Privileged), as defined in<br />
<strong>DoD</strong> 5200.2-R (reference (r)). Investigative requirements for each category vary,<br />
depending on role and whether the incumbent is a U.S. military member, U.S. civilian<br />
government employee, U.S. civilian contractor, or a foreign national. The term IT<br />
21 ENCLOSURE 2