Clinger cohen act national security systems

The Clinger-Cohen Act (CCA) of 1996 is designed to improve how the federal government acquires, uses, and disposes of Information Technology (IT). It encompasses the (1) Information Technology Management Reform Act (ITMRA) (Division E) and the (2) Federal Acquisition Reform Act (FARA) (Division D), which were signed into law as part of the National Defense Authorization Act for Fiscal Year 1996. The act established agency Chief Information Officer (CIO) positions with designated roles and responsibilities and directed Federal agencies to focus more on the results achieved through Information Technology (IT) investments, and streamlined the Federal IT procurement process.

Definition: The Clinger-Cohen Act of 1996, also known as the Information Technology Management Reform Act (ITMRA) and Federal Acquisition Reform Act (FARA), is a United States federal law that aims to improve the acquisition and management of information technology (IT) within the federal government. It mandates specific practices for IT investment, procurement, and management to enhance efficiency, effectiveness, and security across government agencies.

Clinger-Cohen Act (CCA) Goals

Clinger-Cohen Act (CCA) Main References

Document: Clinger-Cohen Act of 1996, Title 40

Guide: Air Force Clinger-Cohen Act (CCA) Compliance Guide – 9 May 2018

Instruction: DoD Instruction 5000.82 “Acquisition of Information Technology”

Clinger-Cohen Act (CCA) Requirements

For DoD acquisition programs, the Clinger-Cohen Act mandates that all programs that acquire information technology (IT), including national security systems (NSS), that the Milestone Decision Authority (MDA) shall not initiate a program, increment, entry into any phase, or award a contract until the Program Manager (PM) has satisfied the requirements of this Act.

(1) Information Technology Management Reform Act, Condensed [1]

(2) Federal Acquisition Reform Act, Condensed [1]

AcqNotes Tutorial

Clinger-Cohen Act (CCA) Title 40 Regulation

Subtitle III of Title 40, U.S.C., (also known as Divisions D and E of the CCA) applies to all IT investments, including National Security Systems (NSS).

  1. The sponsoring DoD Component, PM, or FSM provides a plan to the MDA or DA to satisfy the applicable acquisition requirements of the CCA. The plan will use documentation already required as part of the acquisition pathway. The tables in the Adaptive Acquisition Framework Documentation Identification tool, will be used to identify the program information that supports CCA compliance:
  2. If required by the acquisition pathway, the sponsoring DoD Component, PM, or FSM provides the plan to the DoD CIO, DoD Component CIO, or their designee for approval.
  3. Changes to the acquisition strategy that invalidate the previous compliance conditions must be reported to the MDA or DA and must comply with the applicable requirements of DoDI 5000.82 as identified in section 3.2.

Clinger-Cohen Act (CCA) Program Requirements

The Milestone Decision Authority (MDA) will not initiate a program nor an increment of a program, approve entry into any phase of the acquisition process that requires formal acquisition milestone approval, or authorize the execution of a contract for the applicable acquisition phase in an Information Technology (IT) Program until: [4]

Clinger-Cohen Statutory and Regulatory Requirements for Defense Acquisitions

Clinger-Cohen Act (CCA) Reporting

The Program Manager (PM) will report CCA compliance to the Milestone Decision Authority (MDA) and the Component Chief Information Officer (CIO) or designee. The PM will report CCA compliance for IT programs that employ an incremental development model at each Limited Deployment Decision Point. [3]

Why is it called the Clinger-Cohen Act (CCA)

Why the law is called the “Clinger-Cohen Act”: Section D of the Federal Acquisition Reform Act (FARA) of 1996 is based on H.R. 1670, which was introduced by Rep. William Clinger, Chairman of the Government Reform and Oversight Committee, and Rep. Floyd Spence, Chairman of the National Security Committee, on May 18, 1995. On September 14, 1995, the full House of Representatives voted 423-0 to pass the bill. Senators William S. Cohen and Carl Levin were the ones who came up with the Information Technology Management Reform Act of 1995.

AcqTips:

AcqLinks and References: