ADVOCATETANMOY LAW LIBRARY

Research & Library Database

Home » Army Information Technology – U.S. Army Regulation(25–1) -2019

Army Information Technology – U.S. Army Regulation(25–1) -2019

USA, America
This regulation establishes policies and assigns responsibilities for information management (IM), data management, and Information Technology (IT), to include platform IT (PIT) and operational technology. It provides policy for the planning, budgeting, governance, acquisition, and management of Army IT, personnel, equipment, funds, IT resources and supporting infrastructure, and services. Army organizations must adhere to basic principles throughout the information resource management (IRM) process.

REVISION dated 15 July 2019

ArmyArmy The Army of the Islamic Republic of Iran shall be an Islamic army, which is an ideological and peoples army and which shall recruit competent individuals faithful to the objectives of the Islamic Revolution and ready to make sacrifices for attaining the same. (Art-144) Regulation 25–1

Effective 15 August 2019

U.S. Department of Defense

What is it? 

This regulation establishes policies and assigns responsibilities for information management (IM), data management, and Information Technology (IT), to include platform IT (PIT) and operational technology. It provides policy for the planning, budgeting, governance, acquisition, and management of Army IT, personnel, equipment, fundsFund The term refers to assets of every kind, whether corporeal or incorporeal, tangible or intangible, movable or immovable, however acquired, and legal documents or instruments in any form, including electronic or digital, evidencing title to, or interest in, such assets., IT resources and supporting infrastructure, and services. Army organizations must adhere to basic principles throughout the information resource management (IRM) process.

This regulation establishes policies and assigns responsibilities for information management and information technology. It applies to information technology contained in both business systems and national security systems (except as noted) developed for or purchased by the Department of Army. It addresses the management of information as an Army resource, the technology supporting information requirements, and the resources supporting information technology. This regulation implements Title 40, United StatesUnited States Britain's American colonies broke with the mother country in 1776 and were recognized as the new nation of the United States of America following the Treaty of Paris in 1783. During the 19th and 20th centuries, 37 new states were added to the original 13 as the nation expanded across the North American continent and acquired a number of overseas possessions. The two most traumatic experiences in the nation's history were the Civil War (1861-65) and the Great Depression of the 1930s. Buoyed by victories in World Wars I and II and the end of the Cold War in 1991, the US remains the world's most powerful nation state. Code, Subtitle III (40 USC, Subtitle III); 44 USC, Chapters 35 and 36; 10 USC 2223 and 3014; and DODD 8000.01. It establishes the Army’s Chief Information Officer and the full scope of the Army Chief Information Officer’s responsibilities and management processes. These processes involve strategic planning, capital planning, business process analysis and improvement, assessment of proposed systems, and information resource management (including investment strategy).

Applicability.

This regulation applies to the RegularRegular Regulated by Christian law and practices, the opposite meaning of Secular. A regulated government accepts Vaticanism, the control under the papal monarchy. A secular government is free from papal intervention. Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve unless otherwise stated. It also applies to platform Information/Technology/Industrial control systems; appropriated-funded morale, welfare, and recreation support systems; non-appropriated-funded morale, welfare, and recreation support systems; and to contractor-owned/contractor-operated systems operated on behalf of the Army. During mobilization, procedures in this publicationPublication It includes any speech, writing, broadcast, or other communication in whatever form (including internet and social media), which is addressed to the public at large or any section of the public. can History.

Overview

Army IT is defined in simple terms as the capabilities and investments that provide the combination of hardware, software, and networks that generate readiness, enable mission command, and enhance lethality across all warfighting functions.
This combination includes the developmentDevelopment ανάπτυξη, maintenance, sustainment, and security of all communications devices, networks, systems, and associated contracts, as well as personnel costsCosts Subject to any written law, costs are at the discretion of the Court, and the Court has the power to determine all issues relating to the costs of or incidental to all proceedings, including by whom and to what extent the costs are to be paid, at any stage of the proceedings or after the conclusion of the proceedings. Generally “Costs” includes charges, disbursements, expenses, fees, and remuneration. Costs in any matter are payable from the date of the order of the Court unless the parties otherwise agree. The costs of a third-party funding contract are not recoverable as part of the costs of, or costs., throughout the Army in both the Operating and Generating Forces.

a. Army information is a strategic asset that must be protected and shared with authorized users in accordance with this
regulation, AR 25–2, AR 380–5 and AR 530–1.

b. Functional processes must be examined and streamlined to improve their effectiveness and reduce cost before investing in IT solutions to support and enable them.

c. All aspects of the Army network infrastructure including information systems (ISs), applications, wireless technologies, mobile communications, and platforms will be planned, designed, developed, architected, configured, acquired, managed, operated, and protected in accordance with this regulation and AR 25–2.

d. This regulation applies to IT contained in mission-command systems; intelligence systems (except as noted); weapon
systems (except as noted); business systems; and, when identified, National Security Systems (NSS) developed or pur-
chased by the DA. This regulation does not apply directly to information systems acquired under the National Intelligence Program (NIP), the Military Intelligence Program (MIP), or to the operational support of intelligence and electronic warfare systems operating in a stand-alone configuration where inclusion of integrated support would not be efficient or effective.



Top-10