<?xml version="1.0" encoding="UTF-8"?>
<PerformancePlanOrReport xmlns="urn:ISO:std:iso:17469:tech:xsd:PerformancePlanOrReport" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"

 xsi:schemaLocation="urn:ISO:std:iso:17469:tech:xsd:PerformancePlanOrReport http://stratml.us/references/PerformancePlanOrReport20160216.xsd" Type="Strategic_Plan"><Name>DoD Data Strategy</Name><Description>The DoD Data Strategy, as a key component of the Department's Digital Modernization program,
supports the National Defense Strategy (NDS) by enhancing military effectiveness through access
to accurate, timely, and secure data.</Description><OtherInformation>A core tenet of the DoD Data Strategy is the understanding that data is not an IT asset, but an
essential and integral part of the mission itself. Data is ubiquitous. DoD weapons platforms,
connected devices, sensors, training facilities, test ranges, and business systems generate enormous
volumes of data of which all retain and share their data for broader use. It is critical that data be of
high quality, accurate, complete, timely, protected, and trustworthy. As such, the Department
makes data a strategic asset by establishing the following goals.
DoD data will be:
* Visible - Consumers can locate the needed data.
* Accessible - Consumers can retrieve the data.
* Understandable - Consumers can find descriptions of data to recognize the content,
context, and applicability.
* Linked - Consumers can exploit complementary data elements through innate
relationships.
* Trustworthy - Consumers can be confident in all aspects of data for decision-making.
* Interoperable - Consumers and producers have a common representation and
comprehension of data.
* Secure - Consumers know that data is protected from unauthorized use and
manipulation.</OtherInformation><StrategicPlanCore><Organization><Name>U.S. Department of Defense</Name><Acronym>DOD</Acronym><Identifier>_5e8dcfdc-5d6a-11df-839d-400e7a64ea2a</Identifier><Description/><Stakeholder StakeholderTypeType="Person"><Name>David L. Norquist</Name><Description>Deputy Secretary of Defense </Description></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Data Systems</Name><Description>Scope: The DoD Data Strategy applies to the entire Department of Defense and its data, on whichever systems that information resides.</Description></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Leaders</Name><Description>In addition to combat effectiveness, DoD leaders -- including
members of the Office of the Secretary of Defense (OSD), the Military Departments, the Office of
the Chairman of the Joint Chiefs of Staff (CJCS) and the Joint Staff, Combatant Commands,
Defense Agencies, and DoD Field Activities (referred to collectively in this strategy as
Components) -- require data-driven insights that provide a fair and accurate Department-wide
representation of DoD operations and management.</Description></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Secretary of Defense (OSD)</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Chairman of the Joint Chiefs of Staff (CJCS)</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Combatant Commands</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Defense Agencies</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Field Activities</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Warfighters</Name><Description>Warfighters at all echelons require tested, secure, seamless access to data across networks,
supporting infrastructure, and weapon systems out to the tactical edge. The advanced capabilities
provided by DoD's Digital Modernization program depend upon enterprise data management
policies, standards, and practices. Sensors and platforms across all domains must be designed,
procured, and exercised with open data standards as a key requirement. Survival on the modern
battlefield will depend upon leveraging and making connections among data from diverse sources,
using analytic tools for superior situational awareness, and coordinating information for
disaggregated-precision effects.</Description></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Data Users</Name><Description>Focus Areas -- Data policies and standards alone cannot strengthen data management or improve data quality.
They must be continuously informed by feedback from users who consume, produce, manage, and
govern data with particular emphasis given to the operational community and warfighter needs.
For this reason, the Department must utilize ongoing initiatives in key mission areas to rapidly
apply the Strategy's data principles and quickly generate lessons learned. Although data is critical
to every DoD mission, initial areas of focus include: Joint All-Domain Operations, business
analytics, and senior leader decision support.</Description></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Joint Staff</Name><Description>Joint All-Domain Operations: As part of the National Defense Strategy's focus on great power
competition and conflict, the Secretary has directed the Joint Staff and Military Departments
(MILDEPs) to develop new concepts for coordinating military effects in an all-domain fight.</Description></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Military Departments (MILDEPs)</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Data Governance Community</Name><Description>The
data governance community must closely partner with the Joint All-Domain Command and Control
(JADC2) Cross-Functional Team (CFT), the Joint Artificial Intelligence Center (JAIC), and the
Deputy CIO for C3 to ensure that we can coordinate information with the tactical edge in a highly
contested environment. Clear data standards and interoperability requirements for JADC2 directly
support future military readiness. The integrated JADC2 exercises led by the Joint Staff will
provide real-world outcomes that will aid in prioritizing data gaps, as will lessons from the Army's
work on data design principles and similar efforts by the other MILDEPs.
When new data gaps are identified, the data governance community must work with mission area
managers to determine whether changes are needed to hardware; software; tactics, techniques, and
procedures; or risk acceptance. The mitigation of many legacy systems is not cost-effective,
making it imperative that all future systems are procured with data-interoperability, software
upgradability, and cloud-readiness as requirements.</Description></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Joint All-Domain Command and Control (JADC2)</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cross-Functional Team (CFT)</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Joint Artificial Intelligence Center (JAIC)</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Deputy CIO for C3</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>DoD CDO</Name><Description>The DoD CDO, along with Component CDOs,
must also ensure that operational users remain informed of new data-enabled capabilities from the
commercial sector and DoD research. Ultimately, DoD's transition to a data-centric organization
depends on effective feedback between the data governance and operational communities, and the
trusted collaboration this entails.</Description></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Component CDOs</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Senior DoD Leaders</Name><Description>Senior Leader Decision Support: Senior leaders, including the Deputy Secretary, have directed
the development of clear, quantifiable metrics to inform a wide-range of management decisions,
such as options for implementing the National Defense Strategy. The data community must
support efforts to provide current, decision-quality data along with a platform of tools for analysis
and visualization. This approach will accelerate the Department's transition to using live,
interactive data in place of static slides to inform strategic outcomes.</Description></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>DoD Comptroller</Name><Description>Business Analytics: The DoD Comptroller, working with the Chief Management Officer (CMO)
and others, is leading an effort to ingest, analyze, and display a wide range of business data; this
includes information on budget, procurement, inventory, logistics, and personnel. The data
governance community will use the insights from this effort to inform their policies on issues such
as authoritative data sources, consistent metadata labeling, standard taxonomies, data provenance,
and interfaces (e.g., APIs).</Description></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Chief Management Officer (CMO)</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Business Analysts</Name><Description>This effort could also foster migration to a common data platform for
all business analytics across the Department.</Description></Stakeholder></Organization><Vision><Description>DoD is a data-centric organization that uses data at speed and scale for operational advantage and increased efficiency.
</Description><Identifier>_0e005f00-0a9b-11eb-9ddb-fdb72983ea00</Identifier></Vision><Mission><Description>To enhance military effectiveness through access to accurate, timely, and secure data</Description><Identifier>_0e00604a-0a9b-11eb-9ddb-fdb72983ea00</Identifier></Mission><Value><Name>Principles</Name><Description>Guiding Principles -- The Department leverages eight guiding principles to influence the goals, objectives, and essential capabilities in this strategy. These guiding principles are foundational to all data efforts within DoD.</Description></Value><Value><Name>Strategic Assets</Name><Description>Data is a Strategic Asset -- DoD exerts tremendous effort planning and using traditional strategic assets such as personnel,
weapon systems, supply chain, and transportation to achieve positive outcomes. In the same
manner, data in the DoD is a high-interest commodity and must be leveraged in a way that brings
both immediate and lasting military advantage. As DoD shifts to managing its data as a critical part
of its overall mission, it gains distinct, strategic advantages over competitors and adversaries alike.
These advantages will be reflected in more rapid, better-informed decisions through the use of
trustworthy and integrated data.</Description></Value><Value><Name>Stewardship</Name><Description>Collective Data Stewardship -- To exploit data fully for decision-making, DoD is defining roles and responsibilities for data
stewardship. DoD will assign data stewards, data custodians, and a set of functional data managers
to achieve accountability throughout the entire data lifecycle. Data stewards establish policies
governing data access, use, protection, quality, and dissemination. Data custodians are responsible
for promoting the value of data and enforcing policies, and functional data managers implement
the policies and manage day-to-day quality.</Description></Value><Value><Name>Ethics</Name><Description>Data Ethics -- The ethical use of data will be at the forefront of all plans and actions for how data is collected,
used, and shared. As the Secretary of Defense stated in his guidance on AI Ethics on February 21,
2020, "Although technology changes, the Department's commitment to the Constitution, the Law of
War, and the highest standards of ethical behavior does not." Whether for AI or advanced
analytics, ethical principles regarding the responsible use of data remain important, and they will
be championed by the DoD CDO and all data and analytics leaders across the Department.
Component CDOs will be responsible for promoting a culture of ethical data use supported by
oversight mechanisms to identify and promote best practices among the United States and our
partners.</Description></Value><Value><Name>Collection</Name><Description>Data Collection -- Regardless of the data domain, community, or use, the challenge remains the same - to discover
and collect data and continuously add value to best inform the decision-maker. Consequently, DoD
must enable electronic collection of data at the point of creation and maintain the pedigree of that
data at all times. The moment data is created, it should be tagged, stored, and cataloged. When the
data is combined or integrated, the resulting product must also be immediately collected, tagged,
curated, and appropriately secured. To expedite these processes and to minimize the risk of human
error, these steps should be automated to the maximum extent possible.</Description></Value><Value><Name>Access</Name><Description>Enterprise-Wide Data Access and Availability -- Closely aligned with data stewardship and collection are the accessibility and availability of data.
This is enabled by successful implementation of enterprise capabilities, such as an enterprise cloud;
Identity, Credential, and Access Management (ICAM); and associated data-sharing tools. The best
technology, processes, and policies will not make this successful if our workforce does not
embrace new cultural norms. As such, DoD is making the cultural shift from the need to know (i.e.,
information withholding) to the responsibility to provide (i.e., information sharing). Making data
available across warfighting, intelligence, and business systems is essential to gaining an
enterprise-wide view into the daily operations of the Department and absolutely critical to the
success of both the National Defense Strategy and the Digital Modernization Strategy. Therefore,
it is a fundamental DoD premise that data should be made available for use by all authorized
individuals and non-person entities through appropriate mechanisms. To continue this shift,
leaders must support this cultural change, set the example, educate their organizations, and enforce
data sharing to ensure that the default posture of DoD is to share information broadly. Data sharing
should only be restricted when required by law or DoD-wide policy and where security, privacy,
or ethical considerations are involved. Furthermore, we must ensure not only that data is protected,
but that it is handled properly throughout its lifecycle.</Description></Value><Value><Name>Intelligence</Name><Description>Data for Artificial Intelligence Training -- 
Artificial Intelligence (AI) is a long-term data competency grounded in high-quality training-quality datasets (TQD) that are the pieces of information and associated labels used to build
algorithmic models. TQD and the algorithmic models will increasingly become DoD's most
valuable digital assets. As DoD modernizes and integrates AI technologies into joint warfighting,
generating DoD-wide visibility of and access to these digital assets will be vital in an era of
algorithmic warfare. We must also understand that our competitors gain advantage if these assets
become compromised. Therefore, the DoD Chief Data Officer (CDO), in partnership with DoD
Components, will create a modern governance framework for managing the lifecycle of the
algorithm models and associated data that provides protected visibility and responsible brokerage
of these digital assets.</Description></Value><Value><Name>Purpose</Name><Description>Data Fit for Purpose -- Data "fit for purpose" is quality data that is readily discoverable and understood within the context
of its intended use. It should include careful consideration of any ethical concerns in data
collection, sharing, use, representation of the information intended, rapid data integration, and
minimization of any sources of unintended bias. Customers of DoD data have their own
requirements for accessing DoD data, which may or may not align with the purpose or intent of
the original data collection. Additionally, in some instances, legislation or a regulation may specify
how data is to be used and from which source the data must be consumed. The DoD supports data
exploration to enhance analyses that impact decision making.</Description></Value><Value><Name>Compliance</Name><Description>Design for Compliance -- Implementation of IT solutions provides an opportunity to automate the information management
lifecycle fully, properly secure data, and maintain end-to-end records management. The
Department will make data management and compliance with policies a top priority. Compliance with required data policies is a critical success factor for continued funding of future warfighting
solutions and will be a gate for authorizations to operate.</Description></Value><Goal><Name>Visibility</Name><Description>Make Data Visible</Description><Identifier>_0e006130-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>1</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>The goal of making data visible enables authorized users to discover the existence of data that is
of particular interest or value. Data stewards, data custodians, and functional data managers are all
responsible and obligated to make their data visible to authorized users by identifying, registering,
and exposing data in a way that makes it easily discoverable across the enterprise, and to external
partners as appropriate. Moving towards this type of data visibility allows users (person and nonperson entities) to discover and rapidly identify who is responsible for specific data assets, the
location of data assets, the types of data assets available, and the means of accessing the data assets.
DoD will know it has made progress on making data visible when:</OtherInformation><Objective><Name>Advertisement &amp; Availability</Name><Description>Data is advertised and available for authorized users when and where needed</Description><Identifier>_0e00622a-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>1.1</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Metadata</Name><Description>DoD implements metadata standards including location and access methods
for shared data.</Description><Identifier>_0e00631a-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>1.2</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Catalogue</Name><Description>All DoD data sources are catalogued.</Description><Identifier>_0e00640a-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>1.3</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Publication, Search &amp; Discovery</Name><Description>DoD implements common services to publish, search, and discover data.</Description><Identifier>_0e006504-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>1.4</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Visualizations</Name><Description>Warfighting and business governance bodies make decisions based on live
visualizations of near real-time data.</Description><Identifier>_0e0065fe-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>1.5</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Warfighting Governance Bodies</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Business Governance Bodies</Name><Description/></Stakeholder><OtherInformation/></Objective></Goal><Goal><Name>Accessibility</Name><Description>Make Data Accessible</Description><Identifier>_0e0066ee-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>2</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>The goal of making data accessible enables authorized users to obtain the data they need when
they need it, including having data automatically pushed to interested and authorized users. Data
accessibility must comply with Public Law (P.L.) 115-435, the Foundations for Evidence-Based
Policymaking Act of 2018. DoD is making data, including warfighting, intelligence, and business
data, accessible to authorized users. Accessibility requires that protective mechanisms (e.g.,
security controls) are in place for credentialed users to ensure that access is permitted in accordance
with laws, regulations, and policies.
DoD will know it has made progress on making data accessible when:</OtherInformation><Objective><Name>APIs</Name><Description>Data is accessible through documented standard Application Programming
Interfaces (APIs).</Description><Identifier>_0e0067e8-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>2.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Platforms &amp; Services</Name><Description>Common platforms and services create, retrieve, share, utilize, and manage
data.</Description><Identifier>_0e0069a0-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>2.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Access &amp; Sharing</Name><Description>Data access and sharing is controlled through reusable APIs.</Description><Identifier>_0e006aa4-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>2.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective></Goal><Goal><Name>Comprehensibility</Name><Description>Make Data Understandable</Description><Identifier>_0e006bbc-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>3</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Understanding data is critical to enable enhanced, more accurate, and timely decision-making. The
inability to aggregate, compare, and truly understand data adversely affects the ability of the
Department to react and respond. Without proper context, interpretation and analysis of the data
could be flawed, resulting in potentially fatal outcomes. Bringing together business and technology
and applying a data-centric approach enable massive amounts of data to be transformed into the
insights needed to lead DoD more effectively and efficiently.
DoD will know it has made progress on making data understandable when:</OtherInformation><Objective><Name>Semantics</Name><Description>Data is presented in a way that preserves semantic meaning and is expressed in
a standardized manner throughout DoD.</Description><Identifier>_0e006cc0-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>3.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Syntax</Name><Description>DoD utilizes a common data syntax for the same data types and includes
semantic metadata with data assets.</Description><Identifier>_0e006dba-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>3.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Dictionary</Name><Description>Data elements are aligned into a comprehensive data dictionary with a
controlled, yet flexible, vocabulary and taxonomy.</Description><Identifier>_0e006ed2-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>3.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Inventory</Name><Description>Data is baselined and inventoried in comprehensive data catalogs with
relevant information on purpose, ownership, points of contact, security,
standards, interfaces, limitations, and restrictions on use.</Description><Identifier>_0e006fe0-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>3.4</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Vocabularies</Name><Description>DoD has processes to create, align, implement, and manage business
vocabularies, including enterprise standards.</Description><Identifier>_0e0070da-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>3.5</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Monitoring, Transformation &amp; Insights</Name><Description>Adaptive, intelligent systems monitor data streams and identify opportunities
to transform, combine, or derive new data providing increased insights.</Description><Identifier>_0e00727e-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>3.6</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective></Goal><Goal><Name>Relationships &amp; Dependencies</Name><Description>Make Data Linked</Description><Identifier>_0e0073d2-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>4</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Data-driven decision-making requires DoD data to be linked such that relationships and
dependencies can be uncovered and maintained. Adhering to industry best-practices for open data
standards, data catalogs, and metadata tagging, the Department ensures that connections across
disparate sources can be made and leveraged for analytics.
DoD will know it has made progress on making data linked when:</OtherInformation><Objective><Name>GUIDs</Name><Description>DoD implements globally unique identifiers so data can be easily discovered,
linked, retrieved, and referenced.</Description><Identifier>_0e0074f4-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>4.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Metadata Standards</Name><Description>DoD utilizes common metadata standards that allow data to be joined and
integrated.</Description><Identifier>_0e0076ac-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>4.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective></Goal><Goal><Name>Trust</Name><Description>Make Data Trustworthy</Description><Identifier>_0e00785a-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>5</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>DoD data requires trust to deliver the needed value to its Service members, civilians, and
stakeholders. Lacking confidence in the data may result in less timely decision-making or,
consequently, no decision when one is warranted.
DoD will know it has made progress toward making data trustworthy when:</OtherInformation><Objective><Name>Learning &amp; Budgeting</Name><Description>DoD budget requests and the supporting budget process integrate data-focused
evidence and Learning Agendas (see P.L. 115-435).</Description><Identifier>_0e0079ea-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>5.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Protection &amp; Lineage</Name><Description>DoD data has protection, lineage, and pedigree metadata bound throughout its
lifecycle.</Description><Identifier>_0e007b3e-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>5.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Quality</Name><Description>DoD executes data quality management techniques to assess and enhance data
quality.</Description><Identifier>_0e007c9c-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>5.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Data Management</Name><Description>DoD implements master data management for business, intelligence, and
warfighting data.</Description><Identifier>_0e007dbe-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>5.4</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Records Management</Name><Description>DoD properly tags and maintains all appropriate data and records in
accordance with established processes and policies.</Description><Identifier>_0e007f26-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>5.5</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective></Goal><Goal><Name>Interoperability</Name><Description>Make Data Interoperable</Description><Identifier>_0e00805c-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>6</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>Properly exchanging data between systems and maintaining semantic understanding are critical
for successful decision-making and joint military operations. Achieving semantic as well as
syntactic interoperability using common data formats and machine-to-machine communications
accelerates advanced algorithm development and provides a strategic advantage to the Department.
DoD will know it has made progress toward making data interoperable when:</OtherInformation><Objective><Name>Exchange</Name><Description>DoD documents and implements data exchange specifications for all systems,
including those of coalition partners.</Description><Identifier>_0e00825a-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>6.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Coalition Partners</Name><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Metadata &amp; Meaning</Name><Description>Exchange specifications contain required metadata and convey standardized
semantic meaning with the data set.</Description><Identifier>_0e00839a-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>6.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Machine-Readability</Name><Description>Public data assets are machine-readable and available for consumption.</Description><Identifier>_0e0084c6-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>6.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Mediation</Name><Description>DoD rapidly mediates differing data standards and formats without mission-critical loss of fidelity, precision, or accuracy.</Description><Identifier>_0e0085f2-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>6.4</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Tagging Strategy</Name><Description>DoD develops and promulgates a data-tagging strategy and subsequent
implementation plan to enable data interoperability.</Description><Identifier>_0e00876e-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>6.5</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective></Goal><Goal><Name>Security</Name><Description>Make Data Secure</Description><Identifier>_0e0089bc-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>7</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>As per the DoD Cyber Risk Reduction Strategy, protecting DoD data while at rest, in motion, and
in use (within applications, with analytics, etc.) is a minimum barrier to entry for future combat
and weapon systems. Using a disciplined approach to data protection, such as attribute-based
access control, acrossthe enterprise allows DoD to maximize the use of data while, at the same time,
employing the most stringent security standards to protect the American people.
DoD will know it has made progress toward making data secure when:</OtherInformation><Objective><Name>Privilege Management</Name><Description>Granular privilege management (identity, attributes, permissions, etc.) is
implemented to govern the access to, use of, and disposition of data.</Description><Identifier>_0e008b24-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>7.1</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Classification &amp; Compliance</Name><Description>Data stewards regularly assess classification criteria and test compliance to
prevent security issues resulting from data aggregation.</Description><Identifier>_0e008caa-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>7.2</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Standards</Name><Description>DoD implements approved standards for security markings, handling
restrictions, and records management.</Description><Identifier>_0e008e08-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>7.3</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Markings &amp; Retention</Name><Description>Classification and control markings are defined and implemented; content and
record retention rules are developed and implemented.</Description><Identifier>_0e009092-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>7.4</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Loss Prevention</Name><Description>DoD implements data loss prevention technology to prevent unintended release
and disclosure of data.</Description><Identifier>_0e009290-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>7.5</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Authorizations</Name><Description>Only authorized users are able to access and share data.</Description><Identifier>_0e0093d0-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>7.6</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Restriction Metadata</Name><Description>Access and handling restriction metadata are bound to data in an immutable
manner.</Description><Identifier>_0e009510-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>7.7</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective><Objective><Name>Auditing</Name><Description>Access, use, and disposition of data are fully audited.</Description><Identifier>_0e00965a-0a9b-11eb-9ddb-fdb72983ea00</Identifier><SequenceIndicator>7.8</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation/></Objective></Goal></StrategicPlanCore><AdministrativeInformation><StartDate/><EndDate/><PublicationDate>2020-10-10</PublicationDate><Source>https://media.defense.gov/2020/Oct/08/2002514180/-1/-1/0/DOD-DATA-STRATEGY.PDF</Source><Submitter><GivenName>Owen</GivenName><Surname>Ambur</Surname><PhoneNumber/><EmailAddress>Owen.Ambur@verizon.net</EmailAddress></Submitter></AdministrativeInformation></PerformancePlanOrReport>