- Information Technology Management Reform Act
The Information Technology Management Reform Act of 1996 and the
Federal Acquisition Reform Act (FARA) of 1996 were combined to become the Clinger-Cohen Act of 1996 (CCA). The CCA repealed the earlier Brooks Automatic Data Processing Act, so that agencies did not have to obtain information technology procurement authority from theGeneral Services Administration . The CCA is aUnited States federal law that was co-authored by U.S. RepresentativeWilliam Clinger and SenatorWilliam Cohen in 1996. It is designed to improve the way the federal government acquires and managesinformation technology (IT). It requires the Department and individual programs to use performance based management principles for acquiring IT. These principles include::*Plan major IT investments. :*Revise processes before investment. :*Enforce accountability for performance. :*Use standards.:*Increase acquisition and incorporation of commercial technology. :*Use modular contracting.
The CCA generated a number of significant changes in the roles and responsibilities of various Federal agencies in managing acquisition of IT. It elevated overall responsibility to the Director of the Office of Management and Budget (White House). OMB set forth guidelines that must be followed by agencies.
At the agency level, IT management must be integrated into procurement, and procurement of Commercial-off-the-shelf technology was encouraged. CCA required each agency to name a Chief Information Officer (CIO) with the responsibility of "developing, maintaining, and facilitating the implementation of a sound and integrated information technology architecture". The CIO is tasked with advising the agency director and senior staff on all IT issues.
Since these rules went into effect, the agency CIOs also have worked together to form the
Federal CIO Council . Initially an informal group, the council's existence became codified into law by Congress in the [E-Government Act of 2002] . Official duties for the council include developing recommendations for government information technology management policies, procedures, and standards; identifying opportunities to share information resources; and assessing and addressing the needs of the Federal Government's IT workforce. [ [http://cio.gov/index.cfm?function=aboutthecouncil Federal CIO Council - about the council] , ]In general,
National Security Systems (NSS), as defined in theE-Government Act of 2002 , are exempt from the Act. However, there are specific exceptions to this exemption regarding: 1) capital planning and investment control (CPIC); 2) performance- and results-based management; agencyChief Information Officer (CIO) responsibilities; and 4) accountability.In the Department of Defense, the
Assistant Secretary of Defense for Networks & Information Integration (or ASD(NII)) has been designated as the DoDChief Information Officer and provides management and oversight of all DoD information technology, including national security systems.ee also
* Federal Enterprise Architecture
*Department of Defense Architecture Framework
* Queensland Government Financial Management StandardReferences
External links
* [http://www.dod.mil/cio-nii/docs/ciodesrefvolone.pdf Department of Defense CIO Desk Reference, Volume 1, August 2006] contains a copy of the Act.
* [http://govinfo.library.unt.edu/npr/library/misc/itref.html Summary: Information Technology Management Reform Act of 1996]
Wikimedia Foundation. 2010.