Anti-Counterfeit Policy Framework

Slides:



Advertisements
Similar presentations
1 Accountability and Management of Military Equipment January 26, 2007 Webcast Interview With Mr. Richard K. Sylvester Deputy Director, Acquisition Resources.
Advertisements

No U.S. Government export controlled content. No U.S.G. export restrictions apply 1 DoD Public Meeting: Detection and Avoidance of Counterfeit Electronic.
DII Best Practices Forum: New Developments Peter J. Eyre Crowell & Moring © Crowell & Moring LLP All Rights Reserved. June 23, 2011.
1 NDAA 2012 Section 818 Further Implementation for Trusted Suppliers March 27, 2014 Fred Schipp Naval Surface Warfare Center, Crane Division
© The Aerospace Corporation 2013 Recommendations for changes to the Counterfeit Avoidance and Detection of Electronic Parts DFARS David Meshel Sr. Project.
Hot Compliance Topics in the Supply Chain 1.Human trafficking 2.Conflict minerals 3.Counterfeit goods 4.Whistleblower / Suspension /Debarment Topic overview.
Defense Contract Management Agency Quality Assurance Directorate Presented By: Michael Shields Executive Director, Quality Assurance March 15 th, 2011.
U.S. General Services Administration Presentation to: ITIC Improving Cybersecurity through Acquisition Emile Monette Senior Advisor for Cybersecurity GSA.
1 Moderated by Gordon Gillerman National Institute of Standards & Technology November 10, 2010 Ninth Annual ANSI-HSSP Plenary: U.S. European Collaboration.
1 Case Title: Training for Contractor Personnel Interacting with Detainees (DFARS Case 2005-D007)  Type:Final Rule Published 9/8/06 -Received one response.
U.S. General Services Administration Presentation to: Software and Supply Chain Assurance Forum Improving Cybersecurity through Acquisition December 17,
Assessing Workforce Competencies and Competency Gaps: DoD DCAT DON Partnership Brief 8 August 13.
Defense Critical Infrastructure Program (DCIP)
Continuity of Business Overview Adapted from the FAD PReP/NAHEMS Guidelines: Continuity of Business (2013)
Federal STI Managers’ Group Brief Introduction CENDI.
DoD Public Meeting: Detection and Avoidance of Counterfeit Electronic Parts Storme Street Director, Government Relations, Policy BAE Systems, Inc. March.
Complying With The Federal Information Security Act (FISMA)
Food and Agriculture Sector Coordinating Councils John L. Williams, DVM U.S. Department of Agriculture AFDO Annual Conference Kansas City, MO June 7, 2005.
1 1 Update on DoD Progress in Anti-Counterfeiting April 12, 2011 L&MR/SCI.
GS1 US INITIATIVES UPDATE MARCH 18, GS1 STANDARDS MAKES IT POSSIBLE 2 SAFETYSECURITY VISIBILITYEFFICIENCY COLLABORATION To apply standards to business.
Association of Defense Communities June 23, 2015
FAR Part 39 – Acquisition of Information Technology FAR Study Group 28 Jan 2014 Acquisition Policies and Procedures.
Federal Acquisition Service U.S. General Services Administration June 3, 2013 Joint Working Group on Improving Cybersecurity and Resilience through Acquisition.
Veterans Health Administration Shared Training Partnerships June 4, 2009.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Public-Public Partnerships February 27, ADC WINTER FORUM | PAGE 2 Public – Public Partnerships Boot camp for Defense Communities Craig Zgabay.
1 Humanitarian Mine Action (HMA) Colombia Assistance Plan 9 – 12 June 2009 Mr. José M. Matos Stability Directorate Humanitarian Assistance Division
Of XX Cybersecurity in Government Contracting David Z. Bodenheimer, Partner, Crowell & Moring LLP ©2015 PubKLearning. All rights reserved.1 The Federal.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Of XX Government Contracts Statutes, Regulations, Executive Orders & Policies Stu Nibley, Partner, K&L Gates LLP ©2015 PubKLearning. All rights reserved.1.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
Flow of ISMS endeavors based on the PDCA cycle Raise staff awareness ① Confirmation of work flow in relation to the transfer of media Create a work flow.
New A.M. Best Cyber Questionnaire
UNCLASSIFIED Joint Program Executive Office for Chemical and Biological Defense UPDATES Chemical Biological Defense Acquisition Initiatives Forum May 6,
Mitigating Risk 2015 SEWP Acquisition Summit and Training 1 December 8-10, 2015.
1 Amy Williams, Senior Procurement Analyst March 25, 2008 Defense Acquisition Regulations System
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
Office for Domestic Preparedness Overview Briefing Bob Johns Branch Chief State and Local Program Management Division June 4, 2003 Department of Homeland.
NITRD Networking and ITRD IT R&D CIC computing, info and comm HPCC and communication HPC high-performance computing George O. Strawn NITRD co-chair and.
Distribution Statement A – Approved for public release by DOPSR. Distribution is unlimited PSM Workshop April 6, 2016 | Page-1 Melinda Reed Office.
Federal Information Security Management Act (F.I.S.M.A.) [ Justin Killian ]
SERVICES ACQUISITION REFORM ACT OF 2003 A STATUS REPORT
New A.M. Best Cyber Questionnaire
Commercial Item Acquisitions: A Brief Update
NAVSEA Material Fraud and Counterfeit Materiel Manager
DAG Chapter 4 Systems Engineering Design Considerations
Information Technology Controls
Information Technology Sector
Supply Chain in a Government Acquisition
Trade-offs to establish an integrated, comprehensive protection scheme
California Cybersecurity Integration Center (Cal-CSIC)
Figure 2: Overview of Program Protection Activities and Relationships
Purpose Provide an update on recent major changes to law, policy, and guidance that affect the way we conduct IA&E activities National Defense Authorization.
Wassenaar Arrangement 20th Anniversary Practical Workshop
1033 Program Overview Last Updated July 14, 2011
ATD session 2: compliancy versus mission assurance
IS4550 Security Policies and Implementation
Cybersecurity ATD technical
Industrial Base Analysis and Sustainment (IBAS) Program Overview
Understanding the New Micro-Purchase Thresholds
CISA: Mission, Authorities, and Capabilities
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
NSRP Workforce Development Panel – Navy Program Manager Thoughts
Type: Final Rule Published 9/8/06
Presented by Trey Hodgkins SVP of Public Sector June 16, 2014
Security of Department of Defense Acquisition Ecosystem
*Separate register for CTF at:
Policy Update Overview
Purpose Provide an update on recent major changes to law, policy, and guidance that affect the way we conduct IA&E activities National Defense Authorization.
IoT and Supply Chain Risk Management
Presentation transcript:

Anti-Counterfeit Policy Framework Mr Scott Hawkins ODASD(Logistics) August 27, 2019

Counterfeit Policy DoDI 4140.67 – DoD Counterfeit Prevention Policy Responsibilities to prevent introduction of counterfeits into DoD Supply Chain Include special requirements of FY12 NDAA Section 818, preventing introduction of electronic counterfeit parts Responsibilities for prevention, detection, remediation, investigation, and restitution related to counterfeit parts DoDI 5200.44 – Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) DFARS 252.246-7007 “Contractor Counterfeit Electronic Part Detection and Avoidance System” DFARS 252.246-7008 “Sources of Electronic Parts” Title 10 U.S.C. Section 2339a “Enhanced Procedures for SCRM” NDAA FY18 Section 889 “Prohibition on Certain Telecom & Video Surveillance Services or Equipment Current Legislation Revolves Around ICT Related to National Security Systems

Anti-Counterfeit/SCRM Efforts Federal Acquisition Supply Chain Security Act (FASCSA) Requires all agencies to assess, avoid, mitigate, accept, or transfer supply chain risks Establishes the Federal Acquisition Security Council (FASC) Set SCRM standards Bolster inter-agency collaboration…Information sharing Manage government-wide SCRM activities Trusted Systems and Networks (TSN) Rountable Joint Federated Assurance Center Defense Industrial Base Cybersecurity Info Sharing Program Government-Industry Data Exchange Program (GIDEP) Individual Service/Program Office Initiatives – SCRM Illumination Many Functional Efforts – Need Information Sharing Respository