JTEG Website Concept of Operation
Objective: Provide a medium for the exchange of information on new technology, processes, and equipment associated with depot maintenance. Facilitate joint service technology development by serving as a communications tool for the Joint Technology Exchange Group (JTEG), the Armed Services, and private industry.
JTEG Purpose: To improve coordination in the introduction of new or improved technology, new processes, or new equipment into Department of Defense Depot Maintenance Activities. The JTEG will seek ways to better leverage technology improvements in depot maintenance through collaboration to support the higher DoD goals of improving effectiveness and efficiency.
JTEG Activities:
- Compile information on the Services’ current and future technology insertion projects and initiatives for organic depots.
- Format the relevant technology information so it is useful throughout the depot maintenance enterprise and disseminate through a website and other easily accessible means.
- Compile information on the Services current depot maintenance technology needs and disseminate to all appropriate DoD activities (laboratories, centers, depots, headquarters).
- Review depot maintenance requirements and capabilities across the Services and assist coordination amongst the Services to share knowledge and resources to improve efficiency.
- Increase coordination to minimize technology duplication.
- Promote emerging technologies that meet current and future joint requirements.
- Be a strong advocate for projects that improve industrial processes, increase efficiency, and/or reduce the environmental impact of depot maintenance.
Website Organization:
“About JTEG”
- JTEG Description, purpose, mission guidance
- Maintenance Depots
- DoD Links
“Points of Contact” – (JTEG Members)
“Technology Programs & Venues” – (List of OSD Technology Programs)
“Technology Corner”
- Posting of OSD & Services’ Maintenance Technology Ideas & Projects
- Brief description of the technology ideas/projects to include attachments and POCs
- Project Submission – Anyone can submit an idea. Each submission is reviewed and subject to approval by a JTEG Principal
“Calendar of Events”
“Forums”
Concept of Support:
Access: The website will be maintained on a non .gov or .mil site to allow private sector personnel access to the information and the capability to submit technology projects to the JTEG.
Submittal & Approval Process:
- All documents posted on the website are required to be reviewed/vetted through the applicable Services’ JTEG Principals and approved for posting by one of the 2 co-chairs.
- All information posted on the website will be Unclassified and available for public release.
- All documents will be clearly marked with the disclosure “Unclassified / For Public Release”.
- All information to be posted will undergo a security scan.
- For a more detailed description of the process, see the guide titled “Steps for Idea and project Submission”
Security Procedures
- OSD(MPP) will show security due diligence and ensure positive control of the information and process.
- A Privacy Notice will be posted on the website describing the below:
- Explaining that the website is not a government website
- Indicate how personally identifiable information (PII) will be maintained, used, or shared
- Explain that by using the website to communicate with the JTEG community, individuals may be providing non-government third parties access to their information to include any PII provided
- Direct individuals to an available official website
- Direct individuals to the DoD Privacy Policy
- Website will comply with the privacy Act of 1974
- Website will collect only information necessary for the proper performance of the JTEG functions and which have practical utility.
- If PII is collected, only the minimum necessary to accomplish the task will be collected. Additionally, a Privacy Impact Assessment is required to describe the following:
- The specific purpose of the website
- Any PII likely to become available through public use of the website
- The intended or expected use of PII
- With whom the agency will share PII
- How the PII will be maintained
- A risk analysis will be performed annually to validate the security control set and determine if any additional controls are needed.
- The concept of support will be reviewed annually
- The system will be FISMA compliant
