This document provides an overview of Item Unique Identification (IUID) policies and requirements within the Department of Defense (DoD). Key points include:
- IUID requires items valued over $5,000 to be uniquely identified with Unique Item Identifiers (UIIs) for tracking throughout their lifecycle.
- The DoD IUID Registry collects UIIs and item data to provide a single point of reference. As of September 2009 it contained over 7.6 million items.
- IUID supports improved system engineering, logistics, maintenance and financial management by enabling item-level traceability across systems.
Introducing Glonetex Technologies Fingerprint and Facial recognition scanning technologies. Optimized for small businesses, enterprise businesses and governmental agencies.
Rfid technology next generation application solutionsashtopustech
Astopous Technologies is one of the fastest growing identification & security solutions providers .We have best & high performance active and passive RFID technology solutions,for live tracking vehicles and student care in school bus,live stock and health care people tracking ,retail and assets mgmt.
This presentation will provide a comprehensive knowledge on current UDI labeling standards and how medical device companies can implement the best practices to assure compliance.
Introducing Glonetex Technologies Fingerprint and Facial recognition scanning technologies. Optimized for small businesses, enterprise businesses and governmental agencies.
Rfid technology next generation application solutionsashtopustech
Astopous Technologies is one of the fastest growing identification & security solutions providers .We have best & high performance active and passive RFID technology solutions,for live tracking vehicles and student care in school bus,live stock and health care people tracking ,retail and assets mgmt.
This presentation will provide a comprehensive knowledge on current UDI labeling standards and how medical device companies can implement the best practices to assure compliance.
Barcodes in Action - Barcode GeekFest Slidesdavid_h
My presentation from the Path to Labeling success Event.
Covers barcode standards and symbologies, compliance, 2D barcodes and using barcodes for authenticity.
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backendAPIsecure_ Official
APIsecure - April 6 & 7, 2022
APIsecure is the world’s first conference dedicated to API threat management; bringing together breakers, defenders, and solutions in API security.
Method for exploiting IDOR on nodejs+mongodb based backend
Luis Alvarado Day, Associate Manager at Arstar IT
What are the Challenges of IoT SecurityIoT has many of the same s.docxalanfhall8953
What are the Challenges of IoT Security?
IoT has many of the same security challenges that other systems have. There are, however, some challenges that are unique to IoT.
1. Embedded Passwords. Embedding passwords in IoT devices make it easy for remote support technicians to access devices for troubleshooting and simplifies the installation of multiple devices. Of course, it also simplifies access to devices for malicious purposes.
2. Lack of device authentication. Allowing IoT devices access to the network without authenticating opens the network to unknown and unauthorized devices. Rogue devices can serve as an entry point for attacks or even as a source of attacks.
3. Patching and upgrading. Some IoT devices do not provide a simple (or any) means to patch or upgrade software. This results in many IoT devices with vulnerabilities continuing to be in use.
4. Physical hardening. Physical access to IoT devices can introduce risk if those devices are not hardened against physical attack. Such an attack may not be intended to damage the device, but rather to extract information. Simply removing a microSD memory card to read its contents can give an attacker private data, as well as information such as embedded passwords that may allow access to other devices.
5. Outdated components. When vulnerabilities are discovered in hardware or software components of IoT devices, it can be difficult and expensive for manufacturers or users to update or replace them. As with patches, this results in many IoT devices with vulnerabilities continuing to be used.
6. Device monitoring and management. IoT devices do not always have a unique identifier that facilitates asset tracking, monitoring, and management. IT personnel do not necessarily consider IoT devices among the hosts that they monitor and manage. Asset tracking systems sometimes neglect to include IoT devices, so they sit on the network without being managed or monitored.
Most of these issues can be attributed to security being an afterthought (if a thought at all) in the design and manufacturing of IoT devices. Even those IoT developers who consider security in the design process struggle with implementation. Most IoT devices are limited by minimal processing power, memory, and data transfer speeds. This is a necessary evil in order to keep the size and cost of the devices small. Accordingly, security controls must be implemented to compensate for these inherent weaknesses.
The first step to implementing security controls is to determine where those controls are needed. This is another challenge for protecting IoT devices. Since IoT devices are often not recognized as network devices, they get overlooked when inventorying or mapping the network. If you do not know it is there, you cannot protect it.
Fortunately, IoT device manufacturers are beginning to address these issues, but organizations that are planning or currently using IoT cannot sit back and wait for that to happen. There are measures that.
Union Community Co Ltd, a Korean based company established in 2000 is a market leader which develops, markets and distributes award winning Biometric and RFID products for Access Control, Time & Attendance, Door Locks, PC Security and produces product for the OEM market. Our products are sold in more than 100 countries under the Virdi brand
This paper was delivery at the ASNE Virtual Technology, Systems and Ships symposium. January 26-28 2021. It focused on ways to integrate unmanned surface vessels into the fleet. He highlight a concept o operations, he designated as a 'nesting dolls" approach. Credit: MARTAC
Barcodes in Action - Barcode GeekFest Slidesdavid_h
My presentation from the Path to Labeling success Event.
Covers barcode standards and symbologies, compliance, 2D barcodes and using barcodes for authenticity.
2022 APIsecure_Method for exploiting IDOR on nodejs+mongodb based backendAPIsecure_ Official
APIsecure - April 6 & 7, 2022
APIsecure is the world’s first conference dedicated to API threat management; bringing together breakers, defenders, and solutions in API security.
Method for exploiting IDOR on nodejs+mongodb based backend
Luis Alvarado Day, Associate Manager at Arstar IT
What are the Challenges of IoT SecurityIoT has many of the same s.docxalanfhall8953
What are the Challenges of IoT Security?
IoT has many of the same security challenges that other systems have. There are, however, some challenges that are unique to IoT.
1. Embedded Passwords. Embedding passwords in IoT devices make it easy for remote support technicians to access devices for troubleshooting and simplifies the installation of multiple devices. Of course, it also simplifies access to devices for malicious purposes.
2. Lack of device authentication. Allowing IoT devices access to the network without authenticating opens the network to unknown and unauthorized devices. Rogue devices can serve as an entry point for attacks or even as a source of attacks.
3. Patching and upgrading. Some IoT devices do not provide a simple (or any) means to patch or upgrade software. This results in many IoT devices with vulnerabilities continuing to be in use.
4. Physical hardening. Physical access to IoT devices can introduce risk if those devices are not hardened against physical attack. Such an attack may not be intended to damage the device, but rather to extract information. Simply removing a microSD memory card to read its contents can give an attacker private data, as well as information such as embedded passwords that may allow access to other devices.
5. Outdated components. When vulnerabilities are discovered in hardware or software components of IoT devices, it can be difficult and expensive for manufacturers or users to update or replace them. As with patches, this results in many IoT devices with vulnerabilities continuing to be used.
6. Device monitoring and management. IoT devices do not always have a unique identifier that facilitates asset tracking, monitoring, and management. IT personnel do not necessarily consider IoT devices among the hosts that they monitor and manage. Asset tracking systems sometimes neglect to include IoT devices, so they sit on the network without being managed or monitored.
Most of these issues can be attributed to security being an afterthought (if a thought at all) in the design and manufacturing of IoT devices. Even those IoT developers who consider security in the design process struggle with implementation. Most IoT devices are limited by minimal processing power, memory, and data transfer speeds. This is a necessary evil in order to keep the size and cost of the devices small. Accordingly, security controls must be implemented to compensate for these inherent weaknesses.
The first step to implementing security controls is to determine where those controls are needed. This is another challenge for protecting IoT devices. Since IoT devices are often not recognized as network devices, they get overlooked when inventorying or mapping the network. If you do not know it is there, you cannot protect it.
Fortunately, IoT device manufacturers are beginning to address these issues, but organizations that are planning or currently using IoT cannot sit back and wait for that to happen. There are measures that.
Union Community Co Ltd, a Korean based company established in 2000 is a market leader which develops, markets and distributes award winning Biometric and RFID products for Access Control, Time & Attendance, Door Locks, PC Security and produces product for the OEM market. Our products are sold in more than 100 countries under the Virdi brand
This paper was delivery at the ASNE Virtual Technology, Systems and Ships symposium. January 26-28 2021. It focused on ways to integrate unmanned surface vessels into the fleet. He highlight a concept o operations, he designated as a 'nesting dolls" approach. Credit: MARTAC
The title of the Williams Foundation Seminar held on October 24, 2019 was “the requirements for fifth generation manoeuvre.” But those presentations which dealt with the industry and the government-industry relationship highlighted that the legacy approach to setting requirements which not deliver effectively fifth-generation manoeuvre capabilities.
The industrial-government eco system is evolving and that evolution needs to deliver cross-domain integration which requires government and industry to work together more effectively. And moving passed stove-piped platform acquisition and finding ways to shape Australian defense architectures which can subsume systems bought abroad within a more integrated Australian set of capabilities are two of the key tasks facing the Australian defense system.
The Deputy Secretary of the Capability Acquisition and Sustainment Group provided his perspective in his presentation to the Seminar.
The title of the Williams Foundation Seminar held on October 24, 2019 was “the requirements for fifth generation manoeuvre.” But those presentations which dealt with the industry and the government-industry relationship highlighted that the legacy approach to setting requirements which not deliver effectively fifth-generation manoeuvre capabilities.
The industrial-government eco system is evolving and that evolution needs to deliver cross-domain integration which requires government and industry to work together more effectively. And moving passed stove-piped platform acquisition and finding ways to shape Australian defense architectures which can subsume systems bought abroad within a more integrated Australian set of capabilities are two of the key tasks facing the Australian defense system.
Richard Czumak of Lockheed Martin provided his perspective in his presentation to the Seminar.
Presentation By Air Vice Marshal (Retd.) Chris DeebleICSA, LLC
The title of the Williams Foundation Seminar held on October 24, 2019 was “the requirements for fifth generation manoeuvre.” But those presentations which dealt with the industry and the government-industry relationship highlighted that the legacy approach to setting requirements which not deliver effectively fifth-generation manoeuvre capabilities.
The industrial-government eco system is evolving and that evolution needs to deliver cross-domain integration which requires government and industry to work together more effectively. And moving passed stove-piped platform acquisition and finding ways to shape Australian defense architectures which can subsume systems bought abroad within a more integrated Australian set of capabilities are two of the key tasks facing the Australian defense system.
The head of Northrup Grumman Australia, Chris Deeble, provided his perspective in his presentation to the Seminar.
BG langford Presentation at Williams Foundation seminar October 24 2019ICSA, LLC
BRIG Ian Langford, the head of Army’s Land Capability programs highlighted at the Williams Foundation Seminar held in Canberra, Australia, October 24, 2019, how he saw the Army adapting to the new environment and contributing to fifth generation manoeuvre.
BRIG Ian Langford argued that the evolving networks of forces enabled by a fifth-generation approach could provide new ways to mix and match forces to allow for more combat flexibility.
AIRCDRE Phil Gordon on the Changing Character of ManouvreICSA, LLC
The Commander of the RAAF’s Air Warfare Centre, AIRCDRE Phil Gordon focused on the changing nature of C2 at the Williams Foundation Seminar on the Changing Requirements for Fifth Generation Maneuver held in Canberra, Australia, October 24, 2019.
In this prevention at the Williams Foundation Seminar held in Canberra, Australia on October 24, 2019,
The scene setting presentation for the seminar was provided by WGCDR Joe Brick of the Australian War College. She provided a look back to inform the way ahead for Australia and its allies to position themselves for decisive advantage in 21st century conflict. .
The core GATR capability is really about rapid response.
In an article by Debra Werner of Space News published on December 5, 2017, the role of GATR was highlighted.
Cubic Corporation’s GATR satellite antennas continue to provide communications links for residents and community leaders in Puerto Rico more than two months after Hurricane Maria devastated the U.S. territory and nearby Caribbean islands.
Employees of GATR Technologies, part of Cubic Corporation’s Mission Solutions Division, were in the U.S. Virgin Islands working to reestablish communications in the wake of Hurricane Irma, when Help.NGO’s Disaster Immediate Response Team and Cisco Systems’ Tactical Operations Team called for assistance in Puerto Rico.
Victor Vega, GATR Technologies director of emerging solutions, and his colleagues packed inflatable satellite antennas in suitcases and brought them to areas of Puerto Rico where hurricane-force winds and fallen trees had dismantled the terrestrial communications infrastructure. They installed inflatable GATR 2.4 meter antennas on rooftops, including two U.S. Army National Guard buildings that served as a distribution point for food and water.
https://spacenews.com/5-markets-puerto-rico-turns-to-inflatable-satellite-antennas-for-communications/
In this briefing by Wing Commander Alison MacCarthy, the CO of the Heavy Air Lift SPO looks at how the RAAF works with industry to maintain its air platforms.
MBDA Briefing at Williams Foundation Seminar, April 11, 2019ICSA, LLC
This briefing by Chris Stevens from MBDA highlights the UK approach to sovereignty with regard to its weapons enterprise.
It was presented at the Williams Foundation Seminar in Canberra, Australia, April 11, 2019
Far from the Sanctuaries: Sustaining a Fifth Generation Fight in the Indo-Pac...ICSA, LLC
During the recent Williams Foundation Seminar examining the approach and ways to sustain Australian forces in the evolving regional context, Donna- Cain-Riva. Director of Future Logistics Capability for the Royal Australian Air Force, provided an overview on key capabilities necessary to sustain the force for anticipated regional crises.
Currently, she is working within the RAAF, but has been working in a variety of logistics positions in the ADF since 2001, and the range of experience makes a great deal of sense given the focus within the RAAF on providing a joint capability for the ADF overall.
Mike Tarlton Briefing to Williams Fondation Seminar on Joint Strike, August ...ICSA, LLC
Mike Tarlton, Director, Advanced Programs, Northrop Grumman Aerospace Systems, provided a look at advanced unmanned concepts as a way to enhance independent RAAF strike capability.
Improving profitability for small businessBen Wann
In this comprehensive presentation, we will explore strategies and practical tips for enhancing profitability in small businesses. Tailored to meet the unique challenges faced by small enterprises, this session covers various aspects that directly impact the bottom line. Attendees will learn how to optimize operational efficiency, manage expenses, and increase revenue through innovative marketing and customer engagement techniques.
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
Marvin neemt je in deze presentatie mee in de voordelen van non-endemic advertising op retail media netwerken. Hij brengt ook de uitdagingen in beeld die de markt op dit moment heeft op het gebied van retail media voor niet-leveranciers.
Retail media wordt gezien als het nieuwe advertising-medium en ook mediabureaus richten massaal retail media-afdelingen op. Merken die niet in de betreffende winkel liggen staan ook nog niet in de rij om op de retail media netwerken te adverteren. Marvin belicht de uitdagingen die er zijn om echt aansluiting te vinden op die markt van non-endemic advertising.
Recruiting in the Digital Age: A Social Media MasterclassLuanWise
In this masterclass, presented at the Global HR Summit on 5th June 2024, Luan Wise explored the essential features of social media platforms that support talent acquisition, including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok.
VAT Registration Outlined In UAE: Benefits and Requirementsuae taxgpt
Vat Registration is a legal obligation for businesses meeting the threshold requirement, helping companies avoid fines and ramifications. Contact now!
https://viralsocialtrends.com/vat-registration-outlined-in-uae/
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
What is the TDS Return Filing Due Date for FY 2024-25.pdfseoforlegalpillers
It is crucial for the taxpayers to understand about the TDS Return Filing Due Date, so that they can fulfill your TDS obligations efficiently. Taxpayers can avoid penalties by sticking to the deadlines and by accurate filing of TDS. Timely filing of TDS will make sure about the availability of tax credits. You can also seek the professional guidance of experts like Legal Pillers for timely filing of the TDS Return.
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
B2B payments are rapidly changing. Find out the 5 key questions you need to be asking yourself to be sure you are mastering B2B payments today. Learn more at www.BlueSnap.com.
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
Premium MEAN Stack Development Solutions for Modern Businesses
IUID Policy
1. Item Unique Identification (IUID)
Enables Streamlined Acquisition
And System Engineering
NDIA System Engineering Conference
26-29 October 2009
San Diego, CA
Rob Leibrandt
Deputy, UID Policy
Office of the Secretary of Defense
Defense Procurement
OUSD(AT&L)/DP/PDI
robert.leibrandt@osd.mil
SLIDE 1
SLIDE 1
2. Historical Methods of
Identification
• Logistics and Engineering ─ NSN, Manufacturer and
Part Number
• Property Management ─ Tail Number, Hull Number,
Asset Tag (usually for local tracking)
• Manufacturing ─ Part Number, Serial Number
• Maintenance ─ Manufacturer, Part Number
• Tracking (regulatory and security) ─ Mixed
• Acquisition ─ Contract and Line Item Numbers and
Quantity
• Finance ─ Fund Cite and Requisition Documents
SLIDE 2
SLIDE 2
3. UID Hierarchy
Unique Identification (UID) is a system of identifying entities to
distinguish them from each other.
Item Unique Identification (IUID) is a system of marking items with
Unique Item Identifiers (UIIs) that distinguish them from all other like
and unlike items.
Other efforts include:
Real Property Unique Identification (RPUID)
Acquisition Program Unique Identification (APUID)
System Unique Identification (SYSUID)
Organization Unique Identification (OUID)
Internal DoD (FMID)
External to DoD (CAGE, DUNS, etc.)
SLIDE 3
SLIDE 3
4. What Does IUID Provide?
Uniquely identifying tangible items will provide the
“data key” to item life cycle traceability in DoD
business processes and information systems and provide
reliable data and accurate data, via Automatic
Identification Technology (2D Data Matrix), for
engineering, logistics, management, financial,
accountability and asset management purposes.
Required on all new Solicitations since 1 January 2004
AND
Legacy item compliance mandatory between 2008 and 2015
SLIDE 4
SLIDE 4
5. Automatic Identification
Technology -Back to the Future
“I think the industry has sold itself on a
program that offers so little return that it simply
won’t be worth the trouble and expense”
discussing the potential
of the barcode in 1975*
*“Scanning Hits a Snag,” Progressive Grocer, December 1975, p. 47
SLIDE 5
SLIDE 5
6. Automatic Identification Technology
Contact Passive RFID Tags
Memory
1D Barcode
Buttons
2-D Barcodes
Data Matrix QR Code MaxiCode
Active RFID Tags
PDF417 Bullseye Aztec
SLIDE 6
SLIDE 6
7. Marking Techniques
Labels (Stickers) Ink Jet Printing
Data Plates Laser Ablation
Dot Peen Laser “Annealing”
Laser Etch Cast/Forged
Chemical Etch Laser Bonding
Silk Screening Embroidery
Thermal Spray Photo Etch
Compliant UII marks are optically read…so almost any marking method will work! 7
SLIDE 7
SLIDE
8. Key Direction from IUID Policy Updates
Apply IUID to legacy items in inventory and operational use
All program and item managers plan for and implement IUID
ACAT 1D programs submitted plans by June 2005
All others to MDAs by January 2006
All new programs must submit a plan as part of their System
Engineering Plan
Government Furnished Property (GFP) must meet IUID
policy requirement effective 1 Jan 2006
DD 1662 for annual inventory of GFP eliminated
Plans must address:
All existing serialized assets will be entered in IUID Registry
UII marking capabilities established such that marking can
commence when equipment is returned for maintenance
SLIDE 8
SLIDE 8
9. Key Direction from IUID Policy Updates
DUSD (Logistics and Material Readiness) develop IUID implementation plan for organic
depot maintenance operations
Jan 2007: OUSD Materiel Readiness & Maintenance Policy released “Implementing Item-
Unique Identification in DoD Maintenance” (dated 31 Jan 07)
The Concept of Operations for IUID-Enabled Maintenance in Support of DoD Materiel Readiness
14 March 2008: Memo Under Secretary (AT&L)
Policy for IUID of Tangible Personal Property – Oversight of IUID Implementation Planning and
Execution
16 June 2008: DoDI 8320.04 Item Unique Identification (IUID) Standards for Tangible
Personal Property
http://www.dtic.mil/whs/directives/corres/pdf/832004p.pdf
24 October 2008: Memo Under Secretary (AT&L)
Nuclear Weapons-Related Materiel (NWRM)
3 Aug 2009: Under Secretary AT&L Ashton Carter, “Preservation and Storage of Tooling for
Major Defense Acquisition Programs (MDAPs)”
Requires IUID and the planning for Preservation and Storage of Tooling for prior to Milestone C
(SEP) and at Milestone C (LCSP) SLIDE 9
SLIDE 9
10. IUID Policy Overview
Policy memorandum released on July 29, 2003 (with subsequent updates)
established IUID as a mandatory DoD requirement on all solicitations issued on
or after January 1, 2004.
IUID is required for all property items delivered to the Government if:
Acquisition cost is greater than or equal to $5,000
Items with an acquisition cost below $5,000, when identified by the requiring
activity as DoD serially managed, mission essential, or controlled inventory
Items with an acquisition cost below $5,000 as determined by the requiring
activity
Regardless of value, any DoD serially managed subassembly, component or
part embedded within an item and the “parent” item in which it is embedded
Wide Area Workflow (WAWF) is the preferred method for capturing IUID data and
is the mandatory DoD invoicing system
SLIDE 10
SLIDE 10
11. Create and Generate the UII
The components that make up the UII are identified in the table below.
Each enterprise has two options for creating the UII.
UII Construct #1 UII Construct #2
Based on current enterprise If items are serialized within If items are serialized within
configurations
UII is . . the Enterprise Part Number
UII is derived by Issuing Agency Code* Issuing Agency Code*
concatenating the data Enterprise ID Enterprise ID
elements IN ORDER: Serial Number Original Part Number / Lot or
Batch Number
Serial Number
Data Identified on Assets Current Part Number** Current Part Number **
Not Part of the UII (Separate Other Traceability Number*** Other Traceability Number***
Identifier)
*The Issuing Agency Code (IAC) represents the registration authority that issued the enterprise identifier (e.g., Dun and Bradstreet,
EAN.UCC). The IAC can be derived from the data qualifier for the enterprise identifier and does not need to be marked on the item.
** In instances where the original part number changes with new configurations (also known as part number roll), the current part number
may be included on the item as a separate data element for traceability purposes.
*** The data identifier 30T has been designated for use as a traceability number that is not part of the UII. For example, applications may
specify 30T for encoding lot or batch number when the lot or batch number is not required or desired in the UII.
SLIDE 11
SLIDE 11
12. Create and Generate the UII
BUSINESS RULES
The UII shall be derived from its discrete component data elements.
The UII is not required to be marked on the item as a separate data element.*
UII Construct #11 UII Construct #22
EID MFR 0CVA5 EID (12V)194532636
Serial No. SER 786950 Orig. Part No. (1P)1234
Serial No. (S)786950
UII Construct #1 UII Construct #2
D1 0CVA5786950 UN1945326361234786950
IAC CAGE Serial No.
1
IAC DUNS Orig. Serial No.
This example uses Text Element Identifiers
Part No.
2 This example uses MH10.8.2 Data Identifiers.
*Ifthe enterprise chooses to mark the UII as a discrete data element on the item, the component data elements must also be marked on
the item as discrete data elements, in addition to the UII.
SLIDE 12
SLIDE 12
13. System Engineering Requirement
AT&L Memo-Implementation Planning & Execution 14 March 2008
System Engineering Plan
Describe overall IUID Implementation Strategy to include
Requirements Generation
Marking
Data Submission
Describe role of IUID in program sustainment strategy
List Metrics
Implementation Timeline
Life Cycle Supportability
Property accountability & management and financial accounting enabled by IUID
Incorporate capability to use IUID in all new Automated Information Systems (AIS) used for
management of property
DODI 5000.02 “Operation of the Defense Acquisition System, 2 December 2008
IUID Implementation Plan required per DoD Instruction 8320.04
Milestone A (summarized in SEP)
Milestone B (annex to SEP)
Milestone C (annex to SEP)
SLIDE 13
SLIDE 13
14. UID of Items Enabled Intensive
System Life Cycle Management
Capabilities Requirements Objectives
DRAFT
• Financial Management
• Warranty Management
• Tracking Item Performance
System Life Cycle
• Failure Analysis Management
• Reliability Improvement Value
• Engineering Design Analysis
• Maintenance Productivity Decisions
• Supply Productivity
• Safety
Analyses Collect, Manage
• Accountability
and Share
Information Systems Information
• Automated Data
Collection
Life Cycle Events
UID of
• Machine- Items
Uniquely Identified Items
Readable Marking
Army Recognizes the Capability Generated with IUID and SIM
Source: Study Draft 0.7 NATO Allied Publication AUIDP-1
SLIDE 14
SLIDE 14
15. Systems Life Cycle Management
View
• UII is one of the “common data keys” needed for System Life
Cycle Management to link item level data and information across
multiple systems and owners
• Comprehensive UII visibility from “as–built” configuration through
distribution and deployment process to item configuration at
disposal
• Existing mandated tracking uses UII as a common approach
across all in scope platforms
– Tracking via serial numbers is not new (e.g. Flight Critical Safety
Items, controlled items, serially managed)
– Individual systems or reporting requirements generate “point”
solutions that do not encourage common usage
• Supply Chain Management decision making using UIIs.
• Complete lifecycle traceability
• Common data exchange formats virtually eliminate translation
requirements
SLIDE 15
SLIDE 15
16. Just Imagine the Systems Benefits
Possible with:
• Fully defined Product WBS at all points during the
lifecycle to which :
– Operational, maintenance and reliability data can be
associated
– Failure data can be assigned at the item level
– Operational planning can reduce logistics tail and target
skills
• The change in culture with data that:
– Reliable and Accurate
– Used to pull authoritative data from databases to pre-
populate work orders, requisitions, PQDR, SDR
– Labor savings associated with automatic data capture
SLIDE 16
SLIDE 16
17. Online Resources
Official DoD UID Policy Office Website
www.uniqueid.org
Comprehensive resource of UID and IUID policies, standards, directives,
videos and success stories.
Be sure to sign up for the IUID in Action eNewsletter!
IUID Helpdesk
defensepolicysupport@ebpsc.org or 1.877.376.5787
Defense Acquisition University
www.dau.mil
DAU offers 2 distinct online courses to increase your IUID knowledge
CLE040 “Item Unique Identification Marking” and CLM200 “Item Unique
Identification”
SLIDE 17
SLIDE 17
19. DoD IUID Registry
Purpose:
Collect IUID and pedigree information of tangible items owned by DoD
Distribute IUID and pedigree information to DoD users
Provide single point of reference for DoD tangible items that have assigned
Unique Item Identifiers
Operational Environment:
IUID Registry – database located in Battle Creek, MI
Operated by Defense Logistics Information Service (DLIS)
Resides on Business Process Network backbone
Submit Data
By WAWF
XML or flat file through GEX Rapidly
Manually via IUID Web Entry Site at Growing!
http://www.bpm.gov/iuid
SLIDE 19
SLIDE 19
20. DoD IUID Registry Statistics
as of 30 September 09
• 7,650,056 Items registered
• 5,474,069 New items
• 2,175,987 Legacy
• 1,687 Contractors have delivered new UIIs
• 990 of the contractors (59%) are small businesses*
• 1,520,434 of the new items (28%) are from small
businesses*
• Growth rate of over 49,000 new UIIs/week**
• 340,849 Items are in GFP status
* Based on current size status in CCR
** Legacy and GFP UIIs often come in large batches and weekly rates for those are not meaningful
SLIDE 20
SLIDE 20
21. Registry Population
as of 30 September 09
IUID Registry Population
8,000,000 2,000
1,800
7,000,000
1,600
Contractors
UIIs
6,000,000
1,400
5,000,000 1,200
4,000,000 1,000
800
3,000,000
600
2,000,000
400
UIIs
1,000,000 200
Legacy UIIs
- - New UIIs
Dec-04
Mar-05
Jun-05
Sep-05
Dec-05
Mar-06
Jun-06
Sep-06
Dec-06
Mar-07
Jun-07
Sep-07
Dec-07
Mar-08
Jun-08
Sep-08
Dec-08
Mar-09
Jun-09
Sep-09
Dec-09
Mar-10
Legacy GFP
In GFP Status
Date
* The category “Prime Contractors” was previously counting Prime Identifiers. The number has Prime Contractors21
SLIDE 21
SLIDE *
been adjusted to accurately reflect the number of unique businesses submitting UII to the Registry.