C1.2.1. This Manual applies to all DoD Components that are involved in
the acquisition of DoD systems in accordance with DoD Directive 5000.1 (reference (a)), in providing security
support to DoD or DoD contractor facilities, and in the DoD intelligence
and/or counterintelligence programs.
C1.2.2. This Manual does not apply to acquisitions by DoD Components that
involve Special Access Programs created under the authority of Executive
Order 12356 (reference (i)) or
acquisition of Automated Information Systems under DoD Directive 8120.1 (reference (i)) and DoD Instruction 8120.2
(reference (k)); however, to the extent
feasible and appropriate, DoD Components should adhere to the program
protection planning provisions provided in this Manual for those acquisition
programs. Before Special Access Programs transition to collateral status,
the requirements of this Manual shall be met.
C1.2.3. The Manual defines the processes by which information,
technologies, and systems that are essential to the successful development
and deployment of new DoD systems are identified and protected.
C1.2.4. EPITS covered by this Manual shall be identified, prioritized,
and protected in accordance with the program protection plans (PPPs)
prescribed in this Manual.
C1.2.5. The criteria in the Manual shall be applied at all locations
where EPITS are analyzed, maintained, stored, used, developed, transported,