Enclosure 11: Requirements Applicable to all Programs Containing IT • Defines Information Technology (IT, National Security Systems (NSS) and Information Systems • Addresses CCA compliance requirements • Post Implementation Reviews (PIR) • Functional Sponsor, Component CIO, and PM are responsible for planning and conducting a PIR for fully deployed IT, including NSS. • PIRs evaluate systems to ensure positive return on investment and decide whether continuation, modification, or termination of the system is necessary 52