SOLICITATION NOTICE
70 -- Maintenance on Fledermaus Licenses
- Notice Date
- 1/21/2016
- Notice Type
- Combined Synopsis/Solicitation
- NAICS
- 541519
— Other Computer Related Services
- Contracting Office
- Other Defense Agencies, National Geospatial-Intelligence Agency, OCSW - GEOINT/Enterprise Operations, Attn: OCSW Mail Stop L-13, 3838 Vogel Road, Arnold, Missouri, 63010-6238, United States
- ZIP Code
- 63010-6238
- Solicitation Number
- 320AS09
- Point of Contact
- Douglas H. Verseman, Phone: 3146760195
- E-Mail Address
-
douglas.h.verseman@nga.mil
(douglas.h.verseman@nga.mil)
- Small Business Set-Aside
- N/A
- Description
- National Geospatial Intelligence Agency Request for Quote (RFQ) The National Geospatial Intelligence Agency (NGA) has a requirement as detailed below: This is a combined synopsis/solicitation for commercial items prepared in accordance with the format in FAR subpart 12.6 and FAR part 13, as supplemented with additional information included in this notice. This announcement constitutes the only solicitation; quotes are being requested and a written solicitation will not be issued. The North American Industry Classification System (NAICS) code for this acquisition is 541519 and the size standard is $27.5M. Software Title Qty PoP Maintenance on Fledermaus Stand Alone Licenses 1 22 Jan 2016 – 21 Jan 2017 Maintenance on Fledermaus Seat Server Licenes 14 22 Jan 2016 – 21 Jan 2017 Maintenance on FM Pro Licenses 3 22 Jan 2016 – 21 Jan 2017 This is a request for quote for the items listed above. NGA intends to negotiate on a sole source basis with Quality Positioning Services. You must be the manufacturer or authorized reseller of the software and maintenance to respond to this RFQ. This notice is a request for competitive proposals. The Government reserves the right to cancel this solicitation, with no obligation to the vendor by the Government. Maintenance shall include bug fixes, patches, and technical support. If any interested party is capable of fulfilling all of NGA’s requirements, please explain in a two-page capability statement submitted to Doug Verseman at Douglas.H.Verseman@nga.mil by 26 JAN 2016 09:00 am Central Time. This requirement is for Electronic and Information Technology (EIT) which must meet the accessibility standards established by Section 508 of the Rehabilitation Act of 1973 (29 U.S.C. 7941). The specific Technical Standards that apply are Technical Standard: 1194.21 - Software Applications 1194.22 – Web Based Intranet and Internet Information and Applications, and 1194.31 Functional Performance Criteria also applies. In responding to the RFQ, vendors must state if the products offered meet the identified Technical Standards. General information regarding the Section 508 Act can be found at the web site www.section508.gov The following clauses and provisions apply to this acquisition: TIME OF EQUIPMENT DELIVERIES Deliveries shall be accomplished between the hours of 0700 and 1500 local time exclusive of Saturdays, Sundays and Federal holidays at the address indicated unless other limitations are identified herein. The provision FAR 52.212-1, Instructions to Offerors-Commercial Items applies to this acquisition. Vendors are required to have FAR 52.212-3, Offeror Representations and Certification--Commercial Items included in their System for Award Management (SAM) record. The following clauses all apply to this acquisition: The clause 52.212-5 Contract Terms and Conditions Required to Implement Statutes Or Executive Orders--Commercial Items, applies to this acquisition, with the following clauses checked: 52.209-10 Prohibition on Contracting with Inverted Domestic Corporations 52.219-28 Post Award Small Business Program Rerepresentation; 52.222-3 Convict Labor; 52.222-19 Child Labor--Cooperation with Authorities and Remedies; 52.222-21 Prohibition of Segregated Facilities; 52.222-26 Equal Opportunity; 52.222-36 Affirmative Action for Workers with Disabilities 52.222-50 Combating Trafficking in Persons 52.223-18 Encouraging Contractor Policies to Ban Text Messaging While Driving; 52.225-13 Restrictions on Certain Foreign Purchases; 52.232-33 Payment by Electronic Funds Transfer - Central Contractor Registration; and 52.233-3 Protest after Award 52.233-4 Applicable Law for Breach of Contract Claim 52.239-1 Privacy or Security Safeguards. The clauses: 52.243-1 Changes – Fixed Price 52.249-1 Termination for Convenience of the Government Apply to this acquisition. Contract terms and conditions required to implement statutes or Executive Orders applicable to Defense Acquisitions of Commercial Items. To view the clauses in full text, visit www.farsite.hill.af.mil The following additional clauses and provisions apply to this acquisition: 5X52.232-9000 SUBMISSION OF INVOICE-FEDERAL PAYMENT CENTER (FPC) (OCTOBER 2015) (a) The contractor shall prepare each invoice in accordance with the Prompt Payment Act and either fax or email one copy of the invoice to the DoD/FPC Scott AFB IL toll free at fax (855) 293-0972 or 614-701-2675/DSN 791-2675; or email FMFOINSP@nga.mil. The DoD/FPC at Scott AFB IL requires a fax or email copy, but will accept a hard copy that is mailed to Federal Payment Center, P.O. Box 25767, Scott AFB, IL 62225. (b) At the same time of submission of the invoice to the FPC vendor pay office, the contractor will shall fax or email one copy to Doug Verseman. Douglas.h.verseman@nga.mil, Fax number 314-676-3010, and one copy to Marquita Chapman, Marquita.C.Chapman@nga.mil. The contractor shall ensure that the invoice submitted to the payment office is the same invoice that is submitted to the CO, Douglas H. Verseman at Douglas.H.Verseman@nga.mil and the technical POC, without alteration. (c) Upon receipt of the invoice, the technical POC will complete the receiving report and submit it to DoD/FPC via classified email to FMFOINSP@nga.ic.gov if available, or unclassified email to FMFOINSP@NGA.mil. A copy of the completed receiving report shall also be provided to the Contracting Officer shown on the face of this contract/order. (d) Contractors wishing to check the payment status of their vouchers may do so by calling FPC Vendor Support at 636-321-5251. In addition, questions may be directed to the Contracting Officer’s Representative (COR). In the absence of a COR, contact the Procurement Contracting Officer (PCO), whose name and contact information appears on the face page of this contract/order. 252.204-7000 DISCLOSURE OF INFORMATION (AUG 2013) (a) The Contractor shall not release to anyone outside the Contractor's organization any unclassified information, regardless of medium (e.g., film, tape, document), pertaining to any part of this contract or any program related to this contract, unless— (1) The Contracting Officer has given prior written approval; (2) The information is otherwise in the public domain before the date of release; or (3) The information results from or arises during the performance of a project that has been scoped and negotiated by the contracting activity with the contractor and research performer and determined in writing by the contracting officer to be fundamental research in accordance with National Security Decision Directive 189, National Policy on the Transfer of Scientific, Technical and Engineering Information, in effect on the date of contract award and the USD (AT&L) memoranda on Fundamental Research, dated May 24, 2010, and on Contracted Fundamental Research, dated June 26, 2008, (available at DFARS PGI 204.4) (b) Requests for approval under paragraph (a)(1) shall identify the specific information to be released, the medium to be used, and the purpose for the release. The Contractor shall submit its request to the Contracting Officer at least 10 business days before the proposed date for release. (c) The Contractor agrees to include a similar requirement, including this paragraph ( c) in each subcontract under this contract. Subcontractors shall submit requests for authorization to release through the prime contractor to the Contracting Officer. 252.204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting. As prescribed in 204.7304 (c), use the following clause: SAFEGUARDING COVERED DEFENSE INFORMATION AND CYBER INCIDENT REPORTING (AUG 2015) (a) Definitions. As used in this clause— “Adequate security” means protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to, or modification of information. “Compromise” means disclosure of information to unauthorized persons, or a violation of the security policy of a system, in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object, or the copying of information to unauthorized media may have occurred. “Contractor attributional/proprietary information” means information that identifies the contractor(s), whether directly or indirectly, by the grouping of information that can be traced back to the contractor(s) (e.g., program description, facility locations), personally identifiable information, as well as trade secrets, commercial or financial information, or other commercially sensitive information that is not customarily shared outside of the company. “Contractor information system” means an information system belonging to, or operated by or for, the Contractor. “Controlled technical information” means technical information with military or space application that is subject to controls on the access, use, reproduction, modification, performance, display, release, disclosure, or dissemination. Controlled technical information would meet the criteria, if disseminated, for distribution statements B through F using the criteria set forth in DoD Instruction 5230.24, Distribution Statements on Technical Documents. The term does not include information that is lawfully publicly available without restrictions. “Covered contractor information system” means an information system that is owned, or operated by or for, a contractor and that processes, stores, or transmits covered defense information. “Covered defense information” means unclassified information that— (i) Is— (A) Provided to the contractor by or on behalf of DoD in connection with the performance of the contract; or (B) Collected, developed, received, transmitted, used, or stored by or on behalf of the contractor in support of the performance of the contract; and (ii) Falls in any of the following categories: (A) Controlled technical information. (B) Critical information (operations security). Specific facts identified through the Operations Security process about friendly intentions, capabilities, and activities vitally needed by adversaries for them to plan and act effectively so as to guarantee failure or unacceptable consequences for friendly mission accomplishment (part of Operations Security process). (C) Export control. Unclassified information concerning certain items, commodities, technology, software, or other information whose export could reasonably be expected to adversely affect the United States national security and nonproliferation objectives. To include dual use items; items identified in export administration regulations, international traffic in arms regulations and munitions list; license applications; and sensitive nuclear technology information. (D) Any other information, marked or otherwise identified in the contract, that requires safeguarding or dissemination controls pursuant to and consistent with law, regulations, and Governmentwide policies (e.g., privacy, proprietary business information). “Cyber incident” means actions taken through the use of computer networks that result in an actual or potentially adverse effect on an information system and/or the information residing therein. “Forensic analysis” means the practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data. “Malicious software” means computer software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. This definition includes a virus, worm, Trojan horse, or other code-based entity that infects a host, as well as spyware and some forms of adware. “Media” means physical devices or writing surfaces including, but is not limited to, magnetic tapes, optical disks, magnetic disks, large-scale integration memory chips, and printouts onto which information is recorded, stored, or printed within an information system. ‘‘Operationally critical support’’ means supplies or services designated by the Government as critical for airlift, sealift, intermodal transportation services, or logistical support that is essential to the mobilization, deployment, or sustainment of the Armed Forces in a contingency operation. “Rapid(ly) report(ing)” means within 72 hours of discovery of any cyber incident. “Technical information” means technical data or computer software, as those terms are defined in the clause at DFARS 252.227-7013, Rights in Technical Data-Non Commercial Items, regardless of whether or not the clause is incorporated in this solicitation or contract. Examples of technical information include research and engineering data, engineering drawings, and associated lists, specifications, standards, process sheets, manuals, technical reports, technical orders, catalog-item identifications, data sets, studies and analyses and related information, and computer software executable code and source code. (b) Adequate security. The Contractor shall provide adequate security for all covered defense information on all covered contractor information systems that support the performance of work under this contract. To provide adequate security, the Contractor shall— (1) Implement information systems security protections on all covered contractor information systems including, at a minimum— (i) For covered contractor information systems that are part of an Information Technology (IT) service or system operated on behalf of the Government— (A) Cloud computing services shall be subject to the security requirements specified in the clause 252.239-7010, Cloud Computing Services, of this contract; and (B) Any other such IT service or system (i.e., other than cloud computing) shall be subject to the security requirements specified elsewhere in this contract; or (ii) For covered contractor information systems that are not part of an IT service of system operated on behalf of the Government and therefore are not subject to the security requirement specified at paragraph (b)(1)(i) of this clause— (A) The security requirements in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171, “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, http://dx.doi.org/10.6028/NIST.SP.800-171 that is in effect at the time the solicitation is issued or as authorized by the Contracting Officer; or (B) Alternative but equally effective security measures used to compensate for the inability to satisfy a particular requirement and achieve equivalent protection approved in writing by an authorized representative of the DoD CIO prior to contract award; and (2) Apply other information systems security measures when the Contractor reasonably determines that information systems security measures, in addition to those identified in paragraph (b)(1) of this clause, may be required to provide adequate security in a dynamic environment based on an assessed risk or vulnerability. (c) Cyber incident reporting requirement. (1) When the Contractor discovers a cyber incident that affects a covered contractor information system or the covered defense information residing therein, or that affects the contractor’s ability to perform the requirements of the contract that are designated as operationally critical support, the Contractor shall— (i) Conduct a review for evidence of compromise of covered defense information, including, but not limited to, identifying compromised computers, servers, specific data, and user accounts. This review shall also include analyzing covered contractor information system(s) that were part of the cyber incident, as well as other information systems on the Contractor’s network(s), that may have been accessed as a result of the incident in order to identify compromised covered defense information, or that affect the Contractor’s ability to provide operationally critical support; and (ii) Rapidly report cyber incidents to DoD at http://dibnet.dod.mil. (2) Cyber incident report. The cyber incident report shall be treated as information created by or for DoD and shall include, at a minimum, the required elements at http://dibnet.dod.mil. (3) Medium assurance certificate requirement. In order to report cyber incidents in accordance with this clause, the Contractor or subcontractor shall have or acquire a DoD-approved medium assurance certificate to report cyber incidents. For information on obtaining a DoD-approved medium assurance certificate, see http://iase.disa.mil/pki/eca/certificate.html. (d) Malicious software. The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer. (e) Media preservation and protection. When a Contractor discovers a cyber incident has occurred, the Contractor shall preserve and protect images of all known affected information systems identified in paragraph (c)(1)(i) of this clause and all relevant monitoring/packet capture data for at least 90 days from the submission of the cyber incident report to allow DoD to request the media or decline interest. (f) Access to additional information or equipment necessary for forensic analysis. Upon request by DoD, the Contractor shall provide DoD with access to additional information or equipment that is necessary to conduct a forensic analysis. (g) Cyber incident damage assessment activities. If DoD elects to conduct a damage assessment, the Contracting Officer will request that the Contractor provide all of the damage assessment information gathered in accordance with paragraph (e) of this clause. (h) DoD safeguarding and use of contractor attributional/proprietary information. The Government shall protect against the unauthorized use or release of information obtained from the contractor (or derived from information obtained from the contractor) under this clause that includes contractor attributional/proprietary information, including such information submitted in accordance with paragraph (c). To the maximum extent practicable, the Contractor shall identify and mark attributional/proprietary information. In making an authorized release of such information, the Government will implement appropriate procedures to minimize the contractor attributional/proprietary information that is included in such authorized release, seeking to include only that information that is necessary for the authorized purpose(s) for which the information is being released. (i) Use and release of contractor attributional/proprietary information not created by or for DoD. Information that is obtained from the contractor (or derived from information obtained from the contractor) under this clause that is not created by or for DoD is authorized to be released outside of DoD— (1) To entities with missions that may be affected by such information; (2) To entities that may be called upon to assist in the diagnosis, detection, or mitigation of cyber incidents; (3) To Government entities that conduct counterintelligence or law enforcement investigations; (4) For national security purposes, including cyber situational awareness and defense purposes (including with Defense Industrial Base (DIB) participants in the program at 32CFR 236); or (5) To a support services contractor (“recipient”) that is directly supporting Government activities under a contract that includes the clause at 252.204-7009, Limitations on the Use or Disclosure of Third-Party Contractor Reported Cyber Incident Information. (j) Use and release of contractor attributional/proprietary information created by or for DoD. Information that is obtained from the contractor (or derived from information obtained from the contractor) under this clause that is created by or for DoD (including the information submitted pursuant to paragraph (c) of this clause) is authorized to be used and released outside of DoD for purposes and activities authorized by paragraph (i) of this clause, and for any other lawful Government purpose or activity, subject to all applicable statutory, regulatory, and policy based restrictions on the Government’s use and release of such information. (k) The Contractor shall conduct activities under this clause in accordance with applicable laws and regulations on the interception, monitoring, access, use, and disclosure of electronic communications and data. (l) Other safeguarding or reporting requirements. The safeguarding and cyber incident reporting required by this clause in no way abrogates the Contractor’s responsibility for other safeguarding or cyber incident reporting pertaining to its unclassified information systems as required by other applicable clauses of this contract, or as a result of other applicable U.S. Government statutory or regulatory requirements. (m) Subcontracts. The Contractor shall— (1) Include the substance of this clause, including this paragraph (m), in all subcontracts, including subcontracts for commercial items; and (2) Require subcontractors to rapidly report cyber incidents directly to DoD at http://dibnet.dod.mil and the prime Contractor. This includes providing the incident report number, automatically assigned by DoD, to the prime Contractor (or next higher-tier subcontractor) as soon as practicable. (End of clause) 5X52.227-9000 UNAUTHORIZED USE OF NGA NAME, SEAL AND INITIALS (JUN 2006) (a) As provided in 10 U.S.C. Section 425, no person may, except with the written permission of the Director, National Geospatial-Intelligence Agency, knowingly use the words “National Geospatial-Intelligence Agency”, National Imagery and Mapping Agency” or “Defense Mapping Agency”, the initials “NGA”, “NIMA” or “DMA”, the seal of the National Geospatial-Intelligence Agency, National Imagery and Mapping Agency or the Defense Mapping Agency, or any colorable imitation of such words, initials, or seal in connection with any merchandise, retail product, impersonation, solicitation, or commercial activity in a manner reasonably calculated to convey the impression that such is approved, endorsed, or authorized by the Director, NGA. (b) Whenever it appears to the U.S. Attorney General that any person is engaged or about to engage in an act or practice which constitutes or will constitute conduct prohibited by paragraph (a), the Attorney General may initiate a civil proceeding in a district court of the United States to enjoin such act or practice. Such court shall proceed as soon as practicable to hearing and determination of such action and may, at any time before such final determination, enter such restraining orders or prohibition, or take such other action as is warranted, to prevent injury to the United States, or to any person or class of persons whose protection the action is brought. 252.204-7006 BILLING INSTRUCTIONS (OCT 2005) When submitting a request for payment, the Contractor shall: (a) Identify the contract line item(s) on the payment request that reasonably reflect contract work performance; and (b) Separately identify a payment amount for each contract line item included in the payment request. 5X52.227-9001 ACTIVITIES THAT AFFECT U.S. PERSONS (JUN 2006) This contract is sponsored by the National Geospatial-Intelligence Agency. All work and services to be performed hereunder shall be in strict compliance with procedures set forth in DoD 5240.1-R. 5X252.204-7000-90 PUBLIC RELEASE OF INFORMATION (MAY 2015) Information pertaining to this contract shall not be released to the public except as authorized by the Contracting Officer in accordance with DFARS 252.204-7000, Disclosure of Information. Requests for approval to release information pertaining to this contract shall be submitted to the Contracting Officer by means of NGA Form 5230-1, National Geospatial-Intelligence Agency Request for Clearance for Public Release. The following DFARS clauses are included: 252.203-7000, Requirements Relating to Compensation of Former DoD Officials 252.203-7002, Requirement to Inform Employees of Whistleblower Rights 252.204-7003, Control of Government Personnel Work Product 252.225-7001, Buy American and Balance of Payments Program 252.232-7003, Electronic Submission of Payment Requests and Receiving Reports 252.232-7010, Levies on Contract Payments 252.247-7023, Transportation of Supplies by Sea Vendors must be approved and registered in the System for Award Management (www.sam.gov) before award can be made. All offers are due to this agency no later than 09:00 a.m. Central Time, January 26, 2016. Send all offers/questions to Douglas H. Verseman via e-mail at Douglas.H.Verseman@nga.mil, no telephone responses will be accepted. Point of Contact: Douglas H. Verseman, Contracting Officer, 314-676-0195, or Fax 314-676-3010, Douglas.H.Verseman@nga.mil
- Web Link
-
FBO.gov Permalink
(https://www.fbo.gov/spg/ODA/NIMA/PCSL-13/320AS09/listing.html)
- Record
- SN03997193-W 20160123/160121234147-098e8671ce7ccfb023906115b353e020 (fbodaily.com)
- Source
-
FedBizOpps Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's FBO Daily Index Page |