Shelley Hall << Record >>

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Acquisition Planning and Adequate Market Research National Oceanic and Atmospheric Administration Acquisition and Grants Office Oversight and Compliance.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
CENTRAL CONTRACTOR REGISTRATION (CAGE CODES) DFARS Case 2003-D040 DFARS Parts 204, 212, 213 and 252 are amended to remove policy on Central Contractor.
Congress and Contractor Personal Conflicts of Interest May 21, 2008 Jon Etherton Etherton and Associates, Inc.
Unlawful Internet Gambling Enforcement Act Final Rule Joseph Baressi June 3, 2009.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Complying With The Federal Information Security Act (FISMA)
A SOUND INVESTMENT IN SUCCESSFUL VR OUTCOMES FINANCIAL MANAGEMENT FINANCIAL MANAGEMENT.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
CONTRACTUAL FLOW DOWN OF DPAS PRIORITY RATINGS
1 Building and Maintaining Information Systems. 2 Opening Case: Yahoo! Store Allows small businesses to create their own online store – No programming.
DFARS & What is Unclassified Controlled Technical Information (UCTI)?
FAR Part 2 Definitions of Words and Terms. FAR Scope of part (a)This part – (1) Defines words and terms that are frequently used in the FAR; (2)
Just In Time Training (JITT): How Not to Jump from the Frying Pan into the Fire.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
COMPETITION REQUIREMENTS
FAR Part 1 The Federal Acquisition Regulation System.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
SBIR Budgeting Leanne Robey Chief, Special Reviews Branch, NIH.
POLICY & OVERSIGHT DIVISION (POD) February 2014 MILESTONE ACQUISITION PLANS TRAINING 1.
FAR Part 10 Market Research. FAR Part 10 - Prescribes policies and procedures for conducting Market Research.
Implementing the Regulatory Flexibility Act. 2 Background The Regulatory Flexibility Act (5 U.S.C. 601–612) requires Federal agencies to— –Consider the.
Office of Management and Budget NDIA Program Management Systems Committee May 3, 2005 EVMS Compliance Requirements David Muzio.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Of XX Cybersecurity in Government Contracting David Z. Bodenheimer, Partner, Crowell & Moring LLP ©2015 PubKLearning. All rights reserved.1 The Federal.
Of XX Data Rights, Intellectual Property, Information Technology and Export Controls in Government Contracting Fernand Lavallee, Partner, Jones Day ©2015.
Privacy Act United States Army (Managerial Training)
Government Contract Law – Post Award Shraddha Upadhyaya Contract Law Division U.S. Department of Commerce Office of General Counsel GSA Training Conference.
OMB Circular A-122 and the Federal Cost Principles Copyright © Texas Education Agency
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
ROMANIA NATIONAL NATURAL GAS REGULATORY AUTHORITY Public Service Obligations in Romanian Gas Sector Ligia Medrea General Manager – Authorizing, Licensing,
DoD Preferred Contract Vehicle This quote is provided pursuant to the Blanket Purchase Agreement (BPA) awarded under the DoD ESI program. Under.
1 Consent to Subcontract Breakout Session # D12 Name: Rita Wells Daniel Johnson Anthony Simmons Date:July 12, 2011 Time:11:15 – 12:30.
Small Business and Subcontracting. Subcontracting for Small Business 6 steps to successful subcontracting 6. Report Contractor performance 1. Consider.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Nassau Association of School Technologists
Safeguarding CDI - compliance with DFARS
Acquisition Support New Horizons Consulting Services, LLC’s, premier business unit is an offering of a full range of services and support for acquisition.
Skyway Insight© Webinar
Administrivia Settings Controls Attendees Record
Safeguarding Covered Defense Information
Skyway Insight© Webinar
Consent to Subcontract
IUID and Government Furnished Property Basics
What is Contract Financing?
FAR Part 2 - Definitions of Words and Terms
Administrivia Settings Controls Attendees Record
Harpers Ferry Center Office of Acquisition Management August 2010
Administrivia Settings Controls Attendees Record
Administrivia Settings Controls Attendees Record
Obligations of Educational Agencies: Parents’ Bill of Rights
TechStambha PMP Certification Training
Introduction to the Federal Defense Acquisition Regulation
Safeguarding Covered Defense Information
Quality Management Systems – Requirements
2017 Health care Preparedness and Response Draft Capabilities
Cybersecurity ATD technical
Operationalizing Export Certification and Regionalization Programmes
Privacy Recommendation PAR Proposal
HIPAA Security Standards Final Rule
National Congress on Health Care Compliance
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Understanding The 2019 Changes To The SBIR & STTR Programs
Presentation transcript:

Shelley Hall << Record >> 32 years in Department of Defense (retired Nov 2015) USAF (AFMC and AFSPC) Held unlimited Contracting Officer’s warrant for 23 years Community Relations and Content Manager for Skyway Expertise in services and supplies, Federal Supply Schedules, pre-and post-award, simplified acquisition to large dollar technically complex source selections, Foreign Military Sales, and commercial and non- commercial << Record >>

Skyway Insight© Webinar Training From Contracting Officers Topic: Cyber Compliance Host: Shelley Hall May 11 2017

Agenda What Makes IT Different? FAR Requirements FAR Clause DFARS Requirement DFARS Clauses Final words

What Makes IT Different?

What Makes IT Different? It is constantly changing It cannot be controlled It is everywhere It is vulnerable It is crucial to the government

FAR Requirements

FAR 39 – Acquisition of Information Technology There are a LOT of things to consider: Security of resources, protection of privacy, national security and emergency preparedness, accommodations for individuals with disabilities, and energy efficiency; Electronic Product Environmental Assessment Tool (EPEAT®) standards; Policies to enable power management, double-sided printing, and other energy-efficient or environmentally preferable features on all agency electronic products; Best management practices for energy-efficient management of servers and Federal data centers.

FAR 39 – Acquisition of Information Technology (cont’d) There are a LOT of things to consider: When developing an acquisition strategy, COs should consider the rapidly changing nature of information technology through market research and the application of technology refreshment techniques. Must include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of Standards and Technology’s website at http://checklists.nist.gov. When acquiring information technology using Internet Protocol, agencies must include the appropriate Internet Protocol compliance requirements.

FAR Requirements - What about Risk? Agency must analyze risks, benefits, and costs. Reasonable risk taking is appropriate if risks are controlled and mitigated. Contracting and program office officials are jointly responsible for assessing, monitoring and controlling risk. Types of risk may include schedule risk, risk of technical obsolescence, cost risk, risk implicit in a particular contract type, technical feasibility, dependencies between a new project and other projects or systems, the number of simultaneous high risk projects to be monitored, funding availability, and program management risk. Appropriate techniques to manage and mitigate risk include: prudent project management; use of modular contracting; thorough acquisition planning tied to budget planning by the program, finance and contracting offices; continuous collection and evaluation of risk-based assessment data; prototyping prior to implementation; post implementation reviews to determine actual project cost, benefits and returns; and focusing on risks and returns using quantifiable measures.

What about IT Services? When acquiring information technology services, solicitations must not describe any minimum experience or educational requirement for proposed contractor personnel unless the CO determines that the needs of the agency— Cannot be met without that requirement; or Require the use of other than a performance-based acquisition.

FAR Clause

FAR Clause 52.239-1 -- Privacy or Security Safeguards. As prescribed in 39.106, insert a clause substantially the same as the following: Privacy or Security Safeguards (Aug. 1996) (a) The Contractor shall not publish or disclose in any manner, without the Contracting Officer’s written consent, the details of any safeguards either designed or developed by the Contractor under this contract or otherwise provided by the Government. (b) To the extent required to carry out a program of inspection to safeguard against threats and hazards to the security, integrity, and confidentiality of Government data, the Contractor shall afford the Government access to the Contractor’s facilities, installations, technical capabilities, operations, documentation, records, and databases. (c) If new or unanticipated threats or hazards are discovered by either the Government or the Contractor, or if existing safeguards have ceased to function, the discoverer shall immediately bring the situation to the attention of the other party.

DFARS Requirements

DFARS 239 (where it becomes more complicated) “Information assurance,” means measures that protect and defend information, that is entered, processed, transmitted, stored, retrieved, displayed, or destroyed, and information systems, by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing for the restoration of information systems by incorporating protection, detection, and reaction capabilities.

DFARS 239 (where it becomes more complicated) (cont’d) Agencies shall ensure that information assurance is provided for information technology in accordance with current policies, procedures, and statutes, to include— The National Security Act; The Clinger-Cohen Act; National Security Telecommunications & Information Systems Security Policy No. 11; Federal Information Processing Standards; DoD Directive 8500.1, Information Assurance; DoD Instruction 8500.2, Information Assurance Implementation; DoD Directive 8140.01, Cyberspace Workforce Management; and DoD Manual 8570.01-M, Information Assurance Workforce Improvement Program.

DFARS 239 (where it becomes more complicated) (cont’d) For all acquisitions, the requiring activity is responsible for providing to the contracting officer— Statements of work, specifications, or statements of objectives that meet information assurance requirements as specified in paragraph (a) of this subsection; Inspection and acceptance contract requirements; and A determination as to whether the information technology requires protection against compromising emanations.

DFARS 239 (where it becomes more complicated) (cont’d) For acquisitions requiring information assurance against compromising emanations, the requiring activity is responsible for providing to the contracting officer— The required protections, i.e., an established National TEMPEST standard (e.g., NACSEM 5100, NACSIM 5100A) or a standard used by other authority; The required identification markings to include markings for TEMPEST or other standard, certified equipment (especially if to be reused); Inspection and acceptance requirements addressing the validation of compliance with TEMPEST or other standards; and A date through which the accreditation is considered current for purposes of the proposed contract.

Information assurance contractor training and certification For acquisitions that include information assurance functional services for DoD information systems, or that require any appropriately cleared contractor personnel to access a DoD information system to perform contract duties, the requiring activity is responsible for providing to the contracting officer— A list of information assurance functional responsibilities for DoD information systems by category (e.g., technical or management) and level (e.g., computing environment, network environment, or enclave); and The information assurance training, certification, certification maintenance, and continuing education or sustainment training required for the information assurance functional responsibilities.

Information assurance contractor training and certification (cont’d) After contract award, the requiring activity is responsible for ensuring that the certifications and certification status of all contractor personnel performing information assurance functions as described in DoD 8570.01-M, Information Assurance Workforce Improvement Program, are in compliance with the manual and are identified, documented, and tracked. The responsibilities specified apply to all DoD information assurance duties supported by a contractor, whether performed full-time or part-time as additional or embedded duties, and when using a DoD contract, or a contract or agreement administered by another agency (e.g., under an interagency agreement). See PGI 239.7102-3 for guidance on documenting and tracking certification status of contractor personnel, and for additional information regarding the requirements of DoD 8570.01-M.

DFARS Clauses

DFARS Clauses 252.239-7000 Protection Against Compromising Emanations. 252.239-7001 Information Assurance Contractor Training and Certification. 252.239-7002 Access. 252.239-7003 Reserved. 252.239-7004 Orders for Facilities and Services. 252.239-7005 Rates, Charges, and Services. 252.239-7006 Tariff Information. 252.239-7007 Cancellation or Termination of Orders. 252.239-7008 Reuse Arrangements. 252.239-7009 Representation of Use of Cloud Computing.

DFARS Clauses (cont’d) 252.239-7010 Cloud Computing Services. 252.239-7011 Special Construction and Equipment Charges. 252.239-7012 Title to Telecommunication Facilities and Equipment. 252.239-7013 Obligation of the Government. 252.239-7014 Term of Agreement. 252.239-7015 Continuation of Communication Service Authorizations. 252.239-7016 Telecommunications Security Equipment, Devices, Techniques, and Services. 252.239-7017 Notice of Supply Chain Risk. 252.239-7018 Supply Chain Risk.

Cloud Computing “Cloud computing” means a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This includes other commercial terms, such as on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. It also includes commercial offerings for software-as-a-service, infrastructure-as-a-service, and platform-as-a- service.

Cloud Computing (cont’d) DoD shall acquire cloud computing services using commercial terms and conditions that are consistent with Federal law, and an agency’s needs. Some examples of commercial terms and conditions are license agreements, End User License Agreements (EULAs), Terms of Service (TOS), or other similar legal instruments or agreements. Contracting officers shall incorporate any applicable service provider terms and conditions into the contract by attachment or other appropriate mechanism. Contracting officers shall carefully review commercial terms and conditions and consult counsel to ensure these are consistent with Federal law, regulation, and the agency’s needs.

Cloud Computing (cont’d) Required storage of data within the United States or outlying areas. Cloud computing service providers are required to maintain within the 50 states, the District of Columbia, or outlying areas of the United States, all Government data that is not physically located on DoD premises, unless otherwise authorized by the authorizing official. The contracting officer shall provide written notification to the contractor when the contractor is permitted to maintain Government data at a location outside the 50 States, the District of Columbia, and outlying areas of the United States.

Recent Updates

Recent Updates Opportunities for Improving Acquisitions and Operations (GAO Report released April 17, 2017) Recommendation included: Strengthen the Federal Information Technology Acquisition Reform Act (FITARA) Improving CIO authorities Budget formulation Governance Workforce Operations Transition planning

Final Words

Final Words The Federal Government does not like things it can’t control – like IT Expect more and more emphasis on regulations that further restrict IT products and services IT products and services are NORMALLY purchased using mandatory source IDIQs, GWACs, MACs, GSA (is this the best way to purchase them?) Fight the good fight. If you are providing IT products or services, protest procurements that unfairly restrict true competition (you may not win, but your voice will be heard).

Skyway Acquisition Solutions, LLC        Shelley Hall Email: shelley.hall@skywayacquisition.com www.skywayacq.com