Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
SAMDAILY.US - ISSUE OF JUNE 28, 2023 SAM #7883
SOLICITATION NOTICE

66 -- Notice of Intent to Sole Source : Differentiation of Induced Pluripotent Stem Cells in Males with Sex Chromosome Aneuploidy NGN2 Neurons

Notice Date
6/26/2023 12:44:43 PM
 
Notice Type
Presolicitation
 
NAICS
541990 — All Other Professional, Scientific, and Technical Services
 
Contracting Office
NATIONAL INSTITUTES OF HEALTH NIDA Bethesda MD 20892 USA
 
ZIP Code
20892
 
Solicitation Number
75N95023Q00389
 
Response Due
7/11/2023 2:00:00 PM
 
Archive Date
07/12/2023
 
Point of Contact
Diedra Prophet, Christine Frate, Phone: 3014433846
 
E-Mail Address
diedra.prophet@nih.gov, christine.frate@nih.gov
(diedra.prophet@nih.gov, christine.frate@nih.gov)
 
Description
DESCRIPTION INTRODUCTION THIS IS A PRE-SOLICITATION NON-COMPETITIVE (NOTICE OF INTENT)SYNOPSIS TO AWARD A CONTRACT WITHOUT PROVIDING FOR FULL OROPEN COMPETITION (INCLUDING BRAND-NAME). The National Institute of Mental Health (NIMH) intends to negotiate on a sole source basis with New York Stem Cell Foundation (NYSCF) for IPSC lines to understand the impact of SCA on human brain cells. NORTH AMERICAN INDUSTRY CLASSIFICATION SYSTEM (NAICS) CODE and SET ASIDE STATUS The intended procurement is classified under NAICS code 541990 � All Other Professional, Scientific, and Technical Services with a Size Standard of $19.5million. REGULATORY AUTHORITY This acquisition is conducted under the authority of the Federal Acquisition Regulation (FAR) Part 13�Simplified Acquisition Procedures. Contracts awarded using FAR Part 13�Simplified Acquisition Procedures are exempt from the requirements of FAR Part 6�Competition Requirements. FAR Subpart13.106-1 (b) Soliciting from a single source provides that: For purchases not exceeding the simplified acquisition threshold, Contracting officers may solicit from one source IF the contracting officer determines that the circumstances of the contract action deem only one source reasonably available (e.g., urgency, exclusive licensing agreements, brand-name OR industrial mobilization). The resultant contract will include all applicable provisions and clauses in effect through the Federal Acquisition Circular (FAC) Number 2023-02, dated February14, 2023. STATUTORY AUTHORITY This acquisition is conducted under the authority of the Federal Acquisition Regulation (FAR) SubPart 13.5-Simplified Procedures for Certain Commercial Products and Commercial Services. Contracts awarded using FAR Part 13-Simplified Acquisition Procedures are exempt from the requirements of FAR Part 6-Competition Requirements. FAR Subpart 13.106-1 (b) Soliciting from a single Source provides that: For purchases not exceeding the simplified acquisition threshold, Contracting officers may solicit from one source IF the contracting officer determines that the circumstances of the contract action deem only one source reasonably available (e.g., urgency, exclusive licensing agreements, brand name OR industrial mobilization). DESCRIPTION OF REQUIREMENT BACKGROUND INFORMATION: The NIMH Section on Developmental Neurogenomics has invested significant Division of Intramural Research Programs� resources in recruitment and characterization of rare patient groups with varying sex chromosome count (along with matched controls). NIMH are studying how sex chromosome aneuploidy (SCA) impacts brain structure and function at multiple scales � from behavior to brain imaging to cellular features. To understand the impact of SCA on human brain cells, NIMH will need to rely on new and specialized techniques for differentiation of neural cells from human induced pluripotent stem cells (iPSCs). NIMH has iPSCs generated from humans with diverse SCA karyotypes (XO, XX, XXX, XXXX, XY, XXY, XYY, XXYY, XXXXY) from prior contracts. The prior contracts have differentiated the female subset of these lines (�X-series�: X, XX, XXX, XXXX) into NGN2 neurons. Properly understanding the effects of SCA in NGN2 neurons requires comparing this X-series with NGN2 lines from the remaining- �Y-series� male SCA karyotypes (XY, XXY, XYY, XXYY, XXXXY). PURPOSE AND OBJECTIVES: Independently and not as an agent of the Government, the Contractor shall furnish all the necessary services, qualified personnel, material, equipment, and facilities, not otherwise provided by the Government as needed to perform the Statement of Work below: The purpose of this requirement is to complete a full series of SCA NGN2 neuronal lines by converting existing iPSCs lines from the Y-series into NGN2 neurons. The contract would generate NGN2 lines for 15 individuals representing three individuals from each of the five Y-series SCA karyotypes: XY, XXY, XYY, XXYY, XXXXY. The invaluable tissues generated by this contract will enable us to measure � for the first time � how a wide range of sex chromosome dosage variation shapes cellular functioning in NGN2 neurons. These insights in turn will bring us closer to identifying molecular pathways that underpin medical disorders like sex chromosome aneuploidies, as well as sex-chromosome based differences between males and females in the general population. Salient characteristics include: 1. Creation of 15 iPSC lines inducible towards NGN2 neurons (carrying the NGN2 transgene) from existing iPSC lines. a. Two clones from each of fifteen (15) existing iPSC lines will be genetically engineered to express the ASCL1 and DLX2 transcription factors when induced in vitro. b. We require one to two million cells per clone. c. Clones will be shipped to the Principal Investigator at NIMH in Bethesda under conditions that preserve cell viability. GOVERNMENT RESPONSIBILITIES: Required iPSC clones have already been generated from material provided by previous contractors. No personally identifiable information (PII) will be available to the contractor. All work will be performed at the contractor�s facility. Reviewing and approving quality control and characterization reports as well as the final products (inducible iPSC lines) generated under the contract. DELIVERY OR DELIVERABLES: 1. The contractor shall deliver within thirty (60) days after receipt of the order (ARO). Sequence data for each provided sample will be given to the investigators via delivery method Globus for further analysis. 2. Contractor will ship labeled vials of each iPSCs. Clones will be frozen, packed on dry ice, and delivered safely to the Principal Investigator. 3. Contractor will retain detailed records of all work for a period not less than 2 years after completion of the project and provide these reports to Principal Investigator upon request. 4. The data and deliverables may be staggered in time as contractor completes various stages of the project. REPORTING REQUIREMENTS The contractor is required to provide, minimally, monthly written progress reports. The reports will cover accomplishments, any problems encountered and/or resolved. The progress reports should be emailed to the Principal Investigator or designee. Anticipated Period of Performance Start Date: 60 Days (ARO) GOVERNMENT RESPONSIBILITIES Animal testing was carried out in the laboratory of Dr. Alvarez and tissue samples from the brain were extracted. mRNA extraction of the tissue samples was performed in collaboration with Dr. Myriam Heiman�s laboratory at MIT, Boston. Samples will be shipped to the COR for sequencing. TRAVEL Not Applicable KEY PERSONNEL Several experienced biological laboratory technicians as well as one or more senior scientific researchers will be essential to successful performance by the contractor DATA RIGHTS Quality control and characterization data and results are required from the contractor in meeting the requirements of the SOW. The government has unlimited rights regarding use, production, and disclosure of all data generated by the contractor under the scope of this SOW. INFORMATION SECURITY PLAN Schedule of Deliverables Deliverable:�Contractor Employee Non- Disclosure Agreement (NDA), Description: Contractor Employee Non- Disclosure Agreement (NDA), Due Date:�Prior to performing any work on behalf of NIH/NIMH Deliverable:�Incident Response Plan,�Description:�Incident and Breach Response,�Due Date:�Upon request from government Deliverable:�Incident Response,�Description:�Incident Report (as incidents or breaches occur),�Due Date:�NIH/NIMH policy states as soon as possible or no later than 1 hour of discovery Deliverable:�Certification of Sanitization of Government and Government Activity- Related Files, Information, and Devices,�Description:�Form or deliverables required by NIH,�Due Date:�NIH/NIMH requires NIH Form NH270 Certification: Removal of Data and Software Deliverable:�Standard for Encryption,�Description:�Include the Standard for Encryption,�Due Date:�NIH/NIMH requires this prior to publishing HHS SECURITY AND PRIVACY LANGUAGE FOR INFORMATION AND IT PROCUREMENTS ARTICLE H.51.1. INFORMATION SECURITY AND/OR PHYSICAL ACCESS SECURITY Baseline Security Requirements Applicability- � The requirements herein apply whether the entire contract or order (hereafter ""contract""), or portion thereof, includes either or both of the following: Access (Physical or Logical) to Government Information: A Contractor (and/or any subcontractor) employee will have or will be given the ability to have, routine physical (entry) or logical (electronic) access to government information. Operate a Federal System Containing Information: A Contractor (and/or any subcontractor) will operate a federal system and information technology containing data that supports the HHS mission. In addition to the Federal Acquisition Regulation (FAR) Subpart 2.1 definition of ""information technology"" (IT), the term as used in this section includes computers, ancillary equipment (including imaging peripherals, input, output, and storage devices necessary for security and surveillance), peripheral equipment designed to be controlled by the central processing unit of a computer, software, firmware and similar procedures, services (including support services), and related resources. Safeguarding Information and Information Systems- In accordance with the Federal Information Processing Standards Publication (FIPS)199, Standards for Security Categorization of Federal Information and Information Systems, the Contractor (and/or any subcontractor) shall: Protect government information and information systems in order to ensure: �Confidentiality, which means preserving authorized restrictions on access and disclosure, based on the security terms found in this contract, including means for protecting personal privacy and proprietary information; �Integrity, which means guarding against improper information modification or destruction, and ensuring information non-repudiation and authenticity; and �Availability, which means ensuring timely and reliable access to and use of information Provide security for any Contractor systems, and information contained therein, connected to an HHS network or operated by the Contractor on behalf of HHS regardless of location. In addition, if new or unanticipated threats or hazards are discovered by either the agency or contractor, or if existing safeguards have ceased to function, the discoverer shall immediately, within one (1) hour or less, bring the situation to the attention of the other party. Adopt and implement the policies, procedures, controls, and standards required by the HHS Information Security Program to ensure the confidentiality, integrity, and availability of government information and government information systems for which the Contractor is responsible under this contract or to which the Contractor may otherwise have access under this contract. Obtain the HHS Information Security Program security requirements, outlined in the HHS Information Security and Privacy Policy (IS2P), by contacting the CO/COR or emailing fisma@hhs.gov . Comply with the Privacy Act requirements. Information Security Categorization- In accordance with FIPS 199 and National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60, Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories,�Contractor Non-Disclosure Agreement�and based on information provided by the ISSO, CISO, or other security representative, the risk level for each Security Objective and the Overall Risk Level, which is the highest watermark of the three factors (Confidentiality, Integrity, and Availability) of the information or information system are the following: �����������Confidentiality:�� �������� [� ]� Low� � [�x�]�Moderate� �[��]�High� ���������� Integrity:��������������������� [� ]��Low� � [ x�]�Moderate�� [��]��High� �����������Availability:����������������� [ �]��Low��� [ x�]�Moderate� �[��]�High� �����������Overall Risk Level:������[ �]��Low��� [�x�]�Moderate� �[��]��High Based on information provided by the ISSO, Privacy Office, system/data owner, or other security or privacy representative, it has been determined that this solicitation/contract involves: ������������������������� []��No PII� [X ]�Yes PII����������� Controlled Unclassified Information (CUI)- CUI is defined as ""information that laws, regulations, or Government-wide policies require to have safeguarding or dissemination controls, excluding classified information."" The Contractor (and/or any subcontractor) must comply with Executive Order 13556, Controlled Unclassified Information, (implemented at 3 CFR, part 2002) when handling CUI. 32 C.F.R. 2002.4(aa) As implemented the term ""handling"" refers to ""�any use of CUI, including but not limited to marking, safeguarding, transporting, disseminating, re-using, and disposing of the information."" 81 Fed. Reg. 63323. All sensitive information that has been identified as CUI by a regulation or statute, handled by this solicitation/contract, shall be: Marked appropriately; Disclosed to authorized personnel on a Need-To-Know basis; Protected in accordance with NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations applicable baseline if handled by a Contractor system operated on behalf of the agency, or NIST SP 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations if handled by internal Contractor system; and Returned to HHS control, destroyed when no longer needed, or held until otherwise directed. Destruction of information and/or data shall be accomplished in accordance with NIST SP 800-88, Guidelines for Media Sanitization. �Protection of Sensitive Information- For security purposes, information is or may be sensitive because it requires security to protect its confidentiality, integrity, and/or availability. The Contractor (and/or any subcontractor) shall protect all government information that is or may be sensitive in accordance with OMB Memorandum M-06-16, Protection of Sensitive Agency Information by securing it with a FIPS 140-2 validated solution. �Confidentiality and Nondisclosure of Information- Any information provided to the contractor (and/or any subcontractor) by HHS or collected by the contractor on behalf of HHS shall be used only for the purpose of carrying out the provisions of this contract and shall not be disclosed or made known in any manner to any persons except as may be necessary in the performance of the contract. The Contractor assumes responsibility for protection of the confidentiality of Government records and shall ensure that all work performed by its employees and subcontractors shall be under the supervision of the Contractor. Each Contractor employee or any of its subcontractors to whom any HHS records may be made available or disclosed shall be notified in writing by the Contractor that information disclosed to such employee or subcontractor can be used only for that purpose and to the extent authorized herein. The confidentiality, integrity, and availability of such information shall be protected in accordance with HHS and NIH policies. Unauthorized disclosure of information will be subject to the HHS/NIH sanction policies and/or governed by the following laws and regulations: 18 U.S.C. 641 (Criminal Code: Public Money, Property or Records); 18 U.S.C. 1905 (Criminal Code: Disclosure of Confidential Information); and 44 U.S.C. Chapter 35, Subchapter I (Paperwork Reduction Act). Each employee, including subcontractors, having access to non-public Department information under this acquisition shall complete the ""Commitment to Protect Non-Public Information - Contractor Employee Agreement"" located at: https://ocio.nih.gov/aboutus/publicinfosecurity/acquisition/Documents/Nondisclosure.pdf A copy of each signed and witnessed Non-Disclosure agreement shall be submitted to the Project Officer/COR prior to performing any work under this acquisition. Internet Protocol Version 6 (IPv6)- All procurements using Internet Protocol shall comply with OMB Memorandum M-05-22, Transition Planning for Internet Protocol Version 6 (IPv6). Government Websites- All new and existing public-facing government websites must be securely configured with Hypertext Transfer Protocol Secure (HTTPS) using the most recent version of Transport Layer Security (TLS). In addition, HTTPS shall enable HTTP Strict Transport Security (HSTS) to instruct compliant browsers to assume HTTPS at all times to reduce the number of insecure redirects and protect against attacks that attempt to downgrade connections to plain HTTP. For internal-facing websites, the HTTPS is not required, but it is highly recommended. Contract Documentation- The Contractor shall use provided templates, policies, forms, and other agency documents provided by� the Contracting Officer and�the�Contracting Officer's Representative�to comply with contract deliverables as appropriate. Standard for Encryption- The Contractor (and/or any subcontractor) shall: Comply with the HHS Standard for Encryption of Computing Devices and Information to prevent unauthorized access to government information. Encrypt all sensitive federal data and information (i.e., PII, protected health information [PHI], proprietary information, etc.) in transit (i.e., email, network connections, etc.) and at rest (i.e., servers, storage devices, mobile devices, backup media, etc.) with FIPS 140-2 validated encryption solution. Secure all devices (i.e.: desktops, laptops, mobile devices, etc.) that store and process government information and ensure devices meet HHS and NIH-specific encryption standard requirements. Maintain a complete and current inventory of all laptop computers, desktop computers, and other mobile devices and portable media that store or process sensitive government information (including PII). Verify that the encryption solutions in use have been validated under the Cryptographic Module Validation Program to confirm compliance with FIPS 140-2. The Contractor shall provide a written copy of the validation documentation to the Contracting Officer and the Contracting Officer's Technical�Representative within�� 15 days�� of the�validation. Use the Key Management system on the HHS personal identification verification (PIV) card or establish and use a key recovery mechanism to ensure the ability for authorized personnel to encrypt/decrypt information and recover encryption keys. Encryption keys shall be provided to the COR upon request and at the conclusion of the contract. Contractor Non-Disclosure Agreement (NDA)- Each Contractor (and/or any subcontractor) employee having access to non-public government information under this contract shall complete the�NIH non-disclosure agreement , as applicable. https://ocio.nih.gov/aboutus/publicinfosecurity/acquisition/Documents/Nondisclosure.pdf A copy of each signed and witnessed NDA shall be submitted to the Contracting Officer (CO) and/or CO Representative (COR) prior to performing any work under this acquisition. Privacy Threshold Analysis (PTA)/Privacy Impact Assessment (PIA)- The Contractor shall assist the NIH Office of the Senior Official for Privacy (SOP) or designee with conducting a PTA for the information system and/or information handled under this contract to determine whether or not a full PIA needs to be completed. The NIH PIA guide is located at https://oma.od.nih.gov/forms/Privacy%20Documents/Documents/NIH%20PIA%20Guide.pdf � If the results of the PTA show that a full PIA is needed, the Contractor shall assist the OpDiv SOP or designee with completing a PIA for the system or information within��� 60 days���� after completion of the PTA and in accordance with HHS policy and OMB M-03-22, Guidance for Implementing the Privacy Provisions of the E-Government Act of 2002. The Contractor shall assist the NIH Office of the SOP or designee in reviewing the PIA at least every three years throughout the system development lifecycle (SDLC)/information lifecycle, or when determined by the agency that a review is required based on a major change to the system, or when new types of PII are collected that introduces new or increased privacy risks, whichever comes first. TRAINING Mandatory Training for All Contractor Staff- All Contractor (and/or any subcontractor) employees assigned to work on this contract shall complete the applicable HHS/NIH Contractor Information Security Awareness, Privacy, and Records Management training course at http://irtsectraining.nih.gov/ before performing any work under this contract. Thereafter, the employees shall complete�NIH Information Security Awareness, Privacy, and Records Management training at least annually, during the life of this contract. All provided training shall be compliant with HHS training policies. Role-based Training- All Contractor (and/or any subcontractor) employees with significant security responsibilities (as determined by the program manager) must complete role-based training annually commensurate with their role and responsibilities in accordance with HHS policy and the HHS Role-Based Training (RBT) of Personnel with Significant Security Responsibilities Memorandum. Read further guidance about the NIH Role-based Training https://ocio.nih.gov/aboutus/publicinfosecurity/securitytraining/Pages/rolebasedtraining.aspx Training Records- The Contractor (and/or any subcontractor) shall maintain training records for all its employees working under this contract in accordance with HHS policy. A copy of the training records shall be provided to the CO and/or COR within 30 days after contract award and annually thereafter or upon request. RULES OF BEHAVIOR The Contractor (and/or any subcontractor) shall ensure that all employees performing on the contract comply with the HHS Information Technology General Rules of Behavior, and�comply with the NIH Information Technology General Rules of Behavior https://ocio.nih.gov/InfoSecurity/training/Pages/nihitrob.aspx , which are contained in the NIH Information Security Awareness Training Course http://irtsectraining.nih.gov All Contractor employees performing on the contract must read and adhere to the Rules of Behavior before accessing Department data or other information, systems, and/or networks that store/process government information, initially at the beginning of the contract and at least annually thereafter, which may be done as part of annual�NIH Information Security Awareness Training. If the training is provided by the contractor, the signed Rules of Behavior�must be provided as a separate deliverable to the CO and/or COR per defined timelines above. INCIDENT RESPONSE� The Contractor (and/or any subcontractor) shall respond to all alerts/Indicators of Compromise (IOCs) provided by HHS Computer Security Incident Response Center (CSIRC)/NIH IRT teams within 24 hours, whether the response is positive or negative. FISMA defines an incident as ""an occurrence that (1) actually or imminently jeopardizes, without lawful authority, the integrity, confidentiality, or availability of information or an information system; or (2) constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies. The HHS Policy for IT Security and Privacy Incident Reporting and Response further defines incidents as events involving cyber security and privacy threats, such as viruses, malicious user activity, loss of, unauthorized disclosure or destruction of data, and so on. A privacy breach is a type of incident and is defined by Federal Information Security Modernization Act (FISMA) as the loss of control, compromise, unauthorized disclosure, unauthorized acquisition, or any similar occurrence where (1) a person other than an authorized user accesses or potentially accesses personally identifiable information or (2) an authorized user accesses or potentially accesses personally identifiable information for an other than authorized purpose. The HHS Policy for IT Security and Privacy Incident Reporting and Response further defines a breach as ""a suspected or confirmed incident involving PII�. In the event of a suspected or confirmed incident or breach, the Contractor (and/or any subcontractor) shall: Protect all sensitive information, including any PII created, stored, or transmitted in the performance of this contract so as to avoid a secondary sensitive information incident with FIPS 140-2 validated encryption. NOT notify affected individuals unless so instructed by the Contracting Officer or designated representative. If so instructed by the Contracting Officer or representative, the Contractor shall send NIH approved notifications to affected individuals�in accordance with https://ocio.nih.gov/InfoSecurity/IncidentResponse/Pages/ir_guidelines.aspx Report all suspected and confirmed information security and privacy incidents and breaches to the�NIH Incident Response Team (IRT)�via email at IRT@mail.nih.gov , COR, CO, the NIH Office of the SOP (or his or her designee), and other stakeholders, including incidents involving PII, in any medium or form, including paper, oral, or electronic, as soon as possible and without unreasonable delay, no later than one (1) hour, and consistent with the applicable�NIH and HHS policy and procedures, NIST standards and guidelines, as well as US-CERT notification guidelines. The types of information required in an incident report must include at a minimum: company and point of contact information, contact information, impact classifications/threat vector, and the type of information compromised. In addition, the Contractor shall:� Cooperate and exchange any information, as determined by the Agency, necessary to effectively manage or mitigate a suspected or confirmed breach; Do not include any sensitive information in the subject or body of any reporting e-mail; and Encrypt sensitive information in attachments to email, media, etc. Comply with OMB M-17-12, Preparing for and Responding to a Breach of Personally Identifiable Information HHS and�NIH�incident response policies when handling PII breaches. Provide full access and cooperate on all activities as determined by the Government to ensure an effective incident response, including providing all requested images, log files, and event information to facilitate rapid resolution of sensitive information incidents. This may involve disconnecting the system processing, storing, or transmitting the sensitive information from the Internet or other networks or applying additional security controls. This may also involve physical access to contractor facilities during a breach/incident investigation within an hour of discovery. CONTRACT INITIATION AND EXPIRATION� General Security Requirements- The Contractor (and/or any subcontractor) shall comply with information security and privacy requirements, Enterprise Performance Life Cycle (EPLC) processes, HHS Enterprise Architecture requirements to ensure information is appropriately protected from initiation to expiration of the contract. All information systems development or enhancement tasks supported by the contractor shall follow the HHS EPLC framework and methodology or�and in accordance with the HHS Contract Closeout Guide (2012). HHS EA requirements may be located here: https://www.hhs.gov/ocio/ea/documents/proplans.html System Documentation- Contractors (and/or any subcontractors) must follow and adhere to NIST SP 800-64, Security Considerations in the System Development Life Cycle, at a minimum, for system development and provide system documentation at designated intervals (specifically, at the expiration of the contract) within the EPLC that require artifact review and approval. Sanitization of Government Files and Information- As part of contract closeout and at expiration of the contract, the Contractor (and/or any subcontractor) shall provide all required documentation�in accordance with the NIH Media�Sanitization and Disposal Policy�to the CO and/or COR to certify that, at the government's direction, all electronic and paper records are appropriately disposed of and all devices and media are sanitized in accordance with NIST SP 800-88, Guidelines for Media Sanitization. Notification- The Contractor (and/or any subcontractor) shall notify the CO and/or COR and system ISSO within�fifteen days�before an employee stops working under this contract. Contractor Responsibilities Upon Physical Completion of the Contract- The contractor (and/or any subcontractors) shall return all government information and IT resources (i.e., government information in non-government-owned systems, media, and backup systems) acquired during the term of this contract to the CO and/or COR. Additionally, the Contractor shall provide a certification that all government information has been properly sanitized and purged from Contractor-owned systems, including backup systems and media used during contract performance, in accordance with HHS and/or NIH policies. The Contractor (and/or any subcontractor) shall perform and document the actions identified in the NIH�Contractor Employee Separation Checklist� https://ocio.nih.gov/aboutus/publicinfosecurity/acquisition/Documents/Emp-sep-checklist.pdf � �when an employee terminates work under this contract within�2 days of the employee's exit from the contract. All documentation shall be made available to the CO and/or COR upon request. RECORDS MANAGEMENT AND RETENTION The Contractor (and/or any subcontractor) shall maintain all information in accordance�with Executive Order 13556 -- Controlled Unclassified Information, National Archives and Records Administration (NARA) records retention policies and schedules and HHS/NIH policies and shall not dispose of any records unless authorized byHHS/NIH. In the event that a contractor (and/or any subcontractor) accidentally disposes of or destroys a record without proper authorization, it shall be documented and reported as an incident in accordance with HHS/NIH policies. Data Rights: Quality control and characterization data and results are required from the contractor in meeting the requirements of the SOW.� The government has unlimited rights regarding use, production, and disclosure of all data generated by the contractor under the scope of this SOW. Section 508�Electronic and Information Technology Standards: The contractor will use EIT in the performance of the SOW.� The public will not have access to the EIT. Publications and Publicity: The contractor will not write or publish articles of data produced as a result of the requirements of the SOW. Confidentiality of Information: The government will not provide to the contractor any information or data of a personal nature about individual(s) or proprietary information or data pertaining to an institution or organization which is confidential.� The contract is not expected to generate information or data which is confidential.
 
Web Link
SAM.gov Permalink
(https://sam.gov/opp/b51fc2b19425476195ca5c584eae8910/view)
 
Place of Performance
Address: Bethesda, MD 20892, USA
Zip Code: 20892
Country: USA
 
Record
SN06728260-F 20230628/230626230109 (samdaily.us)
 
Source
SAM.gov Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's SAM Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.