SPECIAL NOTICE
D -- Censis Technologies, Inc.’s CensiTrac®, GovCloud™, Service® ScopeTrac™ Advanced, and LoanerLink® Licenses & Software Support
- Notice Date
- 8/20/2025 10:07:36 AM
- Notice Type
- Special Notice
- NAICS
- 518210
— Data Processing, Hosting, and Related Services
- Contracting Office
- 249-NETWORK CONTRACT OFFICE 9 (36C249) MURFREESBORO TN 37129 USA
- ZIP Code
- 37129
- Solicitation Number
- 36C24926Q0004
- Response Due
- 8/27/2025 10:00:00 AM
- Archive Date
- 09/11/2025
- Point of Contact
- John E. McDaniel, Contract Specialist, Phone: 615-225-6788
- E-Mail Address
-
John.McDaniel1@va.gov
(John.McDaniel1@va.gov)
- Awardee
- null
- Description
- Statement of Work (SOW) Censis Technologies, Inc. s CensiTrac®, GovCloud , Service+®, ScopeTrac Advanced, and LoanerLink® Licenses & Software Support Page 2 of 3 The Department of Veterans Affairs, VISN 9 MidSouth Healthcare Network intends to award, on a sole-source basis, a fixed price purchase order to Censis Technologies, Inc., 4031 Aspen Grove Drive, Suite 350, Franklin, TN, 37067 in accordance with FAR 6.302-1. As part of this effort, the Contractor shall conduct requisite site assessments, mark and commission instruments, perform quality assurance testing, perform data validation, and load data standard-compliant data into the new system for all facilities within VISN 9. The Contract is to be effective for a full year, beginning from the date of obligation, with four additional option years to continue the service. (Please see draft performance work statement contained herein for a complete description of required services.) This notice of intent is not a request for competitive proposals. No solicitation document is available, and telephone requests will not be accepted. However, any responsible source who believes it is capable of meeting the requirement may submit a capability statement which shall be considered by the agency, only if received by the closing date and time of this notice. A determination not to compete with the proposed requirement based upon the responses to this notice is solely within the discretion of the government. Responses to this notice are due by Monday, August 27, 2025, at 12:00 PM CST by email to John.McDaniel1@va.gov. GENERAL INFORMATION Purpose: This requirement is for the procurement of system licensing and support which enables Veterans Integrated Service Networks (VISN) 9 Sterile Processing Departments to maximize the use of the CensiTrac® Surgical Instrument Tracking system to include the Censis Technologies, Inc. s CensiTrac® Surgical Instrument Tracking system, InstrumenTrac, ScopeTrac Advanced, LoanerLink®, GovCloud Server, and Service+® Subscriptions. Scope of Work: The Contractor shall provide all resources necessary to accomplish the deliverables described in this (SOW, except as may otherwise be specified. Background: This solution is intended to help VISN 9 Sterile Processing Departments maximize the use of the Censis Technologies CensiTrac® Instrument Tracking System, which is currently deployed at all VISN 9 Medical Centers. The software licenses being sought in this acquisition will provide access to additional CensiTrac® Software Modules to include the Censis Technologies, Inc. s CensiTrac® Surgical Instrument Tracking System, InstrumenTrac, ScopeTrac Advanced, LoanerLink®, GovCloud Server, and Service+® Subscriptions. Performance Period: The contract period consists of a base period of performance that shall be twelve (12) months from 10/01/2025 through 09/30/2026. Delivery of software and associated licenses should be completed within ninety (90) days from the date of the award. Any required installation of software modules should be completed within 180 days of the award. Configuration of software and license activation should be completed within 180 days of the award. All associated services shall be delivered within twelve (12) months of the award. Type of Contract: Firm-Fixed-Price. Place of Performance: The Contractor will be expected to utilize a combination of remote and on-site support to satisfy the requirements outlined in this SOW. On-site support or delivery of physical deliverables will be provided at the following VISN 9 Medical Centers located at the following addresses: Facility (Medical Center)� Address� Veteran Affairs (VA) Lexington Health Care, Troy Bowling Campus 1101 Veterans Drive, Lexington, KY 40502 Robley Rex VA Medical Center� (VAMC) 800 Zorn Avenue, Louisville, KY 40206 James H. Quillen VAMC Corner of Lamont Street and Veterans Way, Mountain Home, TN 37604 Lt. Col. Luke Weathers, Jr. VAMC 116 N Pauline St, Memphis, TN 38105 VA TN Valley Health Care, Nashville VAMC 1310 24th Avenue South, Nashville, TN 37212 VA TN Valley Health Care, Alvin C. York VAMC 3400 Lebanon Pike, Murfreesboro, TN 37129 Hours of Operation: Warehouse deliveries are accepted between 9am and 2:30pm local time, Monday through Friday, excluding holidays. Hospital hours of operation are between 8am and 4:30pm local time, Monday through Friday, excluding holidays. Facility (Medical Center)� Time Zone Lexington Health Care, Troy Bowling Campus Eastern Time Zone (ET) Robley Rex VAMC Eastern Time Zone (ET) James H. Quillen VAMC Eastern Time Zone (ET) Lt. Col. Luke Weathers, Jr. VAMC Central Time Zone (CT) VA TN Valley Health Care, Nashville VAMC Central Time Zone (CT) VA TN Valley Health Care, Alvin C. York VAMC Central Time Zone (CT) Federal Holidays: New Year s Day January 1st Martin Luther King s Birthday 3rd Monday in January President s Day 3rd Monday in February Memorial Day Last Monday in May Juneteenth June 19th Independence Day July 4th Labor Day 1st Monday in September Columbus Day 2nd Monday in October Veteran s Day November 11th Thanksgiving Day Last Thursday in November Christmas Day December 25th *And any other day that may be designated as a federal holiday by Executive Order of the President of the United States GENERAL REQUIREMENTS The Contractor shall provide software subscription and licensing support for the Censis CensiTrac® InstrumenTrac software module. The Contractor shall be responsible for licenses, technical and phone support for the CensiTrac® SPS Instrumentation System. The Contractor shall facilitate the operation of the hardware and software in conjunction with all associated functions, upgrades, and components. The Contractor shall continue to support and facilitate the operation of the software and its components after all upgrades to include new versions. The Contractor shall provide support service for any disruption of functionality with the CensiTrac® System. The Contractor shall assist with troubleshooting and taking corrective actions to return CensiTrac® to its normal operation. The Contractor shall provide the subscription service for GovCloud support and maintenance to host the Censis System. Additionally, the Contractor shall provide any associated software licenses. The Contractor shall maintain remote access capabilities to the CensiTrac® Software and Servers to diagnose and resolve issues while abiding by VA information security and privacy guidelines. The Contractor shall provide technical support 24 hours a day, seven (7) days a week via phone support. The Contractor shall provide a utilization assessment comprised of a comprehensive annual review of each site s CensiTrac® data along with each site s department processes, to provide a methodical examination of each system. This service will include a comprehensive report outlining opportunities for improvement which can be utilized to identify knowledge and documentation gaps and support quality improvement activities. The Contractor shall provide one of three optional entitlements for each covered site to select from: A user training entitlement to include on-site training. For sites exercising this entitlement, the Contractor shall provide a custom training plan based on the outcome of the site utilization assessment. This training should address any gaps in the current department s use of the system, instruct new features, address system use gaps, and instruct on best practice recommendations. A data analysis entitlement. For sites exercising this entitlement, the Contractor shall provide data analysis service based on the outcome of the site utilization assessment. These data analysis projects focus on identifying opportunities to increase the efficiency, accuracy, and compliant use of the CensiTrac® Instrument Tracking System. A one-week entitlement for instrument marking service. For sites exercising this entitlement, the vendor shall provide one-week of instrument marking service to include trays, peel packs and/or high-dollar instrumentation. The Contractor shall furnish the CensiTrac® ScopeTrac Advanced Software Module and associated software licenses for tracking endoscope reprocessing and utilization. This software module shall: Facilitate the electronic tracking of endoscopes and endoscope reprocessing. Provide paperless reprocessing documentation Provide on-demand reporting capabilities. Provide access to preconfigured guided workflows. Enable quick access to endoscope instructions for use. The Contractor shall provide an interface to ingest data sent from Medivators Endoscope Reprocessors. The Contractor shall furnish the Censis LoanerLink® Software Module and associated software licenses to provide advanced tracking of vendor loaner trays and equipment within the Censis platform. CHANGES TO SOW Any changes to this SOW shall be authorized and approved only through written correspondence from the Contracting Officer (CO). A copy of each change will be kept in a project folder along with all other products of the project. Costs incurred by the Contractor through the actions of parties other than the CO shall be borne by the Contractor. The Contractor shall only invoice for the total amount agreed to on this procurement service contract. The Contractor shall not conduct any work not included within this SOW / provided by the original pricing of this contract, including but not limited to labor, travel, parts provision, and shipping. If any additional service or equipment is necessary, the Contractor shall contact the Contracting Officer (CO) and the Contracting Officer Representative (COR) immediately. The Contractor shall be liable for any work conducted (or equipment provided) outside the scope of this SOW (original order) without approval from the CO. INVOICES Payment will be made upon receipt of a properly prepared detailed invoice, prepared by the Contractor, validated by the COR, and submitted electronically through OB-10 (https://portal.tungsten-network.com/). Annual subscriptions shall be invoiced immediately following the initiation of the subscription service. For subscriptions which are dependent on the installation of hardware and/or software, the subscription period shall not initiate until hardware and/or software have been delivered, installed, configured, implemented, and accepted by the COR. The Contractor shall be permitted to request acceptance from the COR following successful demonstration of system implementation (or go-live ). Monthly and quarterly subscriptions shall be invoiced in arrears, after the conclusion of each subscription period. A properly prepared invoice will contain: Invoice number and invoice date The Contractor s Name and Address Accurate Contract number or other authorization for supplies delivered or service performed (including purchase order number and line-item number). Description, quantity, unit of measure, unit price, and extended price of supplies delivered, or service performed. Each invoice line item should be matched to the corresponding contract line item (CLIN). The Contractor shall include the appropriate CLIN number in the invoice line-item description. For contracts with multiple locations of performance and for which CLIN numbers are repeated for each location, each invoice line item shall specify the corresponding location in addition to the CLIN number (i.e. Line Item 1 description is CLIN 001 Site A, Line Item 2 description is CLIN 001 Site B, etc.) Total amount due for all invoice line items For contracts requiring the delivery of hardware, the Contractor shall include evidence of shipment and delivery from the shipping carrier. INFORMATION SECURITY The Authorization requirements do not apply, and that a Security Accreditation Package is not required. APPENDIX C VA INFORMATION AND INFORMATION SYSTEM SECURITY AND PRIVACY LANGUAGE FOR INCLUSION IN CONTRACTS, AS APPROPRIATE NOTE: Any sections (1-14) which DO NOT apply should not be included in the SOW, Performance Work Statement (PWS), Product Description (PD) or contract. GENERAL. This entire section applies to all acquisitions requiring any Information Security and Privacy language. The Contractor s personnel will be subject to the same federal laws, regulations, standards, VA directives and handbooks, as VA personnel regarding information and information system security and privacy. VA INFORMATION CUSTODIAL LANGUAGE. This entire section applies to all acquisitions requiring any Information Security and Privacy language. The Government shall receive unlimited rights to data/intellectual property first produced and delivered in the performance of this contract or order (hereinafter contract ) unless expressly stated otherwise in this contract. This includes all rights to source code and all documentation created in support thereof. The primary clause used to define Government, and the Contractor data rights is FAR 52.227-14 Rights in Data General. The primary clause used to define computer software license (not data/intellectual property first produced under the Contractor or order) is FAR 52.227-19, Commercial Computer Software License. Information made available to the Contractor by VA for the performance or administration of this contract will be used only for the purposes specified in the service agreement, SOW, PWS, PD, and/or contract. The Contractor shall not use VA information in any other manner without prior written approval from a VA Contracting Officer (CO). The primary clause used to define Government and The Contractor data rights is FAR 52.227-14 Rights in Data General. VA information will not be co-mingled with any other data on the Contractor s information systems or media storage systems. The Contractor shall ensure compliance with Federal and VA requirements related to data protection, data encryption, physical data segregation, logical data segregation, classification requirements and media sanitization. VA reserves the right to conduct scheduled or unscheduled audits, assessments, or investigations of The Contractor Information Technology (IT) resources to ensure information security is compliant with Federal and VA requirements. The Contractor shall provide all necessary access to records (including electronic and documentary materials related to the contracts and support (including access to the Contractor staff associated with the contract) to the VA, VA's Office Inspector General (OIG), and/or Government Accountability Office (GAO) staff during periodic control assessments, audits, or investigations. The Contractor may only use VA information within the terms of the contract and applicable Federal law, regulations, and VA policies. If new Federal information security laws, regulations or VA policies become applicable after execution of the contract, the parties agree to negotiate contract modification and adjustment necessary to implement the new laws, regulations, and/or policies. The Contractor shall not make copies of VA information except as specifically authorized and necessary to perform the terms of the contract. If copies are made for restoration purposes, after the restoration is complete, the copies shall be destroyed in accordance with the VA Directive 6500, VA Cybersecurity Program and VA Information Security Knowledge Service. If a Veterans Health Administration (VHA) contract is terminated for default or cause with a business associate, the related local Business Associate Agreement (BAA) shall also be terminated and actions taken in accordance with VHA Directive 1605.05, Business Associate Agreements. If there is an executed national BAA associated with the contract, VA will determine what actions are appropriate and notify the contactor. The Contractor shall store and transmit VA sensitive information in an encrypted form, using VA-approved encryption tools which are, at a minimum, Federal Information Processing Standards (FIPS) 140-2, Security Requirements for Cryptographic Modules (or its successor) validated and in conformance with the VA Information Security Knowledge Service requirements. The Contractor shall transmit VA sensitive information using VA approved Transport Layer Security (TLS) configured with FIPS based cipher suites in conformance with National Institute of Standards and Technology (NIST) 800-52, Guidelines for the Selection, Configuration and Use of Transport Layer Security (TLS) Implementations. The Contractor s firewall and web service security controls, as applicable, shall meet or exceed VA s minimum requirements. Except for uses and disclosures of VA information authorized by this contract for performance of the contract, the Contractor may use and disclose VA information only in two situations: (i) in response to a qualifying order of a court of competent jurisdiction after notification to the VA CO (ii) with written approval from the VA CO. The Contractor shall refer all requests for, demands for production of or inquiries about, VA information and information systems to the VA CO for response. Notwithstanding the provision above, the Contractor shall not release VA records protected by Title 38 U.S.C. § 5705, Confidentiality of medical quality- assurance records and/or Title 38 U.S.C. § 7332, Confidentiality of certain medical records pertaining to drug addiction, sickle cell anemia, alcoholism or alcohol abuse or infection with Human Immunodeficiency Virus (HIV). If the Contractor is in receipt of a court order or other requests for the above-mentioned information, the Contractor shall immediately refer such court order or other requests to the VA CO for response. Information made available to the Contractor by VA for the performance or administration of this contract or information developed by the Contractor in performance or administration of the contract will be protected and secured in accordance with the VA Directive 6500 and Identity and Access Management (IAM) Security processes specified in the VA Information Security Knowledge Service. Any data destruction done on behalf of VA by a Contractor shall be done in accordance with National Archives and Records Administration (NARA) requirements as outlined in VA Directive 6300, Records and Information Management, VA Handbook 6300.1, Records Management Procedures, and applicable VA Records Control Schedules. The Contractor shall provide its plan for destruction of all VA data in its possession according to the VA Directive 6500 and NIST 800-88, Guidelines for Media Sanitization prior to termination or completion of this contract. If directed by the COR/CO, the Contractor shall return all Federal Records to the VA for disposition. Any media, such as paper, magnetic tape, magnetic disks, solid state devices or optical discs that are used to store, process, or access VA information that cannot be destroyed shall be returned to the VA. The Contractor shall hold the appropriate material until otherwise directed by the COR or CO. Items shall be returned securely via VA-approved methods. VA sensitive information must be transmitted utilizing VA-approved encryption tools which are validated under FIPS 140-2 (or its successor) and NIST 800-52. If mailed, the Contractor shall send via a trackable method (USPS, UPS, FedEx, etc.) and immediately provide the COR/CO with the tracking information. Self-certification by the Contractor that the data destruction requirements above have been met shall be sent to the COR/CO within 30 business days of termination of the contract. All electronic storage media (hard drives, optical disks, CDs, back-up tapes, etc.) used to store, process or access VA information will not be returned to the Contractor at the end of lease, loan, or trade-in. Exceptions to this paragraph will only be granted with the written approval of the CO. ACCESS TO THE VA INFORMATION AND VA INFORMATION SYSTEMS. This section applies when any person requires access to information made available to the Contractor by VA for the performance or administration of this contract or information developed by the Contractor in performance or administration of the contract. A The Contractor shall request logical (technical) or physical access to the VA information and VA information systems for their employees and only to the extent necessary to perform the service specified in the solicitation of the contract. The Contractor shall sign the VA Information Security Rule of Behavior (ROB) before access is provided to the VA information and information systems (see Section 4, Training, below). The ROB contains the minimum user compliance requirements and does not supersede any policies of VA facilities or other agency components which provide higher levels of protection to the VA s information or information systems. Users who require privileged access shall complete the VA elevated privilege access request processes before privileged access is granted. The Contractor s employees working with the VA information are subject to the same security investigative and clearance requirements as those of VA appointees or employees who have access to the same types of information. The level and process of background security investigations for the Contractor shall be in accordance with the VA Directive and Handbook 0710, Personnel Suitability and Security Program. The Office of Human Resources and Administration/Operations, Security and Preparedness (HRA/OSP) is responsible for these policies and procedures. Contract personnel who require access to classified information or information systems shall have an appropriate security clearance. Verification of a security clearance shall be processed through the Special Security Officer located in HRA/OSP. The Contractor shall conform to all requirements stated in the National Industrial Security Program Operating Manual (NISPOM). The Contractor shall comply with conditions specified in VAAR 852.204-71(d); The Contractor operations required to be in United States. The Contractor working with the VA information must be permanently located within a jurisdiction subject to the law of the United States or its Territories to the maximum extent feasible. The Contractor shall deliver to the VA a detailed plan specifically addressing communications, personnel control, data protection and potential legal issues. The plan shall be approved by the COR/CO in writing prior to access being granted. The Contractor shall notify the COR/CO in writing immediately (no later than 24 hours) after personnel separation or occurrence of other causes. Causes may include the following: The Contractor s personnel no longer have a need for access to the VA information or VA information systems. The Contractor d personnel are terminated, suspended, or otherwise have their work on a VA project discontinued for any reason. The Contractor believes their own personnel may pose a threat to their company s working environment or to any company- owned property. This includes The Contractor-owned assets, buildings, confidential data, customers, employees, networks, systems, trade secrets and/or VA data. Any previously undisclosed changes to the Contractor s background history are brought to light, including but not limited to changes to background investigation or employee records. The Contractor personnel have their authorization to work in the United States revoked. The agreement by which the Contractor provides products and service to the VA has either been fulfilled or terminated, such that VA can cut off electronic and/or physical access for The Contractor personnel. In such cases of contract fulfillment, termination, or other causes; the Contractor shall take the necessary measures to immediately revoke access to the VA network, property, information, and information systems (logical and physical) by the Contractor s personnel. These measures include (but are not limited to): removing and then securing Personal Identity Verification (PIV) badges and PIV Interoperable (PIV-I) access badges, VA-issued photo badges, credentials for the VA facilities and devices, VA-issued laptops, and authentication tokens. The Contractor shall notify the appropriate VA COR/CO immediately to initiate access removal. When the Contractor no longer requires VA accesses, all VA issued property must be returned to the VA. This property includes (but is not limited to) documents, electronic equipment, keys, and parking passes. PIV and PIV-I access badges shall be returned to the nearest VA PIV Badge Issuance Office. Once they have had access to the VA information, information systems, networks and VA property in their possessions removed, the Contractor shall notify the appropriate VA COR/CO. TRAINING. This entire section applies to all acquisitions which include section 3. The Contractor requiring access to the VA information and VA information systems shall successfully complete the following before being granted access to the VA information and its systems: VA Privacy and Information Security Awareness and Rules of Behavior course (Talent Management System (TMS) #10176) initially and annually thereafter. Sign and acknowledge (electronically through TMS #10176) understanding of and responsibilities for compliance with the Organizational Rules of Behavior, relating to access to the VA information and information systems initially and annually thereafter; and Successfully complete any additional cyber security or privacy training, as required for the VA personnel with equivalent information system or information access [to be defined by the VA program official and provided to the VA CO for inclusion in the solicitation document i.e., any role- based information security training]. The Contractor shall provide to the COR/CO a copy of the training certificates and certification of signing the Organizational Rules of Behavior for each applicable employee within five days of the initiation of the contract and annually thereafter, as required. Failure to complete the mandatory annual training is grounds for suspension or termination of all physical or electronic access privileges and removal from work on the contract until such time as the required training is complete. SECURITY INCIDENT INVESTIGATION. This entire section applies to all acquisitions requiring any Information Security and Privacy language. The Contractor s employees shall immediately (within one hour) report suspected security/ privacy incidents to the VA OIT s Enterprise Service Desk (ESD) by calling (855) 673-4357 (TTY: 711). The ESD is OIT s 24/7/365 single point of contact for IT-related issues. After reporting to the ESD, the Contractor The Contractor s employees or business associates shall, within one hour, provide the COR/CO the incident number received from the ESD. To the extent known by the Contractor's notice to the VA shall identify the information involved and the circumstances surrounding the incident, including the following: The date and time (or approximation of) the Security Incident occurred. The names of individuals involved (when applicable). The physical and logical (if applicable) location of the incident. Why did the Security Incident take place (i.e., catalyst for the failure). The amount of data belonging to the VA that is believed to have been compromised. The remediation measures the Contractor is taking to ensure no future incidents of a similar nature. After the Contractor has provided the initial detailed incident summary to the VA, they will continue to provide written updates on any new and relevant circumstances or facts they discover. The Contractor s employes shall fully cooperate with the VA or third-party entity performing an independent risk analysis on behalf of VA. Failure to cooperate may be deemed a material breach and grounds for contract termination. The Contractor shall follow the VA Handbook 6500, Risk Management Framework for the VA Information Systems VA Information Security Program, and VA Information Security Knowledge Service guidance for implementing an Incident Response Plan or integrating with an existing VA implementation. In instances of theft or break-in or other criminal activity, the Contractor must concurrently report the incident to the appropriate law enforcement entity (or entities) of jurisdiction, including the VA OIG, and the VA Office of Security and Law Enforcement. The Contractor s employees shall cooperate with the VA and any law enforcement authority responsible for the investigation and prosecution of any possible criminal law violation(s) associated with any incident. The Contractor shall cooperate with the VA in any civil litigation to recover VA information, obtain monetary or other compensation from a third party for damages arising from any incident, or obtain injunctive relief against any third party arising from, or related to, the incident. The Contractor shall comply with the VA Handbook 6500.2, Management of Breaches Involving Sensitive Personal Information, which establishes the breach management policies and assigns responsibilities for the oversight, management and reporting procedures associated with managing of breaches. With respect to unsecured Protected Health Information (PHI), the Contractor is deemed to have discovered a data breach when the Contractor knew or should have known of breach of such information. When a business associate is part of VHA contract, notification to the covered entity (VHA) shall be made in accordance with the executed BAA. If the Contractor or any of its agents fails to protect VA sensitive personal information or otherwise engages in conduct which results in a data breach involving any VA sensitive personal information the Contractor processes or maintains under the contract; the Contractor shall pay liquidated damages to the VA as set forth in clause 852.211-76, Liquidated Damages Reimbursement for Data Breach Costs. INFORMATION SYSTEM DESIGN AND DEVELOPMENT. This entire section appliesto information systems, systems, major applications, minor applications, enclaves, and platform information technologies (to include the subcomponents of each) designed or developed for or on behalf of VA by any non-VA entity. Information systems designed or developed on behalf of VA at non-VA facilities shall comply with all applicable Federal law, regulations, and VA policies. This includes standards for the protection of electronic Protected Health Information (PHI), outlined in 45 C.F.R. Part 164, Subpart C and information and system security categorization level designations in accordance with FIPS 199, Standards for Security Categorization of Federal Information and Information Systems and FIPS 200, Minimum Security Requirements for Federal Information Systems. Baseline security controls shall be implemented commensurate with the FIPS 199 system security categorization (reference VA Handbook 6500 and VA Trusted Internet Connections (TIC) Architecture). Contracted new developments require creation, testing, evaluation, and authorization in compliance with the VA Assessment and Authorization (A&A) processes in VA Handbook 6500 and VA Information Security Knowledge Service to obtain an Authority to Operate (ATO). VA Directive 6517, Risk Management Framework for Cloud Computing Service, provides the security and privacy requirements for cloud environments. VA IT Contractor and third-party service providers shall address and/or integrate applicable VA Handbook 6500, VA Handbook 6517, Risk Management Framework for Cloud Computing Service and Information Security Knowledge Service specifications in delivered IT systems/solutions, products and/or service. If systems/solutions, products and/or service do not directly match VA security requirements, the Contractor shall work though the COR/CO to identify the VA organization responsible for governance or resolution. The Contractor shall comply with FAR 39.1, specifically the prohibitions referenced. Th...
- Web Link
-
SAM.gov Permalink
(https://sam.gov/opp/78c04fd303284afabcbc5d4a833da0dc/view)
- Record
- SN07558288-F 20250822/250820230047 (samdaily.us)
- Source
-
SAM.gov Link to This Notice
(may not be valid after Archive Date)
| FSG Index | This Issue's Index | Today's SAM Daily Index Page |