Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY - FEDBIZOPPS ISSUE OF JULY 21, 2013 FBO #4257
SOLICITATION NOTICE

70 -- MYRIAX ECHOVIEW SOFTWARE RENEWAL

Notice Date
7/19/2013
 
Notice Type
Combined Synopsis/Solicitation
 
NAICS
511210 — Software Publishers
 
Contracting Office
Department of Commerce, National Oceanic and Atmospheric Administration (NOAA), DOC/NOAA/NOS/NCCOS/CCFHR, 101 Pivers Island Road, Beaufort, North Carolina, 28516-9722, United States
 
ZIP Code
28516-9722
 
Solicitation Number
EE-133C-13-RO-0592
 
Archive Date
9/6/2013
 
Point of Contact
Lorraine J Edwards, Phone: 252-728-8724
 
E-Mail Address
Lorraine.Edwards@noaa.gov
(Lorraine.Edwards@noaa.gov)
 
Small Business Set-Aside
Total Small Business
 
Description
THIS IS A COMBINED SYNOPSIS/SOLICITATION FOR COMMERCIAL SERVICES PREPARED IN ACCORDANCE WITH THE FORMAT IN FAR SUBPART 12.6, AS SUPPLEMENTED WITH ADDITIONAL INFORMATION INCLUDED IN THIS NOTICE AND A WRITTEN SOLICITATION WILL NOT BE ISSUED. The Request for Quotation (RFQ) number is EE-133C-13-RQ-0592 is used as a reference as no HARD Copy will be issued. The U.S. Dept. of Commerce, NOAA, National Ocean Service, NCCOS, Center for Coastal Fisheries and Habitat Research, 101 Pivers Island Road, Beaufort, NC 28516-9722 has a requirement for Software Licensing Renewal of Echoview Software by Myriax, Inc. and the addition of additional Modules to the existing license. The requirements are provided in accordance with the following Statement of Work. The period of performance is December 13, 2013 through December 13, 2014. STATEMENT OF WORK Required Specifications: EUSA (Echoview Upgrade and Support Agreement) License renewals for NMFS-2 Must be compatible with existing license of Echoview version 5.3 or later (owned/operated by CCFHR), and be compatible with echosounders and sonars manufactured by HTI, Biosonics, Simrad, Kongsberg, Reson and SoundMetrics. NMFS-2 - Echoview (Myriax, Inc) Software Modules: Period of Performance (12/13/2013 - 12/13/2014) (1) Base Package (2) Bathymetric (3) Analysis Export (4) Virtual Echogram (5) Fish Tracking (6) EcholMPACT Export (7) Stationary Sonar (8) 2D Sonar (9) Media NMFS-2 - Echoview (Myriax, Inc) Software Add on Modules: Period of Performance (Date of Award - 12/13/2013) (1) Media NMFS-3 - Echoview (Myriax, Inc) Software Modules: Period of Performance (11/01/2012 - 12/13/2014) (1) Base (2) Bathymetric (3) Analysis Export IT Security Requirements The Certification and Accreditation (C&A) or Assessment and Authorization (A&A) requirements of Clause 48 CFR 1352.239-72 do not apply, and a Security Accreditation Package is not required. The contractor must consider IT Security controls throughout the lifecycle of this contract as outlined in NIST Special Publication 800-64 (http://csrc.nist.gov/publications/nistpubs/800-64-Rev2/SP800-64-Revision2.pdf). The contractor will not have access to any government owned equipment or be furnished government privileged information. The contractor is prohibited from installing any wireless network or other remote access devices to the copier. Any type of remote access by the contractor is prohibited. The contractor must provide all supporting documentation or a reference to obtain the necessary material which describes the security capabilities, the design and development processes and the testing and evaluation procedures used by the product or services being provided for this acquisition. The contractor must provide all supporting documentation or a reference to obtain the necessary material which describes all product or service updates and enhancements as they are implemented. The product or service supporting documentation could be the user and system administrator guides, which is documents the functional properties of the security controls employed to permit the analysis and testing of the security controls. The contractor must provide sufficient document demonstrating the software being provided complies with Office of Management and Budget Memorandum M-07-18 entitled Ensuring New Acquisitions Include Common Security Configurations. For Windows applications, the provider of information technology shall certify applications are fully functional and operate correctly as intended on systems using the Federal Desktop Core Configuration (FDCC), United States Government Configuration Baseline (USGCB) initiative or other NIST identified (http://checklists.nist.gov) secure configuration. The standard installation, operation, maintenance, update and/or patching of software shall not alter the configuration settings from the approved FDCC/ USGCB/other secure configuration. The information technology should also use the Windows Installer Service for installation to the default "program files" directory and should be able to silently install and uninstall. Applications designed for normal end users shall run in the standard user context without elevated system administration privileges. The contractor must provide sufficient documentation which demonstrates the acquiring information technology has implemented common security configurations. Common security configurations are available from the National Institute of Standards and Technology's website at http://checklists.nist.gov. The contractor includes the necessary product support and supporting documentation for the hardware and/or software that allows the sanitization (following NIST Special Publications 800-88 Guidelines for Media Sanitization) of the hardware and/or software upon the disposal of the product. The contractor must ensure that the product being purchased complies with the Homeland Security Presidential Directive 12 (HSPD-12) requirements from FAR 4.1302 stating: (a) In order to comply with FIPS PUB 201, agencies must purchase only approved personal identity verification products and services. (b) Agencies may acquire the approved products and services from the GSA, Federal Supply Schedule 70, Special Item Number (SIN) 132-62, HSPD-12 Product and Service Components, in accordance with ordering procedures outlined in FAR Subpart 8.4. The contractor must ensure that the product being purchased complies with Internet Protocol Version 6 (IPv6) requirements from FAR part 11.002 (g) stating: when acquiring information technology using Internet Protocol, the requirements documents must include reference to the appropriate technical capabilities defined in the USGv6 Profile (NIST Special Publication 500-267) and the corresponding declarations of conformance defined in the USGv6 Test Program. The applicability of IPv6 to agency networks, infrastructure, and applications specific to individual acquisitions will be in accordance with the agency's Enterprise Architecture (see OMB Memorandum M-05-22 dated August 2, 2005). The device must be on the Common Criteria Evaluation and Validation Scheme (CCEVS) validated product list (http://www.niap-ccevs.org/). The device must conform to a minimum of EAL2 (Evaluation Assurance Level 2). The contractor must address the following security considerations for a multi function device TOE's (Target of Evaluation): Audit Generation - The MFP should generate audit event records for security-relevant events and transmits them to a remote IT system using the syslog protocol. Identification and Authentication - The MFP should support I&A with a per-user selection of internal accounts or integration with an external LDAP server (in the operational environment). PKI authentication may also be specified, in which case all authentication must use PKI. A Backup Password mechanism may also be enabled. Access Control - Access controls configured for functions and menu access are enforced by the MFP. Management - Through the touch panel, authorized administrators may configure access controls and perform other management functions. Fax Separation - The MFP should ensure that only fax traffic is sent or received via the attached phone line. Incoming traffic is processed as fax data only; no management access or other data access is permitted. (Fax functionality is currently not allowed by NOS OCIO, but I have asked them to relook at the newer models coming out) User Data Buffer Wiping - The MFP should automatically overwrite RAM used to store user data as soon as the buffer is released. Encryption - If files are stored on the MFP, need to be encrypted. Secure Communication - The MFP should protect the confidentiality and integrity of all information exchanged over the attached network by using IPSec with ESP for all network communication. Self Test - During initial start-up, the MFP should perform self tests on its hardware components and the integrity of the building blocks and security templates. Operational Considerations MFP will be scanned as any other device on the network. MFP logs will be monitored. Future considerations for CAC-enablement IT SECURITY REQUIREMENTS: The Certification and Accreditation (C&A) or Assessment and Authentication (A&A) requirements of Clause 48 CFR 1352.239-72 do not apply, and a Security Accreditation Package is not required. This procurement is being solicited as Small Business set- aside in full and open competition. The resulting purchase order will be negotiated as a firm-fixed price Purchase Order. Hard copies of the RFQ will not be issued. Electronic submission of the contractor's proposal is hereby authorized, but must be transmitted by the posted response date and time. It is incumbent upon contractor to monitor FEDBIZOPPS for the release of the RFQ, Statement of Work, and all subsequent amendments. To be eligible for award, offerors must be registered in the System for Award Management (SAM) to be considered for an award of a federal contract. For information regarding registration in SAM contact the SAM website at www.sam.gov/portal/public/SAM/; offerors must also obtain a Data Universal Numbering System (DUNS) number and provide it with the offer. All responsible sources may submit a quote, which shall be considered by the agency. The FSC for this is 7030 and the NAICS Code is 511210, small business size standard is $25.0 Million. Incorporated provisions and clauses are those in effect through Federal Acquisition Circular 2005-23. FAR 52.212-1 Instructions to Offerors-Commercial Items applies. Evaluation will be in accordance with FAR 52.212-2 Evaluation-Commercial Items. Award will be made to the responsible, responsive offeror whose offer will result in the lowest technically acceptable price and who can best meet the required location. FAR 52.212-4, Contract Terms and Conditions-Commercial Items and 52.212-5 Contract Terms and Conditions Required to Implement Statutes or Executive Orders-Commercial Items (MAR 2007) applies and the following additional FAR clauses cited in the clause at paragraph (b) are applicable to this acquisition, as such consider the following clauses checked, (11), (26), (27), (28), (29), (31), (36), (38), (39), (42), (47) and (49). The following addenda or additional terms and conditions apply; None. No Defense Priorities and Allocations System (DPAS) rating is assigned. Offers must be submitted to the Center for Coastal Fisheries and Habitat Research, 101 Pivers Island Road, Beaufort, NC 28516-9722 by 2:00 P.M. AUGUST 22, 2013. Vendors whose offer expires prior to closing date will not be accepted. Offers maybe sent via email to Lorraine.Edwards@noaa.gov. Inquiries will only be accepted via email to Lorraine.Edwards@noaa.gov..
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/spg/DOC/NOAA/CCEHBRMD/EE-133C-13-RO-0592/listing.html)
 
Place of Performance
Address: NOAA/NOS/NCCOS/CCFHR, 101 PIVERS ISLAND ROAD, BEAUFORT, NC 28516, BEAUFORT, North Carolina, 28516, United States
Zip Code: 28516
 
Record
SN03122033-W 20130721/130719234635-b14fc8063606d48595569a1b661c03b9 (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.