Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY - FEDBIZOPPS ISSUE OF JULY 30, 2014 FBO #4631
SOLICITATION NOTICE

66 -- Phase III extension activities related to NIA's IT Strategic and Operational Plan

Notice Date
7/28/2014
 
Notice Type
Presolicitation
 
NAICS
611420 — Computer Training
 
Contracting Office
Department of Health and Human Services, National Institutes of Health, National Institute on Drug Abuse, 6001 Executive Boulevard, Room 4211 - MSC 9559, Bethesda, Maryland, 20892, United States
 
ZIP Code
20892
 
Solicitation Number
HHS-NIH-NIDA(SSSA)-2014-PSOL-428
 
Archive Date
8/15/2014
 
Point of Contact
Rodney E. Brooks, Phone: 3014020751
 
E-Mail Address
rodney.brooks@nih.gov
(rodney.brooks@nih.gov)
 
Small Business Set-Aside
N/A
 
Description
This is a pre-solicitation non-competitive (notice of intent) synopsis to award a contract without providing for full or open competition (including brand-name). THIS IS A NOTICE OF INTENT, NOT A REQUEST FOR PROPOSAL. A SOLICITATION WILL NOT BE ISSUED AND PROPOSALS WILL NOT BE REQUESTED. The solicitation number is HHS-NIH-NIDA(SSSA)-2014-PSOL-428 and the solicitation is issued as a pre-solicitation notice of intent to award a non-competitive order to Mason Harriman Group, Inc 23 Bonnieview Lane, Towaco, NJ 07082 This acquisition is conducted under the authority of the Federal Acquisition Regulation (FAR) Part 13-Simplified Acquisition Procedures, Subpart 13.106-1 (b) (1), Soliciting from a single source and is not expected to exceed the simplified acquisition threshold. Contracts awarded using FAR Part 13-Simplified Acquisition Procedures are exempt from the requirements of FAR Part 6-Competition Requirements. The solicitation document and incorporated provisions and clauses are those in effect through Federal Acquisition Circular 2005-05-73, dated April 29, 2014. A notice regarding any set-aside restrictions, the associated NAICS 611420 code and the small business size standard is 500 employees. This acquisition is being conducted in accordance with the procedures of FAR Part 13-Simplified Acquisition Procedures, FAR Subpart 13.5-Test Program for Certain Commercial Items, and FAR Part 12-Acquisition of Commercial Items. The National Institutes of Health, National Institutes on Aging intends to procure on a sole source basis a service agreement for the completion of Phase III extension activities related to NIA's IT Strategic and Operational Plan implementation and coaching support. The period of performance is August 1, 2014 through January 31, 2015. STATEMENT OF WORK / PERFORMANCE WORK STATEMENT 1.0Scope of Work 1.1Background Contract support has provided NIA IT strategic leadership and facilitiation to access the effectiveness of the IT organization (OD and DIRP) and infrastructure and its ability to support the long term business and technical direction of the NIA. This effort led to the successful development of a 3 year NIA IT Strategic Operational Plan which also included extensive work in developing, implementing and maintaining a performance management process and key performance indicators (KPI's) to support increasing IT responsibilities. 1.2Scope of Requirement 1.2.1General Task Requirements The NIA seeks to complete the implementation of the NIA IT Strategic and Operational Plan currently in phase III. Extensive work has been accomplished to meet the requirements of NIA Division Directors (ERP and IRP) and staff in prior phases of this project. The requirement in this phase is to obtain transition support as NIA ITB fully benefits from the work completed in phases I - III. This support will help NIA ITB ensure NIA's strategic initiatives continue to evolve and develop in the most effective manner and provide effective and efficient IT products and services to the NIA community. 1.2.2 Subtask Requirements Deliverable 1 - Mentoring and Coaching IT leadership Team Support The major objective for this requirement is to help the NIA IT Leadership Team to better collaborate, communicate (within IT and with the user community) and coordinate activities across its various sections. This ensures better customer service, helps eliminate duplication of efforts and leverages more effectively IT resources across NIA. Deliverable 2 - IT Strategic and Operational Planning Facilitation Support The purpose of this requirement will be to provide coaching skills to NIA IT leadership for second year planning processes. NIA IT will be the primary facilitators managing and executing the planning process with assistance from MHG at the discretion of the CIO. The steps in executing the planning cycle include: 1) Schedule and facilitate several planning sessions with the IT Leadership team (ITB & NCTS) to, review, confirm and update (or change) any of the technology infrastructure strategies articulated in the 3-year IT Strategic and Operational plan issued last year. 2) Review, validate and update the Operational plan for infrastructure services and extend it for another year 3) Schedule 4-5 planning sessions with the major user groups (IRP, ERP(2),OD) to review, confirm and update (or change) any of the application development strategies articulated in the 3-year IT Strategic and Operational Plan issued last year. 4) Review, validate and update the Operational plan for application services. Deliverable 3 -IT processes-Process-re-engineering The purpose of this requirement is to provide a cursory review and recommendation to improving remaining IT IV&V processes. The Planning and Performance Reporting and the Change Control processes were reviewed and improved during initial phase III work of the project. 1.2.2.a Subtasks Performance / Completion Period The period of performance for this requirement is for August 1, 2014 - January 31, 2015. 1.2.2.b Subtask Deliverables Deliverable 1Deliverable 2Deliverable 3 The major objectives for this initiative are to help the NIA IT Leadership Team to better collaborate, communicate (within IT and with the user community) and coordinate activities across its various sections. This ensures better customer service, helps eliminate duplication of efforts and leverages more effectively IT resources across NIA. Schedule and facilitate several planning sessions with the IT Leadership team (ITB & NCTS) to, review, confirm and update (or change) any of the technology infrastructure strategies articulated in the 3-year IT Strategic and Operational plan issued last year. Review, validate and update the Operational plan for infrastructure services and extend it for another year Schedule 4-5 planning sessions with the major user groups (IRP, ERP(2),OD) to review, confirm and update (or change) any of the application development strategies articulated in the 3-year IT Strategic and Operational Plan issued last year. Review, validate and update the Operational plan for application services and extend it for another year.The purpose of this initiative is to continue the work of reviewing and improving key IT processes. The Planning and Performance Reporting process and the Change Control process have been reviewed and improved during this last phase of the project. One process that has been identified is Quality Assurance. 2. Deliverables/Reporting Requirement Task Estimated Hours08/01/2014 - 01/31/2015 Task 1 - Mentoring and Coaching Support 50 Task 2 - IT Strategic Planning Facilitiation Support 100 Task 3 - Process Reingineering Support 50 Financial Statements Reports •The contractor will supply directly to the Project Officer any and all billing and invoice issues by no later than the 20th of each month. •The contractor and Project Officer will convene detailed discussions regarding any and all items that may arise. 3.Contractor Key Personnel The following skills are considered to be essential to the work being performed under this task order. 1.The proposed key personnel will become subject to the provisions of Health and Human Services Acquisition Regulation (HHSAR) Clause HHSAR 352.242-70 KEY PERSONNEL, HHSAR 352.242-70 (January 2006) a.The key personnel specified in this contract are considered to be essential to work performance. At least 30 days prior to diverting any of the specified individuals to other programs or contracts (or as soon as possible, if an individual must be replaced, for example, as a result of leaving the employ of the Contractor), the Contractor shall notify the Contracting Officer and shall submit comprehensive justification for the diversion or replacement request (including proposed substitutions for key personnel) to permit evaluation by the Government of the impact on performance under this contract. The Contractor shall not divert or otherwise replace any key personnel without the written consent of the Contracting Officer. The Government may modify the contract to add or delete key personnel at the request of the Contractor or Government. b.The Contractor shall meet the following staffing qualifications criteria in order to be eligible for award: Program Manager: Experience managing strategic consulting engagements related to IT and IT organizational analysis. Solid knowledge and background of current IT organizational trends. The Project Manager must also have the ability to successively bring solutions to a closure in a timely and comprehensive manner. Senior Analyst: Extensive background with interviewing, analyzing, and documenting organizational issues, particularly within IT organizations. Solid knowledge and background in IT organizations, IT operations, IT management, and current trends in IT services. Excellent interview skills and the ability to effectively work with senior personnel and executives. IT Domain Specialist: Technical and organizational experience with IT Specialists and users within a Federal agency. Knowledge of current architectures (server and application) and current trends in IT services. 2. Rules of Behavior & Remote Access •Each Contractor assigned to this contract must review, sign and submit to the NIA ISSO the attached Rules of Behavior for accessing NIA Resources. If the contractor will not require access to NIA Resources, they do not require this document. •Each Contractor that is identified as requiring remote access to NIA resources will be required to review, sign and submit to the NIA ISSO a remote access certification agreement. The NIA ISSO and / or Project Officer will promptly identify those individuals as the need arises and those individuals will be classified as Key Personnel of this contract. •ROB & Remote Access Certification Agreement is Attached Non Disclosure Agreement •Each Contractor assigned to this contract must review, sign and submit to the NIA ISSO and / or Project Officer. •Non-disclosure Statement is Attached •SF85P •Each Contractor that has been identified as a Level 6 or Level 5 category, must complete and submit to the NIA ISSO the completed SF85p and will be required to submit to Fingerprint and Interviews from OPM investigators during the investigation process. •If Contractor has a valid and active clearance, the contractor needs to provide information to NIA ISSO in order to validate this clearance. 4.Government Responsibilities The majority of the work shall be performed in one of the NIH facilities either on the NIH main campus in Bldg. 31, or off-campus location at 7201 Wisconsin Avenue, Bethesda MD location. The government shall provide workspace, desktop computers and telephones for two contractors to perform the work required to complete the tasks and deliverables of the contract. The Government shall provide access to IT network resources necessary to perform the contract requirements. 5.Travel The principal place of performance is the NIH campus or off camplus facilities located in Bethesda MD 20892. Accordingly, reimbursable travel and per diem for the contractor's employees performing work on a regular basis at this place of performance is not authorized. Any changes to this must be approved in advance by the contracting officer. 6.Security Requirements The Federal Information Security Management Act of 2002 (P.L. 107‐347) (FISM requires each agency to develop, document, and implement an agency‐wide information security program to safeguard information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor (including subcontractor), or other source. The National Institute of Standards and Technology (NIST) has issued a number of publications that provide guidance in the establishment of minimum security controls for management, operational and technical safeguards needed to protect the confidentiality, integrity and availability of a Federal information system and its information. This acquisition requires the Contractor to: •Develop, have the ability to access, or host and/or maintain Federal information and/or Federal information system(s). •Have regular or prolonged physical access to a "Federally‐controlled facility," as defined in FAR Subpart 2.1. The Contractor and all subcontractors performing under this acquisition shall comply with the following requirements: a.Information Type [X]Administrative, Management and Support Information: _C.2.3.4 Strategic Planning [ ]Mission Based Information: b.Security Categories and Levels ConfidentialityLevel:[X] Low[] Moderate[] High IntegrityLevel: [X] Low[] Moderate[] High AvailabilityLevel: [X] Low[] Moderate[] High OverallLevel: [X] Low[ ] Moderate[ ] High c.Position Sensitivity Designations The following sensitivity level(s), clearance type(s), and investigation requirements apply to this contract: [ ] Level 6: Public Trust ‐ High Risk. Contractor/subcontractor employees assigned to Level 6 positions shall undergo a Suitability Determination and Background Investigation (BI). [ ]Level 5: Public Trust ‐ Moderate Risk. Contractor/subcontractor employees assigned to Level 5 positions with no previous investigation and approval shall undergo a Suitability Determination and a Minimum Background Investigation (MBI), or a Limited Background Investigation (LBI). [ X ] Level 1: Non‐Sensitive Contractor/subcontractor employees assigned to Level 1 positions shall undergo a Suitability Determination and National Agency Check and Inquiry Investigation (NACI). The Contractor shall submit a roster by name, position, e‐mail address, phone number and responsibility, of all staff (including subcontractor staff) working under this acquisition where the Contractor will develop, have the ability to access, or host and/or maintain a federal information system(s). The roster shall be submitted to the Project Officer, with a copy to the Contracting Officer, within 14 calendar days of the effective date of this contract. Any revisions to the roster as a result of staffing changes shall be submitted within 15 calendar days of the change. The Contracting Officer will notify the Contractor of the appropriate level of investigation required for each staff member. An electronic template, "Roster of Employees Requiring Suitability Investigations," is available for contractor use at https://ocio.nih.gov/InfoSecurity/public/acquisition/Documents/SuitabilityRoste r_10‐15‐12.xlsx Suitability Investigations are required for contractors who will need access to NIH information systems and/or to NIH physical space. However, contractors who do not need access to NIH physical space will not need an NIH ID Badge. Each contract employee needing a suitability investigation will be contacted via email by the NIH Office of Personnel Security and Access Control (DPSAC) within 30 days. The DPSAC email message will contain instructions regarding fingerprinting as well as links to the electronic forms contract employees must complete. Additional information can be found at the following website: http://idbadge.nih.gov/background/index.asp All contractor and subcontractor employees shall comply with the conditions established for their designated position sensitivity level prior to performing any work under this contract. Contractors may begin work after the fingerprint check has been completed. d.Information Security Training Mandatory Training All employees having access to (1) Federal information or a Federal information system or (2) personally identifiable information, shall complete the NIH Information Security Awareness Training course at http://irtsectraining.nih.gov/ before performing any work under this contract. Thereafter, employees having access to the information identified above shall complete an annual NIH‐specified refresher course during the life of this contract. The Contractor shall also ensure subcontractor compliance with this training requirement. e.Rules of Behavior The Contractor shall ensure that all employees, including subcontractor employees, comply with the NIH Information Technology General Rules of Behavior, which are available at http://prod.ocio.nih.gov/InfoSecurity/training/Pages/nihitrob.aspx. 7.Personnel Security Responsibilities 1.The Contractor shall notify the Contracting Officer, Project Officer, and I/C ISSO within five working days before a new employee assumes a position that requires a suitability determination or when an employee with a suitability determination or security clearance stops working under this contract. The Government will initiate a background investigation on new employees requiring suitability determination and will stop pending background investigations for employees that no longer work under this acquisition. 2.The Contractor shall provide the Project Officer with the name, position title, e‐mail address, and phone number of all new contract employees working under the contract and provide the name, position title and suitability determination level held by the former incumbent. If the employee is filling a new position, the Contractor shall provide a position description and the Government will determine the appropriate suitability level. 3.The Contractor shall provide the Project Officer with the name, position title, and suitability determination level held by or pending for departing employees. Perform and document the actions identified in the Contractor Employee Separation Checklist (attached) when a Contractor/subcontractor employee terminates work under this contract. All documentation shall be made available to the Project Officer and/or Contracting Officer upon request. 8.Commitment to Protect Non‐Public Departmental Information and Data 1.Contractor Agreement The Contractor, and any subcontractors performing under this contract, shall not release, publish, or disclose non‐public Departmental information to unauthorized personnel, and shall protect such information in accordance with provisions of the following laws and any other pertinent laws and regulations governing the confidentiality of such information: ‐ 18 U.S.C. 641 (Criminal Code: Public Money, Property or Records) ‐ 18 U.S.C. 1905 (Criminal Code: Disclosure of Confidential Information) ‐ Public Law 96‐511 (Paperwork Reduction Act) 2.Contractor Employee Non‐Disclosure Agreement Each employee, including subcontractors, having access to non‐public Department information under this acquisition shall complete the Commitment to Protect Non‐Public Information - Contractor Employee Agreement A copy of each signed and witnessed Non‐Disclosure agreement shall be submitted to the Project Officer prior to performing any work under this acquisition. 9.Data Encryption The following encryption requirements apply to all laptop computers containing HHS data at rest and/or HHS data in transit. The date by which the Contractor shall be in compliance will be set by the Project Officer, however, device encryption shall occur before any sensitive data is stored on the laptop computer/mobile device, or within 45 days of the start of the contract, whichever occurs first. 1.The Contractor shall secure all laptop computers used on behalf of the government using a Federal Information Processing Standard (FIPS) 140‐2 compliant whole‐disk encryption solution. The cryptographic module used by an encryption or other cryptographic product must be tested and validated under the Cryptographic Module Validation Program to confirm compliance with the requirements of FIPS PUB 140‐2 (as amended). For additional information, refer to http://csrc.nist.gov/cryptval. 2.The Contractor shall secure all mobile devices, including non‐HHS laptops and portable media that contain sensitive HHS information by using a FIPS 140‐2 compliant product. Data at rest includes all HHS data regardless of where it is stored. 3.The Contractor shall use a FIPS 140‐2 compliant key recovery mechanism so that encrypted information can be decrypted and accessed by authorized personnel. Use of encryption keys which are not recoverable by authorized personnel is prohibited. Key recovery is required by "OMB Guidance to Federal Agencies on Data Availability and Encryption", November 26, 2001, http://csrc.nist.gov/drivers/documents/ombencryption‐guidance.pdf. Encryption key management shall comply with all HHS and NIH policies (http://intranet.hhs.gov/infosec/docs/guidance/hhs_standard_2007.pdf) and shall provide adequate protection to prevent unauthorized decryption of the information. All media used to store information shall be encrypted until it is sanitized or destroyed in accordance with NIH procedures. Contact the NIH Center for Information Technology for assistance (http://cit.nih.gov/ProductsAndServices/ServiceCatalog/Services.htm?Service=Media+ Sanitization+Service). Physical Access Security In accordance with OMB Memorandum M‐05‐24, the Contractor shall ensure that background investigations are conducted for all contractor/subcontractor personnel who have (1) access to sensitive information, (2) access to Federal information systems, (3) regular or prolonged physical access to Federally‐controlled facilities, or (4) any combination thereof. OMB Memorandum M‐05‐24 is available at http://www.whitehouse.gov/omb/memoranda/fy2005/m05‐24.pdf. Agency personal identification verification policy and procedures are identified below: HHS Office of Security and Drug Testing, Personnel Security/Suitability Handbook (02‐ 01‐05): http://www.hhs.gov/oamp/policies/personnel_security_suitability_handbook.html Using Secure Computers to Access Federal Information 1. The Contractor shall use an USGCB compliant computer when processing information on behalf of the Federal government. 2. The Contractor shall install computer virus detection software on all computers used to access information on behalf of the Federal government. Virus detection software and virus detection signatures shall be kept current. Common Security Configurations 1. The Contractor shall ensure new systems are configured with the applicable Federal Desktop Core Configuration (FDCC) (http://nvd.nist.gov/fdcc/download_fdcc.cfm) and applicable configurations from http://checklists.nist.gov, as jointly identified by the Operating Division (OPDIV)/Staff Division (STAFFDIV) Contracting Officer's Technical Representative (COTR) and the Chief Information Security Officer (CISO). 2. The Contractor shall ensure hardware and software installation, operation, maintenance, update, and/or patching will not alter the configuration settings specified in: (a) the FDCC (http://nvd.nist.gov/fdcc/index.cfm); and (b) other applicable configuration checklists as referenced above. 3. The Contractor shall ensure applications are fully functional and operate correctly on systems configured in accordance with the above configuration requirements. 4. The Contractor shall ensure applications designed for end users run in the standard user context without requiring elevated administrative privileges. 5. Federal Information Processing Standard 201 (FIPS‐201)‐compliant, Homeland Security Presidential Directive 12 (HSPD‐12) card readers shall: (a) be included with the purchase of servers, desktops, and laptops; and (b) comply with FAR Subpart 4.13, Personal Identity Verification. 6. The Contractor shall ensure that all of its subcontractors (at all tiers) comply with the above requirements. Special Information Security Requirements for Foreign Contractors/Subcontractors When foreign contractors/subcontractors perform work under this acquisition at non‐ US Federal Government facilities, provisions of HSPD‐12 do NOT apply. 10.DATA RIGHTS The NIA shall have unlimited rights to and ownership of all deliverables provided under this contract, including reports, recommendations, briefings, work plans and all other deliverables. This includes the deliverables provided under the basic Description of Tasks and Associated Deliverables and any optional task deliverables exercised by the contracting officer. In addition, it includes any additional deliverables required by contract change. The definition of "unlimited rights" is contained in Federal Acquisition Regulation (FAR) 27.401, "Definitions." FAR clause 52.227‐14, "Rights in Data‐General, " is hereby incorporated by reference and made a part of this contract/order. 11.SECTION 508 - ELECTRONIC AND INFORMATION TECHNOLOGY STANDARDS [In December 2000, the Architectural and Transportation Barriers Compliance Board (Access Board), pursuant to Section 508(2)(A) of the Rehabilitation Act Amendments of 1998, established information technology accessibility standards for the federal government. Section 508(a)(1) requires that when federal departments or agencies develop, procure, maintain, or use Electronic and Information Technology (EIT), they shall ensure that the EIT allows federal employees with disabilities to have access to and use of information and data that is comparable to the access to and use of information and data by other Federal employees. The Section 508 requirement also applies to members of the public seeking information or services from a federal department or agency. Section 508 text is available at http://www.opm.gov/HTML/508‐textOfLaw.htm or http://www.section508.gov/index.cfm?FuseAction=Content&ID=14] The contractor shall comply with Section 508 of the Rehabilitation Act (29 U.S.C. § 794d), as amended by the Workforce Investment Act of 1998 (P.L. 105‐220), August 7, 1998. 12.Privacy Act Information to be utilized under this contract, or a portion thereof, is subject to the Privacy Act, the Contractor will follow the rules and procedures of disclosure set forth in the Privacy Act of 1974, 5 U.S.C. 552a, and implementing regulations and policies, with respect to systems of records determined to be subject to the Privacy Act. Confidential information, as defined in paragraph shall not be disclosed without the prior written consent of the individual, institution, or organization. a. Whenever the Contractor is uncertain with regard to the proper handling of material under the contract, or if the material in question is subject to the Privacy Act or is confidential information subject to the provisions of this article, the Contractor should obtain a written determination from the Contracting Officer prior to any release, disclosure, dissemination, or publication. b. Contracting Officer's determination will reflect the result of internal coordination with appropriate program and legal officials. c. The provisions of paragraph (d) of this article shall not apply to conflicting or overlapping provisions in other Federal, State or local laws. 13.Shipping /Packaging Instructions See Section 2.0 Deliverables/ Reporting Requirement 14.Purchase or Lease of Equipment Determination Not Applicable to this Task Order Place of Performance: 7201 Wisconsin Ave Bethesda, MD 20892. The provision of FAR clause 52.212-1, Instructions to Offerors - Commercial Items (July 2013), applies to this acquisition. The provision of FAR clause 52.212-2, Evaluation - Commercial Items (January 1999), applies to this acquisition. The Government will award a contract resulting from this solicitation to the responsible offeror whose offer conforming to the solicitation will be most advantageous to the Government, price and other factors considered. The Offeror must include a completed copy of the provision at FAR clause 52.212-3, Offeror Representations and Certifications - Commercial Items (August 2013), with its offer. The FAR clause is located at http://www.acquisition.gov/far/. FAR clause at 52.212-5, Contract Terms and Conditions Required to Implement Statutes or Executive Orders-Commercial Items (September 2013), applies to this acquisition. There are no additional contract requirement(s) or terms and conditions determined by the contracting officer to be necessary for this acquisition and consistent with customary commercial practices. The Defense Priorities and Allocations System (DPAS) is not applicable to this requirement. This synopsis is not a request for competitive proposals. However, interested parties may identify their interest and capability to respond to this notice. Responses to this notice shall contain sufficient information to establish the interested parties' bona-fide capabilities for fulfilling the requirement and include: unit price, list price, shipping and handling costs, the delivery period after contract award, the prompt payment discount terms, the F.O.B. Point (Destination or Origin), the Dun & Bradstreet Number (DUNS), the Taxpayer Identification Number (TIN), and the certification of business size. All offerors must have an active registration in the System for Award Management (SAM) www.sam.gov." A determination by the Government not to compete this proposed contract based upon responses to this notice is solely within the discretion of the Government. The information received will normally be considered solely for the purposes of determining whether to proceed on a non-competitive basis or to conduct a competitive procurement. Respondents that believe that they are manufacturers or authorized resellers of the brand-name product specified in this announcement must provide, as part of their response: (a) product, catalog, model, and/or part number(s); (b) product description;(c) all relevant information and documentation that the item(s) offered meets the salient physical, functional, or performance characteristics as specified in the purchase description; quantity; estimated price or cost; shipping, handling, and/or installation charges; and delivery date after receipt of order. All responses must be received by July 31, 2014 at 12:00pm EST and must reference number HHS-NIH-NIDA(SSSA)-2014-PSOL-428. Responses may be submitted electronically to rodney.brooks@nih.gov "All responsible sources may submit a capability statement, proposal, or quotation, which shall be considered by the agency."
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/spg/HHS/NIH/NIDA-01/HHS-NIH-NIDA(SSSA)-2014-PSOL-428 /listing.html)
 
Record
SN03440007-W 20140730/140728234844-b9f98f3e0e5fd02ad0d643c12dfd8e11 (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.