Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
SAMDAILY.US - ISSUE OF FEBRUARY 18, 2021 SAM #7021
MODIFICATION

58 -- IAAG SPARE PARTS FROM THALES AUSTRALIA-Sole Source

Notice Date
2/16/2021 10:05:18 AM
 
Notice Type
Solicitation
 
NAICS
334419 — Other Electronic Component Manufacturing
 
Contracting Office
NAVAL SURFACE WARFARE CENTER PANAMA CITY BEACH FL 32407-7001 USA
 
ZIP Code
32407-7001
 
Solicitation Number
N61331-21-T-VT22
 
Response Due
2/23/2021 5:00:00 AM
 
Archive Date
03/10/2021
 
Point of Contact
Vincent J. Tomasi, Phone: 8508197308, Jamell L. Kilgore, Phone: 8506366039
 
E-Mail Address
vincent.j.tomasi@navy.mil, jamell.kilgore@navy.mil
(vincent.j.tomasi@navy.mil, jamell.kilgore@navy.mil)
 
Description
Subj:��� SOLE SOURCE JUSTIFICATION TO ACQUIRE IAAG SPARE PARTS FROM THALES AUSTRALIA (PR 1300893445) Identification of the agency and the contracting activity, and specific identification of the document as a �Limited Source Justification.� This is a sole source justification. Contracting activity is the Naval Sea Systems Command, Naval Surface Warfare Center, Panama City Division (NSWC PCD), 110 Vernon Avenue, Panama City, FL 32407-7001 (Contracts Division Code 02). Nature and/or description of the action being approved. This action will award a firm fixed price purchase order to Thales Australia Limited, Building 314, Level 1, Garden Island, NSW 2011, Australia to acquire spare parts for the Infrasonic Australian Acoustic Generator (IAAG). The Navy has fielded the Advanced Acoustic Generators (AAG) and Infrasonic AAG (IAAG) on MCM class ships. The IAAG is a proprietary item manufactured exclusively by Thales Australia Limited. The spare parts being acquired are proprietary items designed to work exclusively in the IAAG. A description of the supplies or services required to meet the agency�s needs (including the estimated value). The following items are being acquired: IAAG Blade IAG-Z010D piston seal IAG-Z050B bladder IAG-Z060F radio monitor connector IAG-Z060H proximity sensor IAG-Z060P The estimated value of this effort is approximately $75,000. The Government�s minimum needs have been verified by the certifying technical and requirements personnel. This memo does not authorize acquisition for other requirements. The contract action will be funded with 2021 Operations and Maintenance, Navy (OMN) Funds. Identification of the justification rationale and, if applicable, a demonstration of the proposed contractor�s unique qualifications to provide the required supply or service. 10 U.S.C. 2304(c) (1) - Only one responsible source and no other supplies or services will satisfy agency requirements, FAR 6.302-1. This procurement is sole source for the following reasons. Thales Australia is the only manufacturer for the AAG and IAAG and their spare parts. No other contractors are authorized to manufacture the AAG and IAAG spare parts. There are no drawings for these proprietary parts, nor do any other manufacturers have access to the information necessary to reverse engineer the item. NSWC PCD has successfully evaluated this equipment for use in the U.S. Mine Countermeasures (MCM) Fleet having acquired the equipment under sole source contracts N61331-06-C-0030, N61331-07-D-0006, and N61331- 10-C-0007. Use of any other vendor would result in substantial duplication of manufacturing, testing, documentation, and installation effort. For the Government to identify and evaluate another system, perform the field testing of the equipment, produce the required SHIPALT records and drawings, produce all of the required support documentation, and schedule ships for equipment installation and other tasks is estimated at a cost of $21,000,000 in development and installation costs, and exceed seven years. The development costs are derived from the development, prototyping, Engineering Development Models (EDMs), testing, shock testing, retesting, and the 1000- hour endurance test was $14,000,000. The prototyping, EDM, and testing of the IAAG was $7,000,000. Most of these costs were borne by the Royal Australian Navy. The seven year time estimate was derived from the amount of time which was required by Thales Australia to perform these identical tasks. In summary, Thales Australia�s is uniquely qualified to provide the one-of-a-kind part required for the IAAG. It is imperative that this task is awarded to Thales Australia Limited. A determination by the ordering activity contracting officer that the order represents the best value consistent with FAR 13.106-1(a) The Contracting Officer has determined that the order represents the best value and results in the lowest overall cost alternative (considering price, special features, administrative costs, etc.) to meet the Government�s needs. A description of the market research conducted among schedule holders and the results or a statement of the reason market research was not conducted. No additional market research was conducted because it is not practicable. For the reasons discussed in paragraph 4 above, no other company than Thales Australia Limited can provide the required equipment. This procurement shall be announced on betasam.gov. Any other facts supporting the justification. None A statement of the actions, if any, the agency may take to remove or overcome any barriers that led to the restricted consideration before any subsequent acquisition for the supplies or services is made. As stated in paragraph 4 above, Thales Australia Limited is the only company that can provide the required equipment. Signatures Follow. Section C � Specifications � Minimum Requirements for Access to Controlled Unclassified Information (CUI):� Prior to access contractor personnel requiring access to DON controlled unclassified information (CUI) or ""user level access to DON or DoD networks and information systems system security and network defense systems or to system resources providing visual access and/or ability to input delete or otherwise manipulate sensitive information without controls to identify and deny sensitive information"" contractors must have clearance eligibility or submit an Electronic Questionnaire for Investigation Processing (SF 86) to NSWC PCD Security for processing and subsequent adjudication by the DOD Consolidated Adjudications Facility.� � Minimum Protection Requirements for Controlled Unclassified Information: Security classification guides (OPNAVINST 5513 series) and unclassified limited documents (e.g. FOUO Distribution Statement Controlled) are not authorized for public release and therefore cannot be posted on a publicly accessible webserver or transmitted over the Internet unless appropriately encrypted. Controlled Unclassified Information (CUI): Controlled unclassified information (CUI) is official information that requires the application of controls and protective measures for a variety of reasons and has not been approved for public release to include technical information proprietary data information requiring protection under the Privacy Act of 1974 and Government-developed privileged information involving the award of contracts.� CUI is a categorical designation that refers to unclassified information that does not meet the standards for National Security Classification under Executive Order 13526 but is (a) pertinent to the national interest of the United States or to the important interests of entities outside the Federal Government and (b) under law or policy requires protection from unauthorized disclosure special handling safeguards or prescribed limits on exchange or dissemination. � For�Official use Only (FOUO)�is a document designation not a classification.� This designation is used by Department of Defense (DoD) and a number of other federal agencies to identify information or material which although unclassified disclosure to the public of the information would reasonably be expected to cause a foreseeable harm to an interest protected by one or more provisions of the FOIA. This includes information that qualifies for protection pursuant to the provisions of the Privacy Act of 1974 as amended.� FOUO must be marked controlled and safeguarded in accordance with DoD 5200.01 Vol. 4 DoD Information Security Program: Controlled Unclassified Information (CUI) February 24 2012 � Security of Unclassified DoD Information on Non-DoD Information Systems (DoD 8582.01) DoD policy: �adequate security be provided for all unclassified DoD information on non-DoD information systems. �Appropriate requirements shall be incorporated into all contracts grants and other legal agreements with non-DoD entities. Information Safeguards are applicable to unclassified DoD information in the possession or control of non-DoD entities on non-DoD information systems to the extent provided by the applicable contract grant or other legal agreement with the DoD. Information Safeguards � Unclassified DoD information that has not been cleared for public release may be disseminated by the contractor grantee or awardee to the extent required to further the contract grant or agreement objectives provided that the information is disseminated within the scope of assigned� duties and with a clear expectation that confidentiality will be preserved. Examples include: a.� Non-public information provided to a contractor (e.g. with a request for proposal) b.� Information developed during the course of a contract grant or other legal agreement (e.g. draft documents reports or briefings and deliverables) c.� Privileged information contained in transactions (e.g. privileged contract information program schedules contract-related event tracking) It is recognized that adequate security will vary depending on the nature and sensitivity of the information on any given non-DoD information system.� However all unclassified DoD information in the possession or control of non-DoD entities on non-DoD information systems shall minimally be safeguarded as follows: �������� a.� Do not process unclassified DoD information on publically available computers (e.g. those available for use by the general public in kiosks or hotel business centers) �������� b.� Protect unclassified DoD information by at least one physical or electronic barrier (e.g. locked container or room logical authentication or logon procedure) when not under direct individual control of an authorized user. �������� c.� At a minimum overwrite media that have been used to process unclassified DoD information before external release or disposal. �������� d.� Encrypt all information that has been identified as CUI when it is stored on mobile computing devices such as laptops and personal digital assistants compact disks or authorized removable storage media such as thumb drives and compact disks using the best encryption technology available to the contractor or teaming partner. �������� e.� Limit transfer of unclassified DoD information to subcontractors or teaming partners with a need to know and obtain a commitment from them to protect the information they receive to at least the same level of protection as that specified in the contract or other written agreement. �������� f.� Transmit e-mail text messages and similar communications containing unclassified DoD information using technology and processes that provide the best level of privacy available given facilities conditions and environment. Examples of recommended technologies or processes include closed networks virtual private networks public key-enabled encryption and transport layer security (TLS) �������� g.� Encrypt organizational wireless connections and use encrypted wireless connections where available when traveling. If encrypted wireless is not available encrypt document files (e.g. spreadsheet and word processing files) using at least application-provided password protected level encryption. �������� h.� Transmit voice and fax transmissions only when there is a reasonable assurance that access is limited to authorized recipients. �������� i. Do not post unclassified DoD information to website pages that are publicly available or have access limited only by domain or Internet protocol restriction. Such information may be posted to website pages that control access by user identification and password user certificates or other technical means and provide protection via use of TLS or other equivalent technologies during transmission. Access control may be provided by the intranet (vice the website itself or the application it hosts) �������� j.� Provide protection against computer network intrusions and data exfiltration minimally including: ���� (1) Current and regularly updated malware protection services e.g. anti-virus anti-spyware. ���� (2) Monitoring and control of both inbound and outbound network traffic (e.g. at the external boundary sub-networks individual hosts) including blocking unauthorized ingress egress and exfiltration through technologies such as firewalls and router policies intrusion prevention or detection services and host-based security services. ���������� (3) Prompt application of security-relevant software patches service packs and hot fixes. �������� k. �Comply with other current Federal and DoD information protection and reporting requirements for specified categories of information (e.g. medical proprietary critical program information (CPI) personally identifiable information export controlled) as specified in contracts grants and other legal agreements. �������� l. �Report loss or unauthorized disclosure of unclassified DoD information in accordance with contract grant or other legal agreement requirements and mechanisms. �������� m. Do not use external IT services (e.g. e-mail content hosting database document processing) unless they provide at least the same level of protection as that specified in the contract or other written agreement. Operations Security Operations Security (OPSEC) is concerned with the protection of critical information:� facts about intentions capabilities operations or activities that are needed by adversaries or competitors to bring about failure or unacceptable consequences of mission accomplishment. Critical information includes information regarding: �� - Operations missions and exercises test schedules or locations; �� - Location/movement of sensitive information equipment or facilities; �� - Force structure and readiness (e.g. recall rosters); �� - Capabilities vulnerabilities limitations security weaknesses; �� - Intrusions/attacks of DoD networks or information systems; �� - Network (and system) user IDs and passwords; �� - Movements of key personnel or visitors (itineraries agendas etc.); and �� - Security classification of equipment systems operations etc. The contractor subcontractors and their personnel shall employ the following countermeasures to mitigate the susceptibility of critical information to exploitation when applicable: �� - Practice OPSEC and facilitate OPSEC awareness; �� - Immediately retrieve documents from printers assessable by the public; �� - Shred sensitive and Controlled Unclassified Information (CUI) documents when no longer needed; �� - Protect information from personnel without a need-to-know; �� - When promulgating information limit details to that essential for legitimacy; �� - During testing and evaluation practice OPSEC methodologies of staging out of sight desensitization or speed of execution whenever possible. Section F - Deliveries or performance � F.O.B. 52.247-34����������� FOB�Destination Section G 252.232-7003 WAWF 252.232-7006 Wide Area Workflow Payment Instructions � Section I � Contract Clauses � 52.203-18 Prohibition on Contracting with Entities that Require Certain Internal Confidentiality Agreements or Statements--Representation (Jan 2017) 52.204-13 System for Award Management Maintenance JUL 2013 52.204-22 Alternative Line Item Proposal (Jan 2017) 52.204-25 Prohibition on Contracting for Certain Telecommunications and Video Surveillance Services or Equipment (Aug 2019) 52.213-4 Terms and Conditions�Simplified Acquisitions (Other Than Commercial Items) (Oct 2019) 52.225-13 Restrictions on Certain Foreign Purchases 52.232-39 Unenforceability of Unauthorized Obligations (Jun 2013) 52-233-18 Encouraging Contractor Policies to Ban Text Messaging While Driving 52.243-1 Changes Fixed-Price 252.203-7000 Requirements Relating to Compensation of Former DoD Officials (SEP 2011) 252.203-7002 Requirement to Inform Employees of Whistleblower Rights (Sep 2013)� 252.204-7003 Control of Government Work Product (Apr 1992)� 252.204-7009 Limitations on the Use or Disclosure of Third-Party Contractor Reported Cyber Incident Information 252.204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting DEC 2015 252.204-7015 Notice of Authorized Disclosure of Information by Litigation Support (May 2016) 252.204-7019 Notice of NIST SP 800-171 DoD Assessment Requirements (Nov 2020) 252.204-7020 NIST SP 800-171 DoD Assessment Requirements (Nov 2020) 252.211-7003 Item Unique Identification and Valuation (Mar 2016) 252.213-7000 Notice to Prospective Suppliers on Use of SPRS (Sep 2019) 252.225-7013 Duty-Free Entry Apr 2020) 252.225-7048 Export Controlled Items (Jun 2013) 252.232-7010 Levies on Contract Payments (Dec 2006) 252.247-7023 Transportation of Supplies by Sea (Apr 2014) Section K Representations �52.204-8 Annual Representations and Certifications FEB 2016 52.204-19 Incorporation by Reference of Representations and Certifications (Dec 2014) 52.204-24 Representation Regarding Certain Telecommunications and Video Surveillance Services or Equipment. (Aug 2019) 52.204-26 Covered Telecommunications Equipment or Services-Representation (Dec�2019) 52.209-11 Representation by Corporations Regarding Delinquent Tax Liability or a Felony Conviction (Feb 2016) 252.204-7008 Compliance with Safeguarding Covered Defense Information Controls (Oct 2016) Section L - Instructions Conditions and Notices to Bidders �52.204-7 System for Award Management (Jul 2013) 52.211-14 Notice of Priority Rating Section M Evaluation based on FAR 13.106-2, price and past performance that represents the best value to the Government. � �
 
Web Link
SAM.gov Permalink
(https://beta.sam.gov/opp/e4d7bed43ba84b04a7ffb7bd419df190/view)
 
Place of Performance
Address: AUS
Country: AUS
 
Record
SN05917398-F 20210218/210216230104 (samdaily.us)
 
Source
SAM.gov Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's SAM Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.