Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
SAMDAILY.US - ISSUE OF AUGUST 29, 2021 SAM #7211
SOLICITATION NOTICE

S -- **WOSB SET ASIDE** RESTROOM PUMP OUT SERVICE BASE YEAR PLUS 4 OPTION YEARS

Notice Date
8/27/2021 2:26:14 PM
 
Notice Type
Combined Synopsis/Solicitation
 
NAICS
562998 — All Other Miscellaneous Waste Management Services
 
Contracting Office
NAVAL SURFACE WARFARE CENTER PANAMA CITY BEACH FL 32407-7001 USA
 
ZIP Code
32407-7001
 
Solicitation Number
N61331-21-T-NA08
 
Response Due
9/2/2021 5:00:00 AM
 
Archive Date
09/17/2021
 
Point of Contact
Nicholas Alexander, Phone: 8508676104, Vincent Tomasi, Phone: 8508197308
 
E-Mail Address
nicholas.m.alexander@navy.mil, vincent.j.tomasi.civ@us.navy.mil
(nicholas.m.alexander@navy.mil, vincent.j.tomasi.civ@us.navy.mil)
 
Small Business Set-Aside
WOSB Women-Owned Small Business (WOSB) Program Set-Aside (FAR 19.15)
 
Description
STATEMENT OF WORK FOR RESTROOM TRAILER T2108 MONTHLY PUMP OUT AND MONTHLY CHEMICAL TREATMENT 1.0 SCOPE The Naval Surface Warfare Center Panama City Division (NSWC PCD) has a requirement to pump out restroom trailer (T2108) and provide chemical treatment monthly of the 320 gallon holding tank. It is a Wells Fargo Comfort Elite III restroom trailer and is located at the ROS Shelter on NSA Panama City. This SOW specifies the requirements necessary 2.0 APPLICABLE DOCUMENTS None REQUIREMENTS The Contractor shall pump out the Wells Fargo Comfort Elite III restroom trailer (T2108) located at the ROS Shelter on NSA Panama City and provide chemical treatment monthly. The pumping shall be performed in the last 10 business days of each month. The tank is a 320 gallon holding tank. Travel Requirements None. 4.0 GOVERNMENT FURNISHED PROPERTY (GFP) None 5.0 DATA DELVERABLES None 6.0 PERIOD OF PERFORMANCE The period of performance shall be one base year with four option years. The base year shall be from October 2021 until September 2022. SECURITY This requirement is UNCLASSIFIED. The Contractor will not require access to nor be required to generate classified information to perform the requirement. RELEASE OF INFORMATION Release of information shall be in accordance with Section I, DFARS Clause 252.204-7000, Disclosure of Information. All technical data provided to the contractor by the Government will be protected from public disclosure in accordance with the markings contained thereon. All other information relating to the items to be delivered or services to be performed under this contract may not be disclosed by any means without prior approval of the appropriate NSWC PCD authority. Dissemination or public disclosure includes, but is not limited to, permitting access to such information by foreign nationals or by any other person or entity; publication of technical or scientific papers; advertising; or any other proposed public release. The contractor shall provide adequate physical protection to such information to preclude access by any person or entity not authorized such access by the Government. Controlled Unclassified Information (CUI) Controlled unclassified information (CUI) is official information that requires the application of controls and protective measures for a variety of reasons and has not been approved for public release, to include technical information, proprietary data, information requiring protection under the Privacy Act of 1974, and Government- developed privileged information involving the award of contracts. CUI is a categorical designation that refers to unclassified information that does not meet the standards for National Security Classification under Executive Order 13526, but is (a) pertinent to the national interest of the United States or to the important interests of entities outside the Federal Government, and (b) under law or policy requires protection from unauthorized disclosure, special handling safeguards, or prescribed limits on exchange or dissemination. Minimum Requirements for Access to Controlled Unclassified Information (CUI) Prior to access, Contractor personnel requiring access to Department of the Navy (DoN) controlled unclassified information (CUI) or ""user level access to DoN or DoD networks and information systems, system security and network defense systems, or to system resources providing visual access and/or ability to input, delete or otherwise manipulate sensitive information without controls to identify and deny sensitive information"" contractors must have clearance eligibility, or submit an Electronic Questionnaire for Investigation Processing (SF 86) to NSWC PCD Security for processing and subsequent adjudication by the DoN Central Adjudication Facility. Minimum Protection Requirements for Controlled Unclassified Information Security classification guides and unclassified limited documents (e.g., For Official Use Only (FOUO), Distribution Statement Controlled) are not authorized for public release and, therefore, cannot be posted on a publicly accessible webserver or transmitted over the Internet unless appropriately encrypted. For Official use Only (FOUO) FOUO is a document designation, not a classification. This designation is used by Department of Defense (DoD) and a number of other federal agencies to identify information or material, which although unclassified, disclosure to the public of the information would reasonably be expected to cause a foreseeable harm to an interest protected by one or more provisions of the Freedom of Information Act (FOIA). This includes information that qualifies for protection pursuant to the provisions of the Privacy Act of 1974, as amended. FOUO must be marked, controlled and safeguarded in accordance with DoDM 5200.01, Vol. 4, DoD Information Security Program: Controlled Unclassified Information (CUI), February 24, 2012 Security of Unclassified DoD Information on Non-DoD Information Systems (DoDI 8582.01) DoD Policy Adequate security shall be provided for all unclassified DoD information on non-DoD information systems. Appropriate requirements shall be incorporated into all contracts, grants, and other legal agreements with non-DoD entities. Information Safeguards are applicable to unclassified DoD information in the possession or control of non-DoD entities on non-DoD information systems, to the extent provided by the applicable contract, grant, or other legal agreement with the DoD. Information Safeguards Unclassified DoD information that has not been cleared for public release may be disseminated by the Contractor, grantee, or awardee to the extent required to further the contract, grant, or agreement objectives, provided that the information is disseminated within the scope of assigned duties and with a clear expectation that confidentiality will be preserved. Examples include: Non-public information provided to a Contractor (e.g., with a request for proposal). Information developed during the course of a contract, grant, or other legal agreement (e.g., draft documents, reports, or briefings and deliverables). Privileged information contained in transactions (e.g., privileged contract information, program schedules, contract-related event tracking). It is recognized that adequate security will vary depending on the nature and sensitivity of the information on any given non-DoD information system. However, all unclassified DoD information in the possession or control of non- DoD entities on non-DoD information systems shall minimally be safeguarded as follows: Do not process unclassified DoD information on publically available computers (e.g., those available for use by the general public in kiosks or hotel business centers). Protect unclassified DoD information by at least one physical or electronic barrier (e.g., locked container or room, logical authentication or logon procedure) when not under direct individual control of an authorized user. At a minimum, overwrite media that have been used to process unclassified DoD information before external release or disposal. Encrypt all information that has been identified as CUI when it is stored on mobile computing devices such as laptops and personal digital assistants, compact disks, or authorized removable storage media such as thumb drives and compact disks, using the best encryption technology available to the Contractor or teaming partner. Limit transfer of unclassified DoD information to subcontractors or teaming partners with a need to know and obtain a commitment from them to protect the information they receive to at least the same level of protection as that specified in the contract or other written agreement. Transmit e-mail, text messages, and similar communications containing unclassified DoD information using technology and processes that provide the best level of privacy available, given facilities, conditions, and environment. Examples of recommended technologies or processes include closed networks, virtual private networks, public key-enabled encryption, and transport layer security. Encrypt organizational wireless connections and use encrypted wireless connections where available when traveling. If encrypted wireless is not available, encrypt document files (e.g., spreadsheet and word processing files), using at least application-provided password protected level encryption. Transmit voice and fax transmissions only when there is a reasonable assurance that access is limited to authorized recipients. Do not post unclassified DoD information to website pages that are publicly available or have access limited only by domain or Internet protocol restriction. Such information may be posted to website pages that control access by user identification and password, user certificates, or other technical means and provide protection via use of transport layer security or other equivalent technologies during transmission. Access control may be provided by the intranet (vice the website itself or the application it hosts). Provide protection against computer network intrusions and data exfiltration, minimally including: Current and regularly updated malware protection services, e.g., anti-virus, anti-spyware. Monitoring and control of both inbound and outbound network traffic (e.g., at the external boundary, sub-networks, individual hosts), including blocking unauthorized ingress, egress, and exfiltration through technologies such as firewalls and router policies, intrusion prevention or detection services, and host-based security services. Prompt application of security-relevant software patches, service packs, and hot fixes. Comply with other current Federal and DoD information protection and reporting requirements for specified categories of information (e.g., medical, proprietary, Critical Program Information (CPI), personally identifiable information, export controlled) as specified in contracts, grants, and other legal agreements. Report loss or unauthorized disclosure of unclassified DoD information in accordance with contract, grant, or other legal agreement requirements and mechanisms. Do not use external IT services (e.g., e-mail, content hosting, database, document processing) unless they provide at least the same level of protection as that specified in the contract or other written agreement. Operations Security Operations Security (OPSEC) is concerned with the protection of critical information: facts about intentions, capabilities, operations, or activities that are needed by adversaries or competitors to bring about failure or unacceptable consequences of mission accomplishment. Critical information includes information regarding: Operations, missions, and exercises, test schedules or locations; Location/movement of sensitive information, equipment, or facilities; Force structure and readiness (e.g., recall rosters); Capabilities, vulnerabilities, limitations, security weaknesses; Intrusions/attacks of DoD networks or information systems; Network (and system) user identifications and passwords; Movements of key personnel or visitors (itineraries, agendas, etc.); and Security classification of equipment, systems, operations, etc. The Contractor, subcontractors and their personnel shall employ the following countermeasures to mitigate the susceptibility of critical information to exploitation, when applicable: Practice OPSEC and facilitate OPSEC awareness; Immediately retrieve documents from printers assessable by the public; Shred sensitive and Controlled Unclassified Information (CUI) documents when no longer needed; Protect information from personnel without a need-to-know; When promulgating information, limit details to that essential for legitimacy; During testing and evaluation, practice OPSEC methodologies of staging out of sight, desensitization, or speed of execution, whenever possible. 8.0 DISTRIBUTION LIMITATION STATEMENT Technical Documents generated under this contract shall carry the following Distribution Limitation Statements. Word-processing/CAD files shall have the statements included in the file such that the first page of any resultant hard copy shall display the statements. For drawings, the statements shall be as near to the title block as possible without obscuring any detail of the drawing. Additionally, each diskette delivered shall be marked externally with the statements. DISTRIBUTION AUTHORIZED TO U.S. GOVERNMENT AGENCIES ONLY; ADMINISTRATIVE/OPERATIONAL USE (CONTRACTOR INSERT DATE STATEMENT APPLIED). OTHER REQUESTS FOR THIS DOCUMENT SHALL BE REFERRED TO: COMMANDER OFFICER, NAVAL WARFARE CENTER PANAMA CITY DIVISION, ATTN: CODE 1061, 110 VERNON AVENUE, PANAMA CITY, FL 32407-7001. DESTRUCTION NOTICE - For Unclassified, Limited Documents, destroy by any method that will prevent disclosure of contents or reconstruction of the document. Section C � Specifications Minimum Requirements for Access to Controlled Unclassified Information (CUI):� Prior to access contractor personnel requiring access to DON controlled unclassified information (CUI) or ""user level access to DON or DoD networks and information systems system security and network defense systems or to system resources providing visual access and/or ability to input delete or otherwise manipulate sensitive information without controls to identify and deny sensitive information"" contractors must have clearance eligibility or submit an Electronic Questionnaire for Investigation Processing (SF 86) to NSWC PCD Security for processing and subsequent adjudication by the DOD Consolidated Adjudications Facility.� Minimum Protection Requirements for Controlled Unclassified Information: Security classification guides (OPNAVINST 5513 series) and unclassified limited documents (e.g. FOUO Distribution Statement Controlled) are not authorized for public release and therefore cannot be posted on a publicly accessible webserver or transmitted over the Internet unless appropriately encrypted. Controlled Unclassified Information (CUI): Controlled unclassified information (CUI) is official information that requires the application of controls and protective measures for a variety of reasons and has not been approved for public release to include technical information proprietary data information requiring protection under the Privacy Act of 1974 and Government-developed privileged information involving the award of contracts.� CUI is a categorical designation that refers to unclassified information that does not meet the standards for National Security Classification under Executive Order 13526 but is (a) pertinent to the national interest of the United States or to the important interests of entities outside the Federal Government and (b) under law or policy requires protection from unauthorized disclosure special handling safeguards or prescribed limits on exchange or dissemination. For�Official use Only (FOUO)�is a document designation not a classification.� This designation is used by Department of Defense (DoD) and a number of other federal agencies to identify information or material which although unclassified disclosure to the public of the information would reasonably be expected to cause a foreseeable harm to an interest protected by one or more provisions of the FOIA. This includes information that qualifies for protection pursuant to the provisions of the Privacy Act of 1974 as amended.� FOUO must be marked controlled and safeguarded in accordance with DoD 5200.01 Vol. 4 DoD Information Security Program: Controlled Unclassified Information (CUI) February 24 2012 Security of Unclassified DoD Information on Non-DoD Information Systems (DoD 8582.01) DoD policy: �adequate security be provided for all unclassified DoD information on non-DoD information systems. �Appropriate requirements shall be incorporated into all contracts grants and other legal agreements with non-DoD entities. Information Safeguards are applicable to unclassified DoD information in the possession or control of non-DoD entities on non-DoD information systems to the extent provided by the applicable contract grant or other legal agreement with the DoD. Information Safeguards � Unclassified DoD information that has not been cleared for public release may be disseminated by the contractor grantee or awardee to the extent required to further the contract grant or agreement objectives provided that the information is disseminated within the scope of assigned� duties and with a clear expectation that confidentiality will be preserved. Examples include: a.� Non-public information provided to a contractor (e.g. with a request for proposal) b.� Information developed during the course of a contract grant or other legal agreement (e.g. draft documents reports or briefings and deliverables) c.� Privileged information contained in transactions (e.g. privileged contract information program schedules contract-related event tracking) It is recognized that adequate security will vary depending on the nature and sensitivity of the information on any given non-DoD information system.� However all unclassified DoD information in the possession or control of non-DoD entities on non-DoD information systems shall minimally be safeguarded as follows: �������� a.� Do not process unclassified DoD information on publically available computers (e.g. those available for use by the general public in kiosks or hotel business centers) �������� b.� Protect unclassified DoD information by at least one physical or electronic barrier (e.g. locked container or room logical authentication or logon procedure) when not under direct individual control of an authorized user. �������� c.� At a minimum overwrite media that have been used to process unclassified DoD information before external release or disposal. �������� d.� Encrypt all information that has been identified as CUI when it is stored on mobile computing devices such as laptops and personal digital assistants compact disks or authorized removable storage media such as thumb drives and compact disks using the best encryption technology available to the contractor or teaming partner. �������� e.� Limit transfer of unclassified DoD information to subcontractors or teaming partners with a need to know and obtain a commitment from them to protect the information they receive to at least the same level of protection as that specified in the contract or other written agreement. �������� f.� Transmit e-mail text messages and similar communications containing unclassified DoD information using technology and processes that provide the best level of privacy available given facilities conditions and environment. Examples of recommended technologies or processes include closed networks virtual private networks public key-enabled encryption and transport layer security (TLS) �������� g.� Encrypt organizational wireless connections and use encrypted wireless connections where available when traveling. If encrypted wireless is not available encrypt document files (e.g. spreadsheet and word processing files) using at least application-provided password protected level encryption. �������� h.� Transmit voice and fax transmissions only when there is a reasonable assurance that access is limited to authorized recipients. �������� i. Do not post unclassified DoD information to website pages that are publicly available or have access limited only by domain or Internet protocol restriction. Such information may be posted to website pages that control access by user identification and password user certificates or other technical means and provide protection via use of TLS or other equivalent technologies during transmission. Access control may be provided by the intranet (vice the website itself or the application it hosts) �������� j.� Provide protection against computer network intrusions and data exfiltration minimally including: ���� (1) Current and regularly updated malware protection services e.g. anti-virus anti-spyware. ���� (2) Monitoring and control of both inbound and outbound network traffic (e.g. at the external boundary sub-networks individual hosts) including blocking unauthorized ingress egress and exfiltration through technologies such as firewalls and router policies intrusion prevention or detection services and host-based security services. ���������� (3) Prompt application of security-relevant software patches service packs and hot fixes. �������� k. �Comply with other current Federal and DoD information protection and reporting requirements for specified categories of information (e.g. medical proprietary critical program information (CPI) personally identifiable information export controlled) as specified in contracts grants and other legal agreements. �������� l. �Report loss or unauthorized disclosure of unclassified DoD information in accordance with contract grant or other legal agreement requirements and mechanisms. �������� m. Do not use external IT services (e.g. e-mail content hosting database document processing) unless they provide at least the same level of protection as that specified in the contract or other written agreement. Operations Security Operations Security (OPSEC) is concerned with the protection of critical information:� facts about intentions capabilities operations or activities that are needed by adversaries or competitors to bring about failure or unacceptable consequences of mission accomplishment. Critical information includes information regarding: �� - Operations missions and exercises test schedules or locations; �� - Location/movement of sensitive information equipment or facilities; �� - Force structure and readiness (e.g. recall rosters); �� - Capabilities vulnerabilities limitations security weaknesses; �� - Intrusions/attacks of DoD networks or information systems; �� - Network (and system) user IDs and passwords; �� - Movements of key personnel or visitors (itineraries agendas etc.); and �� - Security classification of equipment systems operations etc. The contractor subcontractors and their personnel shall employ the following countermeasures to mitigate the susceptibility of critical information to exploitation when applicable: �� - Practice OPSEC and facilitate OPSEC awareness; �� - Immediately retrieve documents from printers assessable by the public; �� - Shred sensitive and Controlled Unclassified Information (CUI) documents when no longer needed; �� - Protect information from personnel without a need-to-know; �� - When promulgating information limit details to that essential for legitimacy; �� - During testing and evaluation practice OPSEC methodologies of staging out of sight desensitization or speed of execution whenever possible. Section F - Deliveries or performance F.O.B. 52.247-29 FOB Destination Section G � 252.232-7003 Electronic Submission of Payment Requests and Receiving Reports (Dec 2018) 252.232-7006 Wide Area Workflow Payment Instructions Section I � Contract Clauses 52.203-12 Limitation on Payments to Influence Certain Federal Transactions (Oct 2010) 52.204-25 Prohibition on Contracting for Certain Telecommunications and Video Surveillance Services or Equipment.(Aug 2020) 52.204-13 System for Award Management Maintenance (Oct 2018) 52.204-19 Incorporation by Reference of Representations and Certifications (Dec 2014) 52.209-6 Protecting the Government�s Interest When Subcontracting with Contractors Debarred, Suspended, or Proposed for Debarment (Oct 2015) 52.212-4 Contract Terms and Conditions -- Commercial Items (Oct 2018) 52.212-5 Contract Terms and Conditions Required to Implement Statutes or Executive Orders -- Commercial Items (Mar 2020) Preselected: 52.203-19 Prohibition on Requiring Certain Internal Confidentiality Agreements or Statement (Jan 2017) 52.209-10 Prohibition on Contracting with Inverted Domestic Corporations (Nov 2015) 52.233-3 Protest After Award (Aug 1996) 52.233-4 Applicable Law for Breach of Contract Claim (Oct 2004) Select as Applicable for Set Aside Type: 52.219-6� Notice of Total Small Business Set-Aside (Mar 2020) Required: 52.222-50 Combatting Trafficking in Persons (Mar 2015) 52.223-18 Encouraging Contractor Policies to Ban Text Messaging While Driving (Aug 2011)� 52.232-33 Payment by Electronic Funds Transfer--System for Award Management JUL 2013 52.222-53 Exemption From Application Of The Service Contract Labor Standards To Contracts For Certain Services--Requirements (May 2014) 52.217-7 Option for Increased Quantity-Separately Priced Line Item (Mar 1989) 52.217-8 Option to Extend Services (Nov 1999) 52.217-9 Option to Extend the Term of the Contract (Mar 2000) 52.232-39 Unenforceability of Unauthorized Obligations (Jun 2013) 52.232-40 Providing Accelerated Payments to Small Business Subcontractors (Dec 2013)� 52.243-1 Changes Fixed-Price 52.246-4 Inspection of Services 252.203-7000 Requirements Relating to Compensation of Former DoD Officials (SEP 2011) 252.203-7002 Requirement to Inform Employees of Whistleblower Rights (Sep 2013)� 252.204-7003 Control of Government Work Product (Apr 1992) 252.204-7009 Limitations on the Use or Disclosure of Third-Party Contractor Reported Cyber Incident Information 252.204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting (Oct 2016) 252.204-7015 Notice of Authorized Disclosure of Information by Litigation Support (May 2016) 252.204-7019 Notice of NIST SP 800-171 DoD Assessment Requirements (Nov 2020) 252.204-7020 NIST SP 800-171 DoD Assessment Requirements (Nov 2020) 252.225-7048 Export Controlled Items (Jun 2013) 252.232-7010 Levies on Contract Payments (Dec 2006) 252.247-7023 Transportation of Supplies by Sea (Apr 2014) 252.246-7007 Contractor Counterfeit Electronic Part Detection and Avoidance System 252.246-7008 Sources of Electronic Parts 252.215-7013 Supplies and Services Provided by Nontraditional Defense Contractors. (Jan 2018 52.252-1-Solicitation Provisions Incorporated by Reference (Feb 1998) 52.252-2-Clauses Incorporated by Reference (Feb 1998) Section K � Representations 2.203-18 Prohibition on Contracting with Entities that Require Certain Internal Confidentiality Agreements or Statements--Representation (Jan 2017) 52.204-19 Incorporation by Reference of Representations and Certifications (Dec 2014) 52.204-24 Representation Regarding Certain Telecommunications and Video Surveillance Services or Equipment.(Oct 2020) 52.204-26 Covered Telecommunications Equipment or Services-Representation (Oct 2020) 52.209-11 Representation by Corporations Regarding Delinquent Tax Liability or a Felony Conviction (Feb 2016) 52.212-3 Alt 1 Offeror Representations and Certifications-Commercial Items (Mar�2020) 252.204-7008 Compliance with Safeguarding Covered Defense Information Controls (Oct 2016) 252.222-52� Exemption from Service Contract Labor Standards Section L - Instructions Conditions and Notices to Bidders 52.212-1 Instructions to Offerors�Commercial Items (Mar 2020) 52.204-7 System for Award Management (Jul 2013 52.204-13 System for Award Management Maintenance JUL 2013 52.204-22 Alternative Line Item Proposal (Jan 2017) 52.211-14 Notice of Priority Rating 52.217-5 Evaluation of Options (July 1990) 252.213-7000 Notice to Prospective Suppliers on Use of Supplier Performance Risk System in Past Performance Evaluations (Mar 2018) Section M � Evaluation Factors for Award 52.212-2 Evaluation Commercial Items FAR Part 13 Best value, SPRS past performance ratings, price and delivery terms G-232-H005 SUPPLEMENTAL INSTRUCTIONS REGARDING INVOICING (NAVSEA) (JAN 2019) (a)� For other than firm fixed priced contract line item numbers (CLINs), the Contractor agrees to segregate costs incurred under this contract/task order (TO), as applicable, at the lowest level of performance, either at the sub line item number (SLIN) or CLIN level, rather than at the total contract/TO level, and to submit invoices reflecting costs incurred at that level.� Supporting documentation in Wide Area Workflow (WAWF) for invoices shall include summaries of work charged during the period covered as well as overall cumulative summaries by individual labor categories, rates, and hours (both straight time and overtime) invoiced; as well as, a cost breakdown of other direct costs (ODCs), materials, and travel, by technical instruction (TI), SLIN, or CLIN level.� For other than firm fixed price subcontracts, subcontractors are also required to provide labor categories, rates, and hours (both straight time and overtime) invoiced; as well as, a cost breakdown of ODCs, materials, and travel invoiced.� Supporting documentation may be encrypted before submission to the prime contractor for WAWF invoice submittal.� Subcontractors may email encryption code information directly to the Contracting Officer and Contracting Officer Representative (COR).� Should the subcontractor lack encryption capability, the subcontractor may also email detailed supporting cost information directly to the Contracting Officer and COR; or other method as agreed to by the Contracting Officer. (b)� Contractors submitting payment requests and receiving reports to WAWF using either Electronic Data Interchange (EDI) or Secure File Transfer Protocol (SFTP) shall separately send an email notification to the COR and Contracting Officer on the same date they submit the invoice in WAWF.� No payments shall be due if the contractor does not provide the COR and Contracting Officer email notification as required herein. (End of Text) G-242-H001 GOVERNMENT CONTRACT ADMINISTRATION POINTS-OF-CONTACT AND RESPONSIBILITIES (NAVSEA) (OCT 2018) (a)� The Government reserves the right to administratively substitute any of the points of contact listed below at any time. (b)� The contracting officer is the only person authorized to change this contract or orders issued thereunder.� The Contractor shall not comply with any order, direction or request of Government personnel - that would constitute a change - unless it is issued inwriting and signed by the Contracting Officer or is pursuant to specific authority otherwise included as part of this contract. If, in the opinion of the contractor, an effort outside the existing scope of this contract is requested, the contractor shall promptly comply with the Notification of Changes clause of this contract. (c)� The points of contact are as follows: (i)� The Procuring Contracting Officer (PCO) is: ������ See page 1, Block 24 � �(ii)� The Contract Specialist is: Name:� Nicholas Alexander ������ E-mail: Nicholas.m.alexander@navy.mil ������ Phone: 850-867-6104 The Administrative Contracting Officer (ACO) is: Not Applicable (d)� The Contracting Officer�s Representative (COR) is the contracting officer�s appointed representative for technical matters.� The COR is not a contracting officer and does not have the authority to direct the accomplishment of effort which is beyond the scope of the contract or to otherwise change any contract requirements.� An informational copy of the COR appointment letter, which provides a delineation of COR authority and responsibilities, will be provided upon award of this contract. The Contracting Officer�s Representative (COR)� is: Not Applicable (e)� The Alternate Contracting Officer�s Representative (ACOR) is responsible for COR responsibilities and functions in the event that the COR is unavailable due to leave, illness, or other official business.� The ACOR is appointed by the contracting officer; a copy of the ACOR appointment will be provided upon award of this contract. The Alternate Contracting Officer�s Representative (ACOR) is: Not Applicable � (f)� The Technical Point of Contact (TPOC) is the contracting officer�s representative for technical matters when a COR is not appointed.� The TPOC is responsible for technical issues of contract administration, such as providing all items of Government Furnished Information (GFI), Government Furnished Material (GFM) and Government Furnished Equipment (GFE) if specified i...
 
Web Link
SAM.gov Permalink
(https://beta.sam.gov/opp/5b792c586ee640d3bae89535a35d7b83/view)
 
Place of Performance
Address: Panama City Beach, FL 32407, USA
Zip Code: 32407
Country: USA
 
Record
SN06114270-F 20210829/210827230120 (samdaily.us)
 
Source
SAM.gov Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's SAM Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  Jenny in Wanderland!  © 1994-2024, Loren Data Corp.