|
COMMERCE BUSINESS DAILY ISSUE OF JUNE 16,2000 PSA#2623U.S. Army CECOM, CECOM Acquisition Center, Fort Monmouth, NJ
07703-5008 D -- REQUIREMENTS FOR PROGRAM INFORMATION MANAGEMENT DUE 072500 POC
Vic Jiranek, 732-532-6858 E-MAIL: The POC can be reached at the
followin email address, Victor.Jiranek@iews.monmouth.army.mil. Request
for Comment The Program Executive Office for Intelligence, Electronic
Warfare and Sensors (PEO IEW&S) at Fort Monmouth, N.J. would like to
provide Industry a final opportunity to comment, not later than 25 July
2000, on the attached "Requirements for Program Information Management"
before they are adopted by PEO IEW&S for inclusion in all Request for
Proposals (RFPs). Industry is encouraged to candidly provide their
comments on the practical application and utility of these
requirements. In concert with the Army's overall objectives of
integrating digital technologies into our business processes and our
desire to adopt modern commercial and business practices into the
programs that we manage, these requirements have been structured to
define the framework from which we and Industry can exchange, manage
and use program data in a collaborative environment. The emphasis is on
obtaining program insight rather than program oversight and being as
non-intrusive on industry's own processes as practical. Request for
additional information as well as Industry's comments should be
directed to Mr. Victor Jiranek who can be reached at (732) 532-6858,
e-mailed at Victor.Jiranek@iews.monmouth.army.mil, or mailed to the
following address: PEO IEW&S, Atten: SFAE-IEW&S (Mr. Jiranek), Fort
Monmouth, N.J. 07703-5301. Requirements for Program Information
Management STATEMENT OF WORK SHARED DATA ENVIRONMENT We are looking to
adopt modern commercial and business practices into the programs that
we manage. We look not to mandate processes but rather obtain insight
into the program by monitoring the contractor's own processes. This
requirement will establish the framework from which Government and
Industry can exchange, manage and use program information in a
collaborative environment so that both parties can execute their
respective missions. The contractor shall provide a shared data
environment which will be utilized by Working-Level Integrated Product
Teams (WIPTs) to obtain the information to execute the program. As
defined in this document, information* required to enable government
insight and execution of the program shall be provided through this
common shared data environment. The WIPT will implement controls to
prevent data aggregation, unauthorized access and the control of
proprietary data. Classified data will be handled off-line in
non-electronic format until technology matures adequately to protect
such data. The WIPT will develop work products through a common digital
environment to reduce cycle time, cost and paper waste. Government and
Industry tools used in the shared data environment will be available
to the WIPT members and be Joint Technical Architecture Army (JTA-A)
and Controlled Access Protection Profile (CAPP) compliant. *For example
purposes only, types of information could encompass data necessary for
program execution in the Logistics (Parts Lists, Spares Lists,
Provisioning, Training Interactive Electronic Technical Manuals),
Programmatics (Earned Value- Cost/Schedule Status, Workflow Management
and Scheduling), and Technical (Drawings, Specifications, Production
Planning, Production Management, Test Reports and Test Data) areas.
SECTION L -- INSTRUCTIONS, CONDITIONS, AND NOTICES TO OFFEROR PROGRAM
INFORMATION MANAGEMENT (PIM) SYSTEM DEMONSTRATION. The offeror shall
demonstrate the ability to provide the Government with near real time,
on-line digital access, and when required upload capability, to all
required information and data using its PIM system. This demonstration
shall consist of a one-week period in which Government personnel will
access the PIM system from their assigned workstations at locations to
be determined, using offeror-supplied procedures. The Government
personnel will be acquisition managers and functional specialists
experienced in acquisition management, but without any special
information technology training or experience. Government personnel
shall be able to view, handle, print, download, and annotate data to
obtain necessary management, engineering and logistical information.
Any required software, especially proprietary and, over and above the
standard Internet browsers and MS Office Suite applications, shall be
provided for the demonstration. SECTION M -- EVALUATION FACTORS PROGRAM
INFORMATION MANAGEMENT (PIM) SYSTEM 1. The Government will assess the
suitability of the contractor's Program Information Management (PIM)
system to obtain the required information and operate in a digital
environment. Much of this information had previously been obtained
through the delivery of Contract Data Requirements List (CDRL) items
and other formal reporting procedures. The assessment will include the
evaluation of the system's adequacy for Government personnel to obtain
the necessary information and insight for program execution and
operation in a digital environment*. The ease with which Government
personnel can access the PIM system, obtain, and operate with this
system will be assessed. *For illustrative purposes, the type of
benchmarks that the government will be using shall include: Digital
Operation Features Electronic Delivery of CDRLs No size limit
Capability to Handle all project artifact types (drawings, documents,
schedules, etc.) Push /Pull methodology Ability to Schedule Meetings
On-line Support for Information Exchange (can be any or all of the
following) Ability for all team members to upload files Bulletin Boards
News Groups Audio Video Conferencing Chat Rooms White board Capability
Support for Red-line or Annotation of Documents -- by either multiple
versions or markup in place Site Maintenance Cycle time to create
accounts (should be < 1 hour) Cycle time to add new content (should
be 1 day or less) Configuration Management of Content Disaster
Recovery (8 hours or less) Site Security C2 compliant (JTA-A) on the
emerging common criteria Evaluated Assurance Level (EAL) level 2 Level
and type of encryption used (e.g. 128 bit Public Key encryption or
better) Site Architecture -- assess based on ability to protect data
May range from Reverse Proxy (most secure) to Open (least secure)
Intrusion Detection Virus, Trojan Horse, Worm, etc. detection and
prevention Account Procedures Approval chain -- should be project
person Frequency of account review (minimum should be monthly for
removing old account) Role Based Accounts (e.g. Admin, General,
Configuration Management, PM, etc.) Levels of Access by Account
(minimum) Role Company classifications DoD classification
(unclassified, confidential, secret, top secret, etc.) Export
Classification Activity Logging File Accesses Audit logs of required
Approvals Posted 06/14/00 (W-SN464557). (0166) Loren Data Corp. http://www.ld.com (SYN# 0035 20000616\D-0013.SOL)
D - Automatic Data Processing and Telecommunication Services Index Page
|
|