Loren Data Corp.

'

 
 

COMMERCE BUSINESS DAILY ISSUE OF JUNE 16,2000 PSA#2623

U.S. Army CECOM, CECOM Acquisition Center, Fort Monmouth, NJ 07703-5008

D -- REQUIREMENTS FOR PROGRAM INFORMATION MANAGEMENT DUE 072500 POC Vic Jiranek, 732-532-6858 E-MAIL: The POC can be reached at the followin email address, Victor.Jiranek@iews.monmouth.army.mil. Request for Comment The Program Executive Office for Intelligence, Electronic Warfare and Sensors (PEO IEW&S) at Fort Monmouth, N.J. would like to provide Industry a final opportunity to comment, not later than 25 July 2000, on the attached "Requirements for Program Information Management" before they are adopted by PEO IEW&S for inclusion in all Request for Proposals (RFPs). Industry is encouraged to candidly provide their comments on the practical application and utility of these requirements. In concert with the Army's overall objectives of integrating digital technologies into our business processes and our desire to adopt modern commercial and business practices into the programs that we manage, these requirements have been structured to define the framework from which we and Industry can exchange, manage and use program data in a collaborative environment. The emphasis is on obtaining program insight rather than program oversight and being as non-intrusive on industry's own processes as practical. Request for additional information as well as Industry's comments should be directed to Mr. Victor Jiranek who can be reached at (732) 532-6858, e-mailed at Victor.Jiranek@iews.monmouth.army.mil, or mailed to the following address: PEO IEW&S, Atten: SFAE-IEW&S (Mr. Jiranek), Fort Monmouth, N.J. 07703-5301. Requirements for Program Information Management STATEMENT OF WORK SHARED DATA ENVIRONMENT We are looking to adopt modern commercial and business practices into the programs that we manage. We look not to mandate processes but rather obtain insight into the program by monitoring the contractor's own processes. This requirement will establish the framework from which Government and Industry can exchange, manage and use program information in a collaborative environment so that both parties can execute their respective missions. The contractor shall provide a shared data environment which will be utilized by Working-Level Integrated Product Teams (WIPTs) to obtain the information to execute the program. As defined in this document, information* required to enable government insight and execution of the program shall be provided through this common shared data environment. The WIPT will implement controls to prevent data aggregation, unauthorized access and the control of proprietary data. Classified data will be handled off-line in non-electronic format until technology matures adequately to protect such data. The WIPT will develop work products through a common digital environment to reduce cycle time, cost and paper waste. Government and Industry tools used in the shared data environment will be available to the WIPT members and be Joint Technical Architecture Army (JTA-A) and Controlled Access Protection Profile (CAPP) compliant. *For example purposes only, types of information could encompass data necessary for program execution in the Logistics (Parts Lists, Spares Lists, Provisioning, Training Interactive Electronic Technical Manuals), Programmatics (Earned Value- Cost/Schedule Status, Workflow Management and Scheduling), and Technical (Drawings, Specifications, Production Planning, Production Management, Test Reports and Test Data) areas. SECTION L -- INSTRUCTIONS, CONDITIONS, AND NOTICES TO OFFEROR PROGRAM INFORMATION MANAGEMENT (PIM) SYSTEM DEMONSTRATION. The offeror shall demonstrate the ability to provide the Government with near real time, on-line digital access, and when required upload capability, to all required information and data using its PIM system. This demonstration shall consist of a one-week period in which Government personnel will access the PIM system from their assigned workstations at locations to be determined, using offeror-supplied procedures. The Government personnel will be acquisition managers and functional specialists experienced in acquisition management, but without any special information technology training or experience. Government personnel shall be able to view, handle, print, download, and annotate data to obtain necessary management, engineering and logistical information. Any required software, especially proprietary and, over and above the standard Internet browsers and MS Office Suite applications, shall be provided for the demonstration. SECTION M -- EVALUATION FACTORS PROGRAM INFORMATION MANAGEMENT (PIM) SYSTEM 1. The Government will assess the suitability of the contractor's Program Information Management (PIM) system to obtain the required information and operate in a digital environment. Much of this information had previously been obtained through the delivery of Contract Data Requirements List (CDRL) items and other formal reporting procedures. The assessment will include the evaluation of the system's adequacy for Government personnel to obtain the necessary information and insight for program execution and operation in a digital environment*. The ease with which Government personnel can access the PIM system, obtain, and operate with this system will be assessed. *For illustrative purposes, the type of benchmarks that the government will be using shall include: Digital Operation Features Electronic Delivery of CDRLs No size limit Capability to Handle all project artifact types (drawings, documents, schedules, etc.) Push /Pull methodology Ability to Schedule Meetings On-line Support for Information Exchange (can be any or all of the following) Ability for all team members to upload files Bulletin Boards News Groups Audio Video Conferencing Chat Rooms White board Capability Support for Red-line or Annotation of Documents -- by either multiple versions or markup in place Site Maintenance Cycle time to create accounts (should be < 1 hour) Cycle time to add new content (should be 1 day or less) Configuration Management of Content Disaster Recovery (8 hours or less) Site Security C2 compliant (JTA-A) on the emerging common criteria Evaluated Assurance Level (EAL) level 2 Level and type of encryption used (e.g. 128 bit Public Key encryption or better) Site Architecture -- assess based on ability to protect data May range from Reverse Proxy (most secure) to Open (least secure) Intrusion Detection Virus, Trojan Horse, Worm, etc. detection and prevention Account Procedures Approval chain -- should be project person Frequency of account review (minimum should be monthly for removing old account) Role Based Accounts (e.g. Admin, General, Configuration Management, PM, etc.) Levels of Access by Account (minimum) Role Company classifications DoD classification (unclassified, confidential, secret, top secret, etc.) Export Classification Activity Logging File Accesses Audit logs of required Approvals Posted 06/14/00 (W-SN464557). (0166)

Loren Data Corp. http://www.ld.com (SYN# 0035 20000616\D-0013.SOL)


D - Automatic Data Processing and Telecommunication Services Index Page