United States Agency for International Development Acquisition Regulation (AIDAR): Security and Information Technology Requirements, 10469-10475 [2019-04654]
Download as PDF
Federal Register / Vol. 84, No. 55 / Thursday, March 21, 2019 / Proposed Rules
6. Comprehensive Emissions Inventory
for the St. Louis Area
As discussed above, section 172(c)(3)
of the CAA requires areas to submit a
comprehensive emissions inventory
including direct PM and all four
precursors (SO2, NOX, VOCs, and
ammonia). Actual emissions contained
in the submittal cover the general source
categories of point sources, area sources,
onroad mobile sources, and nonroad
mobile sources for the base attainment
year of 2008.
For this reason, EPA proposes to
approve the emissions inventory as
complete and accurate, and meets the
requirement of CAA section 172(c)(3).
V. What are the effects of EPA’s
actions?
EPA is proposing to change the
official designation of the St. Louis area
for the 1997 annual PM2.5 NAAQS,
found at 40 CFR part 81, from
nonattainment to attainment. EPA is
proposing to determine that the St.
Louis area has attained the 1997 annual
PM2.5 standard, based on the most
recent three years of certified air quality
data. This action also proposes to
approve the maintenance plan for the
1997 annual PM2.5 NAAQS as revisions
to the Illinois SIP for the St. Louis area.
Also, the EPA proposes to approve the
2008 emissions inventory for the St.
Louis area as well as the 2008 and 2030
MVEBs for the St. Louis area. These
MVEBs will be used in future
transportation conformity analyses for
the area.
In addition, if finalized, according to
the Fine Particulate Matter National
Ambient Air Quality Standards: State
Implementation Plan Requirements (81
FR 58009, August 24, 2016), ‘‘for an area
that is redesignated to attainment after
the effective date of this final rule, the
1997 primary annual PM2.5 NAAQS will
be revoked in such an area on the
effective date of its redesignation to
attainment for that NAAQS. After
revocation of the 1997 primary annual
PM2.5 NAAQS in a given area, the
designation for that standard is no
longer in effect.’’
amozie on DSK9F9SC42PROD with PROPOSALS
VI. Statutory and Executive Order
Reviews
Under the CAA, redesignation of an
area to attainment and the
accompanying approval of the
maintenance plan under CAA section
107(d)(3)(E) are actions that affect the
status of a geographical area and do not
impose any additional regulatory
requirements on sources beyond those
required by state law. A redesignation to
attainment does not in and of itself
VerDate Sep<11>2014
17:18 Mar 20, 2019
Jkt 247001
impose any new requirements, but
rather results in the application of
requirements contained in the CAA for
areas that have been redesignated to
attainment. Moreover, the Administrator
is required to approve a SIP submission
that complies with the provisions of the
Act and applicable Federal regulations.
42 U.S.C. 7410(k); 40 CFR 52.02(a).
Thus, in reviewing SIP submissions,
EPA’s role is to approve state choices,
provided that they meet the criteria of
the CAA. Accordingly, this action
merely approves state law as meeting
Federal requirements and does not
impose additional requirements beyond
those imposed by state law. For these
reasons, these actions:
• Is not a significant regulatory action
subject to review by the Office of
Management and Budget under
Executive Orders 12866 (58 FR 51735,
October 4, 1993) and 13563 (76 FR 3821,
January 21, 2011);
• Is not an Executive Order 13771 (82
FR 9339, February 2, 2017) regulatory
action because SIP approvals are
exempted under Executive Order 12866;
• Does not impose an information
collection burden under the provisions
of the Paperwork Reduction Act (44
U.S.C. 3501 et seq.);
• Is certified as not having a
significant economic impact on a
substantial number of small entities
under the Regulatory Flexibility Act (5
U.S.C. 601 et seq.);
• Does not contain any unfunded
mandate or significantly or uniquely
affect small governments, as described
in the Unfunded Mandates Reform Act
of 1995 (Pub. L. 104–4);
• Does not have Federalism
implications as specified in Executive
Order 13132 (64 FR 43255, August 10,
1999);
• Is not an economically significant
regulatory action based on health or
safety risks subject to Executive Order
13045 (62 FR 19885, April 23, 1997);
• Is not a significant regulatory action
subject to Executive Order 13211 (66 FR
28355, May 22, 2001);
• Is not subject to requirements of
Section 12(d) of the National
Technology Transfer and Advancement
Act of 1995 (15 U.S.C. 272 note) because
application of those requirements would
be inconsistent with the CAA; and
• Does not provide EPA with the
discretionary authority to address, as
appropriate, disproportionate human
health or environmental effects, using
practicable and legally permissible
methods, under Executive Order 12898
(59 FR 7629, February 16, 1994).
In addition, the SIP is not approved
to apply on any Indian reservation land
or in any other area where EPA or an
PO 00000
Frm 00031
Fmt 4702
Sfmt 4702
10469
Indian tribe has demonstrated that a
tribe has jurisdiction. In those areas of
Indian country, the rule does not have
tribal implications and will not impose
substantial direct costs on tribal
governments or preempt tribal law as
specified by Executive Order 13175 (65
FR 67249, November 9, 2000).
List of Subjects
40 CFR Part 52
Environmental protection, Air
pollution control, Incorporation by
reference, Intergovernmental relations,
Nitrogen dioxide, Particulate matter,
Sulfur oxides.
40 CFR Part 81
Environmental protection, Air
pollution control, National parks,
Wilderness areas.
Dated: March 11, 2019.
Cheryl L. Newton,
Acting Regional Administrator, Region 5.
[FR Doc. 2019–05285 Filed 3–20–19; 8:45 am]
BILLING CODE 6560–50–P
AGENCY FOR INTERNATIONAL
DEVELOPMENT
48 CFR Parts 739 and 752
[0412–AA87]
United States Agency for International
Development Acquisition Regulation
(AIDAR): Security and Information
Technology Requirements
U.S. Agency for International
Development.
ACTION: Proposed rule.
AGENCY:
The U.S. Agency for
International Development (USAID)
seeks public comment on a proposed
rule that would amend the USAID
Acquisition Regulation (AIDAR) to
incorporate a revised definition of
information technology and other
requirements relating to information
security and information technology
approvals. The Federal Information
Technology Acquisition Reform Act
requires improved management of the
acquisition of Information technology
resources. This proposed rule revising
the AIDAR, if adopted, would provide
increased oversight of contractor
acquisition and use of information
technology resources.
DATES: Comments must be received no
later than May 20, 2019.
ADDRESSES: Address all comments
concerning this notice to Carol Ketrick,
Bureau for Management, Office of
Acquisition and Assistance, Policy
SUMMARY:
E:\FR\FM\21MRP1.SGM
21MRP1
10470
Federal Register / Vol. 84, No. 55 / Thursday, March 21, 2019 / Proposed Rules
Division (M/OAA/P), Room 867F, SA–
44, Washington, DC 20523–2052.
Submit comments, identified by title of
the action and Regulatory Information
Number (RIN) by any of the following
methods:
1. Through the Federal eRulemaking
Portal at https://www.regulations.gov by
following the instructions for submitting
comments.
2. By Mail addressed to: USAID,
Bureau for Management, Office of
Acquisition & Assistance, Policy
Division, Room 867–F, SA–44,
Washington, DC 20523–2052.
Comments on the information
collection request under Section E,
Paperwork Reduction Act must be
submitted to both USAID and OMB/
OIRA as follows:
USAID—Carol Ketrick at cketrick@
usaid.gov.
OMB/OIRA—email to oira_
submission@omb.eop.gov, fax to (202)
395–6974, or mail to the Office of
Information and Regulatory Affairs,
Office of Management and Budget, 725
17th Street NW, Washington, DC 20503.
FOR FURTHER INFORMATION CONTACT:
Carol Ketrick, Telephone: 202–567–
4676 or email: cketrick@usaid.gov.
SUPPLEMENTARY INFORMATION:
amozie on DSK9F9SC42PROD with PROPOSALS
A. Instructions
All comments must be in writing and
submitted through one of the methods
specified in the Addresses section
above. All submissions (and
attachments) must include the title of
the action and RIN for this rulemaking.
Please include your name, title,
organization, postal address, telephone
number, and email address in the text
of the message.
Please note that USAID recommends
sending all comments to the Federal
eRulemaking Portal because security
screening precautions have slowed the
delivery and dependability of surface
mail to USAID/Washington.
All comments will be made available
at https://www.regulations.gov for public
review without change, including any
personal information provided. We
recommend that you do not submit
information that you consider
Confidential Business Information (CBI)
or any information that is otherwise
protected from disclosure by statute.
USAID will only address comments
that explain why this proposed rule
would be inappropriate, ineffective, or
unacceptable without a change.
Comments that are insubstantial or
outside the scope of the rule may not be
considered.
VerDate Sep<11>2014
17:18 Mar 20, 2019
Jkt 247001
B. Background
On September 5, 2014, the Office of
Management and Budget (OMB) and the
National Security Council (NSC)
convened a President’s Management
Council, with one of the focus areas
being improvement of cybersecurity in
Federal acquisitions, in particular,
accountability of contractors providing
IT systems and services to the Federal
government.
Accordingly, USAID is taking steps to
address information security for
information and information systems
that support the operations and assets of
the agency, including those managed by
contractors. The new requirements will
strengthen protections of Agency
information systems/facilities.
Following the cybersecurity review
directed by OMB ‘‘Follow-Up to
President’s Management Council
Cybersecurity Meeting, September 5,
2014’’, which was completed by the
agency Office of the Chief of
Information Officer (CIO) in October
2014, a revised clause 752.204–72
Access to USAID facilities and USAID’s
Information Systems (now titled
Homeland Security Presidential
Directive-12 (HSPD–12) and Personal
Identity Verification (PIV)), and new
special contract requirements were
developed and implemented on an
interim basis under USAID Acquisition
and Assistance Policy Directive (AAPD)
16–02 SPECIAL CONTRACT
REQUIREMENTS FOR INFORMATION
TECHNOLOGY (IT) on May 3, 2016.
The requirements in the AAPD were
updated and reissued as AAPD 16–02
(Revised) on May 1, 2018. The policy
published in the AAPD 16–02 (Revised)
provides a new definition of
information technology, and includes
various requirements applicable to
information and system security, as well
as requirements for Electronic and
Information Technology Accessibility,
software licenses, and prior agency
approval of IT purchases.
This AIDAR proposed rule, when
finalized and effective, will establish the
new definition, the revised AIDAR
clause 752.204–72 Homeland Security
Presidential Directive-12 (HSPD–12)
and Personal Identity Verification (PIV),
and AIDAR clauses based on some of
the special contract requirements from
the AAPD 16–02 (Revised). The
remaining special contract requirements
regarding information and system
security in AAPD 16–02 (Revised) that
are not included in this proposed rule
will be assessed after finalization of the
currently open FAR cases on Controlled
Unclassified Information (CUI) and
Breaches of Personally Identifiable
PO 00000
Frm 00032
Fmt 4702
Sfmt 4702
Information (PII). In addition to the
contract requirements originating from
the AAPD 16–02 (Revised), a proposed
clause providing requirements for
development and/or maintenance of
third-party USAID-financed websites is
included in the rule.
Accordingly, USAID is proposing to
amend the U.S. Agency for International
Development (USAID) Acquisition
Regulation (AIDAR) to revise various
sections that will implement policy and
procedures for contracts and orders for,
or include a requirement for,
information technology (IT) supplies,
services and/or systems. These
requirements will ensure that
contractors comply with the current
Agency IT policies. The requirements in
this proposed rule would implement the
requirements under the following
authorities: The E-Government Act of
2002; Federal Information Technology
Acquisition Reform ACT (FITARA)
(Section 831 of the National Defense
Authorization Act for Fiscal Year 2015,
Pub. L. 113–291) and; Section 508 of the
Rehabilitation Act of 1973, as amended
(29 U.S.C. 794d) (‘‘Section 508’’);
Privacy Act of 1974 (5 U.S.C. 552a—the
Act); Federal Information Security
Management Act (FISMA) of 2002
(FISMA, Pub. L. 107–347. 44 U.S.C.
3531–3536); National Institute of
Standards and Technology (NIST)
Special Publication 800–53 revision 4 or
the current version; and Office of
Management and Budget (OMB)
Circular A–130.
USAID proposes to add AIDAR
subpart 739, revise AIDAR 752.204–72,
and include new clauses as follows:
• FAR subpart 739 provides the
Agency definition of ‘‘information
technology’’ as issued in AAPD 16–02
(Revised). As part of the AAPD 16–02
(Revised), a Class Deviation to FAR Part
2.101(b) definition of ‘‘information
technology’’ was approved by the head
of the contracting activity. This new
definition broadens and clarifies the
definition to include services such as
cloud services; it is derived from the
definition set forth in the Office of
Management and Budget’s (OMB’s)
guidance at OMB Memo M–15–14,
Management Oversight of Federal
Information Technology dated June 10,
2015. AIDAR 739.2 adds this definition,
which also appears at 752.239–XX Use
of Information Technology Approval
and 752.239–XX Limitation on Use of
Information Technology.
• AIDAR Clause 752.204–72 Access
to USAID Facilities and USAID’s
Information Systems is being replaced
in its entirety with a new title
Homeland Security Presidential
Directive-12 (HSPD–12) and Personal
E:\FR\FM\21MRP1.SGM
21MRP1
amozie on DSK9F9SC42PROD with PROPOSALS
Federal Register / Vol. 84, No. 55 / Thursday, March 21, 2019 / Proposed Rules
Identity Verification (PIV) and
significant changes to reflect additional
restrictions and reporting to better
implement Homeland Security
Presidential Directive-12 (HSPD–12)
(August 27, 2004) and PIV procedures.
The revision improves requirements
for contractor personnel provided access
to agency facilities and information
systems, as well as timely monitoring of
such access when the employee’s
employment is terminated. The revised
clause requires submission of staff
reports listing employees that require
access to USAID facilities or
information systems, and also specifies
the Agency’s authority to suspend or
terminate the access to any systems and/
or facilities if an Information Security
Incident or other electronic access
violation, use, or misuse incident gives
cause for such action.
• AIDAR 752.204–XX USAIDFinanced Third-party websites requires
that Contractors adhere to certain
requirements when developing,
launching, and maintaining a thirdparty website funded by USAID for the
purpose of meeting the project
implementation goals. This applies to
sites hosted on environments external to
USAID boundaries and not directly
controlled by USAID policies and staff.
The clause requires adherence to
Agency branding requirements and
limits the contractor to collecting only
the amount of information necessary to
complete the specific business need as
required by statute, regulation, or
Executive Order.
• AIDAR 752.239–XX Limitation on
Information Technology prohibits the
acquisition of information technology
under an award as defined in the clause
unless prior approval is obtained from
the contracting officer.
The clause ensures that only
information technology approved by the
Agency Chief Information officer (CIO)
is acquired, pursuant to the Federal
Information Technology Acquisition
Reform ACT (FITARA)(Section 831 of
the National Defense Authorization Act
for Fiscal Year 2015, Pub. L. 113–291).
All agency IT investment decisions,
including software and IT equipment,
must be made consistent with the
agency’s enterprise architecture. USAID
must consider the total cost of
ownership including the costs
associated with risk issues, including
security and privacy of data, and the
costs of ensuring security of the IT
system itself.
This clause is consistent with the
guidance promulgated by OMB in
support of the Federal Information
Technology Acquisition Reform Act
(FITARA) and related information
VerDate Sep<11>2014
17:18 Mar 20, 2019
Jkt 247001
technology (IT) management practices
in OMB Memo M–15–14 Management
Oversight of Federal Information
Technology.
• AIDAR 752.239–XX Software
License addresses the need to ensure
that acquired software is aligned with
the agency’s enterprise architecture; it
will also enable the Agency to
consolidate licenses when appropriate
in alignment with OMB Category
Management Policy 16–1.
The clause clarifies that renewal of
software licenses may only occur in
accordance with the mutual agreement
of the parties; or an option renewal
clause allowing the Government to
unilaterally exercise one or more
options to extend the term of the award.
Since renewal of a software license
would require the obligation of funds by
the Federal Government, renewal must
not be automatic.
Commercial off the shelf software
solutions are offered to the public under
standard agreements that may take a
variety of forms, including license
agreements, terms of service (TOS),
terms of sale or purchase, and similar
agreements. Customarily, these standard
agreements contain terms and
conditions that are appropriate when
the purchaser is a private party but are
inappropriate when the purchaser is the
Federal Government.
• AIDAR 752.239–XX Information
and Communication Technology (ICT)
Accessibility requires contractors to
implement Section 508 of the
Rehabilitation Act of 1973, as amended
(29 U.S.C. 794d) (‘‘Section 508’’). This
clause applies to all development,
procurement, maintenance, and
information communication technology
for use by USAID and members of the
U.S. public.
• AIDAR 752.239–XX Information
Technology Approval requires that
contractors acquire only the information
technology specified in the contract,
and specifies a process to request
approval if the Contractor determines
that acquisition of information
technology is necessary to meet the
Government’s requirements under the
award. The clause ensures that only
information technology approved by the
Agency Chief Information Officer (CIO)
is acquired, pursuant to the Federal
Information Technology Acquisition
Reform ACT (FITARA)(Section 831 of
the National Defense Authorization Act
for Fiscal Year 2015, Pub. L. 113–291).
All agency IT investment decisions,
including software and IT equipment,
must be made consistent with the
agency’s enterprise architecture. USAID
must consider the total cost of
ownership including the costs
PO 00000
Frm 00033
Fmt 4702
Sfmt 4702
10471
associated with risk issues, including
security and privacy of data, and the
costs of ensuring security of the IT
system itself.
This clause is consistent with the
guidance promulgated by OMB in
support of the Federal Information
Technology Acquisition Reform Act
(FITARA) and related information
technology (IT) management practices
in OMB Memo M–15–14 Management
Oversight of Federal Information
Technology.
• AIDAR 752.239–XX Skills and
Certification Requirements for Privacy
and Security Staff requires that
Contractor personnel performing the
roles of Information System Security
Officer and Information Security
Specialists possess a Certified
Information Systems Security
Professional (CISSP) certification. All
USAID contractors who have significant
information security responsibilities as
defined by OPM 5 CFR part 930 must
complete specialized IT security
training.
Additionally, contractor personnel
filling the role of Privacy Analysts must
possess a Certified Information Privacy
Professional (CIPP) credential with a
CIPP/US to ensure that Privacy Analysts
have the expertise required to
implement U.S. government privacy
laws, regulations and policies specific to
government practice.
C. Regulatory Planning and Review
This proposed rule has been
determined to be ‘‘nonsignificant’’
under Executive Order 12866,
Regulatory Planning and Review, dated
September 30, 1993 and, therefore, is
not subject to review.
This proposed rule is not a major rule
under 5 U.S.C. 804.
D. Regulatory Flexibility Act
The proposed rule does not have a
significant economic impact on a
substantial number of small entities
within the meaning of the Regulatory
Flexibility Act, 5 U.S.C. 601, et seq.
Therefore, an Initial Regulatory
Flexibility Analysis has not been
performed.
E. Paperwork Reduction Act
The Paperwork Reduction Act (44
U.S.C. chapter 35) applies. The
proposed rule contains an information
collection requirement. Accordingly,
USAID has submitted a request to the
Office of Management and Budget for
approval of a new information
collection requirement concerning
‘‘Access to USAID Facilities and
USAID’s Information Systems’’ and the
E:\FR\FM\21MRP1.SGM
21MRP1
amozie on DSK9F9SC42PROD with PROPOSALS
10472
Federal Register / Vol. 84, No. 55 / Thursday, March 21, 2019 / Proposed Rules
monthly reports of employees requiring
access.
List of Subjects in 48 CFR parts 739 and
752
Access to USAID Facilities and USAID’s
Information Systems
Government procurement.
For the reasons discussed in the
preamble, USAID proposes to amend 48
CFR Parts 739 and 752 as set forth
below:
■ 1. Add part 739 to read as follows:
Public reporting burden for this
collection of information is estimated to
average initially eight hours
immediately after contract award to
develop the list of employee’s requiring
access, then 2 hours per month to
update such a list, including the time
for reviewing instructions, gathering/
maintaining the employee names, and
forwarding the list to the agency for
processing. The recordkeeping
requirements are minor. While a
contractor is required to identify and
submit the list of its employees who
require access, there is no requirement
to collect this information in a
particular format for submission to the
agency.
The annual reporting burden is
estimated as follows:
Total number of respondents and the
amount of time estimated for an average
respondent to respond: 138 contractors;
eight hours for the initial report, 24
hours annually thereafter for submission
of the monthly reports.
Total public burden (in hours)
associated with the collection: 1,104
hours initially, and 3,312 hours
annually thereafter.
Total public burden (in cost)
associated with the collection: Initial
submission, $54,537, then $163,613
annually thereafter.
When submitting comments on these
information collections, your comments
should address one or more of the
following four points:
(1) Evaluate whether the proposed
collection of information is necessary
for the proper performance of the
functions of the agency, including
whether the information will have
practical utility;
(2) Evaluate the accuracy of the
agency’s estimate of the burden of the
proposed collection of information,
including the validity of the
methodology and assumptions used;
(3) Ways to enhance the quality,
utility, and clarity of the information to
be collected; and
(4) Ways which USAID can minimize
the burden of the collection of
information on those who are to
respond, including through the use of
appropriate automated, electronic,
mechanical, or other technological
collection techniques or other forms of
information technology, e.g., permitting
electronic submission of responses.
VerDate Sep<11>2014
17:18 Mar 20, 2019
Jkt 247001
PART 739—Acquisition of Information
Technology
Sec.
739.002
739.003
Definitions.
As used in this part—
Information Technology means
(1) Any services or equipment, or
interconnected system(s) or
subsystem(s) of equipment, that are
used in the automatic acquisition,
storage, analysis, evaluation,
manipulation, management, movement,
control, display, switching, interchange,
transmission, or reception of data or
information by the agency; where
(2) Such services or equipment are
‘‘used by an agency’’ if used by the
agency directly or if used by a
contractor under a contract with the
agency that requires either use of the
services or equipment or requires use of
the services or equipment to a
significant extent in the performance of
a service or the furnishing of a product.
(3) The term ‘‘information
technology’’ includes computers,
ancillary equipment (including imaging
peripherals, input, output, and storage
devices necessary for security and
surveillance), peripheral equipment
designed to be controlled by the central
processing unit of a computer, software,
firmware and similar procedures,
services (including provisioned services
such as cloud computing and support
services that support any point of the
lifecycle of the equipment or service),
and related resources.
(4) The term ‘‘information
technology’’ does not include any
equipment that is acquired by a
contractor incidental to a contract that
does not require use of the equipment.
739.003
[Reserved]
PART 752—SOLICITATION
PROVISIONS AND CONTRACT
CLAUSES
2. The authority for part 752
continues to read as follows:
■
PO 00000
Frm 00034
Fmt 4702
3. Amend section 752.204–72 by
revising the section heading and the
clause to read as follows:
■
752.204–72 Homeland Security
Presidential Directive-12 (HSPD–12) and
Personal Identity Verification (PIV).
*
*
*
*
*
Homeland Security Presidential
Directive-12 (HSPD–12) and Personal
Identity Verification (PIV) (Date)
Definitions
[Reserved]
Authority: Sec. 621, Pub. L. 87–195, 75
Stat. 445, (22 U.S.C. 2381) as amended; E.O.
12163, Sept. 29, 1979, 44 FR 56673; and 3
CFR 1979 Comp., p. 435.
739.002
Authority: Sec. 621, Pub. L. 87–195, 75
Stat. 445, (22 U.S.C. 2381) as amended; E.O.
12163, Sept. 29, 1979, 44 FR 56673; and 3
CFR 1979 Comp., p. 435.
Sfmt 4702
(a) Individuals engaged in the performance
of this award as employees, consultants, or
volunteers of the contractor must comply
with all applicable HSPD–12 and PIV
procedures, as described below, and any
subsequent USAID or Government-wide
HSPD–12 and PIV procedures/policies.
(b) A U.S. citizen or resident alien engaged
in the performance of this award as an
employee, consultant, or volunteer of a U.S
firm may obtain access to USAID facilities or
logical access to USAID’s information
systems only when and to the extent
necessary to carry out this award and in
accordance with this clause. The contractor’s
employees, consultants, or volunteers who
are not U.S. citizens or resident aliens as well
as employees, consultants, or volunteers of
non-U.S. firms, irrespective of their
citizenship, will not be granted logical access
to U.S. Government information technology
systems (such as Phoenix, GLAAS, etc.) and
must be escorted to use U.S. Government
facilities (such as office space).
(c) (1) No later than five business days after
award, the Contractor must provide to the
Contracting Officer’s Representative (COR) a
complete list of employees that require
access to USAID facilities or information
systems.
(2) Before a contractor (or a contractor
employee, consultant, or volunteer) or
subcontractor at any tier may obtain a USAID
ID (new or replacement) authorizing the
individual routine access to USAID facilities
in the United States, or logical access to
USAID’s information systems, the individual
must provide two forms of identity source
documents in original form to the Enrollment
Office personnel when undergoing
processing. One identity source document
must be a valid Federal or State Governmentissued picture ID. Contractors may contact
the USAID Security Office to obtain the list
of acceptable forms of documentation.
Submission of these documents, to include
documentation of security background
investigations, is mandatory in order for the
contractor to receive a PIV or PIV-Alternative
(PIV–A)/Facilities Access Card (FAC) card
and be granted access to any of USAID’s
information systems. All such individuals
must physically present these two source
documents for identity proofing at their
enrollment.
(d) The Contractor must send a staffing
report to the COR by the fifth day of each
month. The report must contain the listing of
E:\FR\FM\21MRP1.SGM
21MRP1
Federal Register / Vol. 84, No. 55 / Thursday, March 21, 2019 / Proposed Rules
all staff members with access who were
separated or hired under this contract in the
past sixty (60) calendar days. This report
must be submitted even if no separations or
hiring occurred during the reporting period.
Failure to submit the ‘Contractor Staffing
Change Report’ each month may, at USAID’s
discretion, result in the suspension of all
logical access to USAID information systems
and/or facilities access associated with this
contract. USAID will provide the contractor
the format for this report.
(e) Contractor employees are strictly
prohibited from sharing logical access to
USAID information systems and Sensitive
Information. USAID will disable accounts
and revoke logical access to USAID IT
systems if Contractor employees share
accounts.
(f) USAID, at its discretion, may suspend
or terminate the access to any systems and/
or facilities when an Information Security
Incident or electronic access violation, use,
or misuse incident gives cause for such
action. The suspension or termination may
last until such time as USAID determines
that the situation has been corrected or no
longer exists.
(g) The Contractor must notify the COR and
the USAID Service Desk at least five business
days prior to the Contractor employee’s
removal from the contract. For unplanned
terminations of Contractor employees, the
Contractor must immediately notify the COR
and the USAID Service Desk (CIOHELPDESK@usaid.gov or (202) 712–1234).
The Contractor or its Facilities Security
Officer must return USAID PIV/FAC cards
and remote authentication tokens issued to
Contractor employees to the COR prior to
departure of the employee or upon
completion or termination of the contract,
whichever occurs first.
(h) The contractor is required to insert this
clause (including this paragraph (h) in any
subcontracts that require the subcontractor,
subcontractor employee, or consultant to
have routine physical access to USAID space
or logical access to USAID’s information
systems.
(End of Clause)
■ 4. Add section 752.204–XX to read as
follows:
752.204–XX
Websites.
USAID-Financed Third-Party
Insert the following clause in USAIDfunded solicitations and contracts that
require development and/or
maintenance of a third-party website to
achieve project implementation goals.
amozie on DSK9F9SC42PROD with PROPOSALS
USAID-Financed Third-Party Websites
(Date)
(a) Definitions: ‘‘Third-party websites’’
Websites hosted on environments external
to USAID boundaries and not directly
controlled by USAID policies and staff,
except through the terms and conditions of
a contract. Third-party websites include
project websites.
(b) The contractor must adhere to the
following requirements when developing,
launching, and maintaining a third-party
VerDate Sep<11>2014
17:18 Mar 20, 2019
Jkt 247001
website funded by USAID for the purpose of
meeting the project implementation goals:
(1) Prior to website development, the
Contractor must provide information as
required in Section C-Statement of Work of
the contract (including a copy of their
Contractor’s privacy policy) to the
Contracting Officer’s Representative (COR),
for USAID’s Bureau for Legislative and
Public Affairs (LPA) evaluation and approval.
The Contractor must notify the COR of the
website URL as far in advance of the site’s
launch as possible and must not launch the
website until USAID’s approval has been
provided through the COR. The Contractor
must provide the COR any changes to the
Contractor’s privacy policy for the duration
of the contract.
(2) The Contractor must collect only the
amount of information necessary to complete
the specific business need as required by
statute, regulation, or Executive Order.
(3) The Contractor must comply with
Agency branding and marking requirements
comprised of the USAID logo and brandmark
with the tagline ‘‘from the American people,’’
located on the USAID website at
www.usaid.gov/branding, and USAID
Graphics Standards manual at https://
www.usaid.gov.
(4) The website must be marked on the
index page of the site and every major entry
point to the website with a disclaimer that
states:
‘‘The information provided on this website
is not official U.S. Government information
and does not represent the views or positions
of the U.S. Agency for International
Development or the U.S. Government.’’
(5) The website must provide persons with
disabilities access to information that is
comparable to the access available to others.
As such, all site content must be compliant
with the requirements of the Section 508 of
the Rehabilitation Act, as amended (29 U.S.C.
794d) (‘‘Section 508’’) and other terms and
conditions of the contract.
(6) The Contractor must identify and
provide to the COR, in writing, the contact
information for the Contractor’s information
security point of contact. The contractor is
responsible for updating the contact
information whenever there is a change in
personnel assigned to this role.
(7) The Contractor must provide adequate
protection from unauthorized access,
alteration, disclosure, or misuse of
information processed, stored, or transmitted
on the websites. To minimize security risks
and ensure the integrity and availability of
information, the Contractor must use sound:
System/software management; engineering
and development; and secure-coding
practices consistent with USAID standards
and information security best practices.
Rigorous security safeguards, including but
not limited to, virus protection; network
intrusion detection and prevention programs;
and vulnerability management systems must
be implemented and critical security issues
must be resolved as quickly as possible or
within 30 calendar days. Contact the USAID
Chief Information Security Officer (CISO) at
ISSO@usaid.gov for specific standards and
guidance.
(8) The Contractor must conduct periodic
vulnerability scans, mitigate all security risks
PO 00000
Frm 00035
Fmt 4702
Sfmt 4702
10473
identified during such scans, and report
subsequent remediation actions to CISO at
ISSO@usaid.gov and COR within 30 calendar
days from the date vulnerabilities are
identified. The report must include
disclosure of the tools used to conduct the
scans. Alternatively, the contractor may
authorize USAID CISO at ISSO@usaid.gov to
conduct periodic vulnerability scans via its
Web-scanning program. The sole purpose of
USAID scanning will be to minimize security
risks. The Contractor will be responsible for
taking the necessary remediation action and
reporting to USAID as specified above.
(c) For general information, agency
graphics, metadata, privacy policy, and
Section 508 compliance requirements, refer
to https://www.usaid.gov.
(End of Clause)
5. Add section 752.239–XX to read as
follows:
■
752.239–XX Limitation on Acquisition of
Information Technology.
Insert the following clause in all
solicitations and contracts unless the
special contract requirement
Information Technology Approval is
included.
Limitation on Acquisition of
Information Technology (Date)
(a) Definitions. As used in this contract:
Information Technology means
(1) Any services or equipment, or
interconnected system(s) or subsystem(s) of
equipment, that are used in the automatic
acquisition, storage, analysis, evaluation,
manipulation, management, movement,
control, display, switching, interchange,
transmission, or reception of data or
information by the agency; where
(2) such services or equipment are ‘‘used
by an agency’’ if used by the agency directly
or if used by a contractor under a contract
with the agency that requires either use of the
services or equipment or requires use of the
services or equipment to a significant extent
in the performance of a service or the
furnishing of a product.
(3) The term ‘‘information technology’’
includes computers, ancillary equipment
(including imaging peripherals, input,
output, and storage devices necessary for
security and surveillance), peripheral
equipment designed to be controlled by the
central processing unit of a computer,
software, firmware and similar procedures,
services (including provisioned services such
as cloud computing and support services that
support any point of the lifecycle of the
equipment or service), and related resources.
(4) The term ‘‘information technology’’
does not include any equipment that is
acquired by a contractor incidental to a
contract that does not require use of the
equipment.
(b) The Federal Information Technology
Acquisition Reform Act (FITARA) requires
Agency Chief Information Officer (CIO)
review and approval of contracts that include
information technology or information
technology services.
E:\FR\FM\21MRP1.SGM
21MRP1
10474
Federal Register / Vol. 84, No. 55 / Thursday, March 21, 2019 / Proposed Rules
(c) The Contractor must not acquire
information technology as defined in this
clause without the prior written approval by
the contracting officer as specified in this
clause.
(d) Request for Approval Requirements:
(1) If the Contractor determines that any
information technology will be necessary to
meet the Government’s requirements or to
facilitate activities in the Government’s
statement of work, the Contractor must
request prior written approval from the
Contracting Officer.
(2) As part of the request, the Contractor
must provide the Contracting Officer a
description and an estimate of the total cost
of the information technology equipment,
software, or services to be procured under
this contract. The Contractor must
simultaneously notify the Contracting
Officer’s Representative (COR) and the Office
of the Chief Information Office at
ITAuthorization@usaid.gov.
(e) The Contracting Officer will provide
written approval to the Contractor through
modification to the contract expressly
specifying the information technology
equipment, software, or services approved for
purchase by the COR and the Agency CIO.
The Contracting Officer will include the
applicable clauses and any special contract
requirements in the modification.
(f) Except as specified in the contracting
officer’s written approval, the Government is
not obligated to reimburse the Contractor for
any costs incurred for information
technology as defined in this clause. Such
approval does not relieve the Contractor from
the responsibility to maintain current
compliance at all times—including through
any updates or modifications to the
information technology—with all terms and
conditions of the contract, as well as relevant
statutes and regulations.
(g) The Contractor must insert the
substance of this clause, including this
paragraph (g), in all subcontracts.
(End of Clause)
■ 6. Add section 752.239–XX to read as
follows:
752.239–XX
Software License.
Insert the following clause in
solicitations and contracts for new
software licenses or to renew existing
licenses, and in solicitations and
contracts which may include a
requirement for new software licenses
or renewal of existing licenses.
amozie on DSK9F9SC42PROD with PROPOSALS
Software License Addendum (Date)
(a) This clause incorporates certain terms
and conditions relating to Federal
procurement actions. The terms and
conditions of this Addendum take
precedence over the terms and conditions
contained in any license agreement or other
contract documents entered into between the
parties.
(b) Governing Law: Federal procurement
law and regulations, including the Contract
Disputes Act, 41 U.S.C. 601 et seq., and the
Federal Acquisition Regulation (FAR), govern
VerDate Sep<11>2014
17:18 Mar 20, 2019
Jkt 247001
the agreement between the parties. Litigation
arising out of this contract may be filed only
in those fora that have jurisdiction over
Federal procurement matters.
(c) Attorney’s Fees: Attorney’s fees are
payable by the Federal government in any
action arising under this contract only
pursuant to the Equal Access in Justice Act,
5 U.S.C. 504.
(d) No Indemnification: The Federal
government will not be liable for any claim
for indemnification; such payments may
violate the Anti-Deficiency Act, 31 U.S.C.
1341(a).
(e) Assignment: Payments may only be
assigned in accordance with the Assignment
of Claims Act, 31 U.S.C. 3727, and FAR
Subpart 32.8, ‘‘Assignment of Claims.’’
(f) Patent and Copyright Infringement:
Patent or copyright infringement suits
brought against the United States as a party
may only be defended by the U.S.
Department of Justice (28 U.S.C. 516).
(g) Renewal of Support after Expiration of
this Award: Service will not automatically
renew after expiration of the initial term of
award.
(h) Renewal may only occur in accord with
(1) the mutual agreement of the parties; or (2)
an option renewal clause allowing the
Government to unilaterally exercise one or
more options to extend the term of the award.
(1) Section 1194.21 Software applications
and operating systems
(2) 1194.22 Web-based intranet and
internet information and applications;
(3) Section 1194.23 Telecommunications
products;
(4) Section 1194.24 Video and
multimedia products;
(5) Section 1194.25 Self-contained, closed
products;
(6) Section 1194.26 Desktop and portable
computers;
(7) Section 1194.31 Functional
performance criteria; and
(8) Section 1194.41 Information,
documentation, and support.
(c) Deliverable(s) must incorporate these
standards as well.
(d) The final work product must include
documentation that the deliverable conforms
with the Section 508 Standards promulgated
by the US Access Board.
(End of Clause)
■ 8. Add section 752.239–XX to read as
follows:
752.239–XX Use of Information
Technology Approval.
(End of Clause)
■ 7. Add section 752.239–72 to read as
follows:
Insert the following clause in all
USAID solicitations and contracts for
Information Technology (IT) services or
supplies or include a requirement for
the contractor to provide IT services or
supplies.
752.239–72 Information and
Communication Technology Accessibility.
Use of Information Technology
Notification (Date)
Insert the following clause in
solicitations and contracts that include
acquisition of Information and
Communication Technology (ICT)
supplies and/or services for use by
Federal employees or U.S. members of
the public.
Information and Communication
Technology Accessibility
(Date)
(a) Federal agencies are required by Section
508 of the Rehabilitation Act of 1973, as
amended (29 U.S.C. 794d), to offer access to
information and communication technology
for disabled individuals within its
employment, and for disabled members of
the public seeking information and services.
This access must be comparable to that
which is offered to similar individuals who
do not have disabilities. Standards for
complying with this law are prescribed by
the Architectural and Transportation Barriers
Compliance Board (‘‘The Access Board’’) in
36 CFR part 1194, which implements Section
508 of the Rehabilitation Act of 1973, as
amended, and is viewable at https://
www.access-board.gov/sec508/508
standards.htm. The contractor must comply
with any future updates of standards by the
Access Board.
(b) Except as indicated elsewhere in the
contract, all ICT procured through this
contract must meet the applicable
accessibility standards at 36 CFR part 1194
as follows:
PO 00000
Frm 00036
Fmt 4702
Sfmt 4702
(a) Definitions. As used in this contract:
Information Technology means
(1) Any services or equipment, or
interconnected system(s) or subsystem(s) of
equipment, that are used in the automatic
acquisition, storage, analysis, evaluation,
manipulation, management, movement,
control, display, switching, interchange,
transmission, or reception of data or
information by the agency; where
(2) Such services or equipment are ‘‘used
by an agency’’ if used by the agency directly
or if used by a contractor under a contract
with the agency that requires either use of the
services or equipment or requires use of the
services or equipment to a significant extent
in the performance of a service or the
furnishing of a product.
(3) The term ‘‘information technology’’
includes computers, ancillary equipment
(including imaging peripherals, input,
output, and storage devices necessary for
security and surveillance), peripheral
equipment designed to be controlled by the
central processing unit of a computer,
software, firmware and similar procedures,
services (including provisioned services such
as cloud computing and support services that
support any point of the lifecycle of the
equipment or service), and related resources.
(4) The term ‘‘information technology’’
does not include any equipment that is
acquired by a contractor incidental to a
contract that does not require use of the
equipment. (OMB M–15–14)
(b) The Federal Information Technology
Acquisition Reform Act (FITARA) requires
E:\FR\FM\21MRP1.SGM
21MRP1
Federal Register / Vol. 84, No. 55 / Thursday, March 21, 2019 / Proposed Rules
amozie on DSK9F9SC42PROD with PROPOSALS
Agency Chief Information Officer (CIO)
review and approval of contracts or
interagency agreements for information
technology or information technology
services.
(c) The approved information technology
and/or information technology services are
specified in the Schedule of this contract.
The Contractor must not acquire additional
information technology without the prior
written approval of the Contracting Officer as
specified in this clause.
(d) Request for Approval Requirements:
(1) If the Contractor determines that any
information technology in addition to that
information technology specified in the
Schedule will be necessary to meet the
Government’s requirements or to facilitate
activities in the Government’s statement of
work, the Contractor must request prior
written approval from the Contracting
Officer.
(2) As part of the request, the Contractor
must provide the Contracting Officer a
description and an estimate of the total cost
of the information technology equipment,
software, or services to be procured under
this contract. The Contractor must
simultaneously notify the Contracting
Officer’s Representative (COR) and the Office
of the Chief Information Officer at
ITAuthorization@usaid.gov.
(e) The Contracting Officer will provide
written approval to the Contractor expressly
specifying the information technology
equipment, software, or services approved for
purchase by the COR and the Agency CIO.
Additional clauses or special contract
requirements may be applicable and will be
VerDate Sep<11>2014
17:18 Mar 20, 2019
Jkt 247001
incorporated by the Contracting Officer
through a modification to the contract.
(f) Except as specified in the Contracting
Officer’s written approval, the Government is
not obligated to reimburse the Contractor for
costs incurred in excess of the information
technology equipment, software or services
specified in the Schedule. Such approval
does not relieve the Contractor from the
responsibility to maintain current
compliance at all times—including through
any updates or modifications to the
information technology—with meeting all
terms and conditions of the contract, as well
as relevant statutes and regulations.
(d) The Contractor must insert the
substance of this clause, including this
paragraph (g), in all subcontracts.
(End of Clause)
■ 9. Add section 752.239–XX to read as
follows:
752.239–XX Skills and Certification
Requirements for Privacy and Security
Staff.
Insert the following clause in
solicitations and contracts for
Information Technology (IT) services
and in solicitations and contracts that
include a component for IT services.
Skills and Certification Requirements
for Privacy and Security Staff (Date)
(a) Applicability: This clause applies to the
Contractor, its subcontractors and personnel
providing support under this contract and
PO 00000
Frm 00037
Fmt 4702
Sfmt 9990
10475
addresses the Privacy Act of 1974 (5 U.S.C.
552a—the Act) and Federal Information
Security Management Act (FISMA) of 2002
(FISMA, Pub. L. 107–347. 44 U.S.C. 3531–
3536).
(b) Contractor personnel filling the role of
Information System Security Officer and
Information Security Specialists must
possess a Certified Information Systems
Security Professional (CISSP) certification at
time of contract award and maintain their
certification throughout the period of
performance. This will fulfill the
requirements for specialized training due to
the continuing education requirements for
the certification. Contractor personnel must
provide proof of their certification status
upon request.
(c) Contractor personnel filling the role of
Privacy Analysts must possess a Certified
Information Privacy Professional (CIPP)
credential with a CIPP/USat the time of the
contract award and must maintain the
credential throughout the period of
performance. This will fulfill the
requirements for specialized training due to
the continuing education requirements for
the certification. Contractor personnel must
provide proof of their certification status
upon request.
(End of Clause)
Mark Walther,
Chief Acquisition Officer, Acting.
[FR Doc. 2019–04654 Filed 3–20–19; 8:45 am]
BILLING CODE 6116–02–P
E:\FR\FM\21MRP1.SGM
21MRP1
Agencies
[Federal Register Volume 84, Number 55 (Thursday, March 21, 2019)]
[Proposed Rules]
[Pages 10469-10475]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2019-04654]
=======================================================================
-----------------------------------------------------------------------
AGENCY FOR INTERNATIONAL DEVELOPMENT
48 CFR Parts 739 and 752
[0412-AA87]
United States Agency for International Development Acquisition
Regulation (AIDAR): Security and Information Technology Requirements
AGENCY: U.S. Agency for International Development.
ACTION: Proposed rule.
-----------------------------------------------------------------------
SUMMARY: The U.S. Agency for International Development (USAID) seeks
public comment on a proposed rule that would amend the USAID
Acquisition Regulation (AIDAR) to incorporate a revised definition of
information technology and other requirements relating to information
security and information technology approvals. The Federal Information
Technology Acquisition Reform Act requires improved management of the
acquisition of Information technology resources. This proposed rule
revising the AIDAR, if adopted, would provide increased oversight of
contractor acquisition and use of information technology resources.
DATES: Comments must be received no later than May 20, 2019.
ADDRESSES: Address all comments concerning this notice to Carol
Ketrick, Bureau for Management, Office of Acquisition and Assistance,
Policy
[[Page 10470]]
Division (M/OAA/P), Room 867F, SA-44, Washington, DC 20523-2052. Submit
comments, identified by title of the action and Regulatory Information
Number (RIN) by any of the following methods:
1. Through the Federal eRulemaking Portal at https://www.regulations.gov by following the instructions for submitting
comments.
2. By Mail addressed to: USAID, Bureau for Management, Office of
Acquisition & Assistance, Policy Division, Room 867-F, SA-44,
Washington, DC 20523-2052.
Comments on the information collection request under Section E,
Paperwork Reduction Act must be submitted to both USAID and OMB/OIRA as
follows:
USAID--Carol Ketrick at cketrick@usaid.gov.
OMB/OIRA--email to oira_submission@omb.eop.gov, fax to (202) 395-
6974, or mail to the Office of Information and Regulatory Affairs,
Office of Management and Budget, 725 17th Street NW, Washington, DC
20503.
FOR FURTHER INFORMATION CONTACT: Carol Ketrick, Telephone: 202-567-4676
or email: cketrick@usaid.gov.
SUPPLEMENTARY INFORMATION:
A. Instructions
All comments must be in writing and submitted through one of the
methods specified in the Addresses section above. All submissions (and
attachments) must include the title of the action and RIN for this
rulemaking. Please include your name, title, organization, postal
address, telephone number, and email address in the text of the
message.
Please note that USAID recommends sending all comments to the
Federal eRulemaking Portal because security screening precautions have
slowed the delivery and dependability of surface mail to USAID/
Washington.
All comments will be made available at https://www.regulations.gov
for public review without change, including any personal information
provided. We recommend that you do not submit information that you
consider Confidential Business Information (CBI) or any information
that is otherwise protected from disclosure by statute.
USAID will only address comments that explain why this proposed
rule would be inappropriate, ineffective, or unacceptable without a
change. Comments that are insubstantial or outside the scope of the
rule may not be considered.
B. Background
On September 5, 2014, the Office of Management and Budget (OMB) and
the National Security Council (NSC) convened a President's Management
Council, with one of the focus areas being improvement of cybersecurity
in Federal acquisitions, in particular, accountability of contractors
providing IT systems and services to the Federal government.
Accordingly, USAID is taking steps to address information security
for information and information systems that support the operations and
assets of the agency, including those managed by contractors. The new
requirements will strengthen protections of Agency information systems/
facilities.
Following the cybersecurity review directed by OMB ``Follow-Up to
President's Management Council Cybersecurity Meeting, September 5,
2014'', which was completed by the agency Office of the Chief of
Information Officer (CIO) in October 2014, a revised clause 752.204-72
Access to USAID facilities and USAID's Information Systems (now titled
Homeland Security Presidential Directive-12 (HSPD-12) and Personal
Identity Verification (PIV)), and new special contract requirements
were developed and implemented on an interim basis under USAID
Acquisition and Assistance Policy Directive (AAPD) 16-02 SPECIAL
CONTRACT REQUIREMENTS FOR INFORMATION TECHNOLOGY (IT) on May 3, 2016.
The requirements in the AAPD were updated and reissued as AAPD 16-02
(Revised) on May 1, 2018. The policy published in the AAPD 16-02
(Revised) provides a new definition of information technology, and
includes various requirements applicable to information and system
security, as well as requirements for Electronic and Information
Technology Accessibility, software licenses, and prior agency approval
of IT purchases.
This AIDAR proposed rule, when finalized and effective, will
establish the new definition, the revised AIDAR clause 752.204-72
Homeland Security Presidential Directive-12 (HSPD-12) and Personal
Identity Verification (PIV), and AIDAR clauses based on some of the
special contract requirements from the AAPD 16-02 (Revised). The
remaining special contract requirements regarding information and
system security in AAPD 16-02 (Revised) that are not included in this
proposed rule will be assessed after finalization of the currently open
FAR cases on Controlled Unclassified Information (CUI) and Breaches of
Personally Identifiable Information (PII). In addition to the contract
requirements originating from the AAPD 16-02 (Revised), a proposed
clause providing requirements for development and/or maintenance of
third-party USAID-financed websites is included in the rule.
Accordingly, USAID is proposing to amend the U.S. Agency for
International Development (USAID) Acquisition Regulation (AIDAR) to
revise various sections that will implement policy and procedures for
contracts and orders for, or include a requirement for, information
technology (IT) supplies, services and/or systems. These requirements
will ensure that contractors comply with the current Agency IT
policies. The requirements in this proposed rule would implement the
requirements under the following authorities: The E-Government Act of
2002; Federal Information Technology Acquisition Reform ACT (FITARA)
(Section 831 of the National Defense Authorization Act for Fiscal Year
2015, Pub. L. 113-291) and; Section 508 of the Rehabilitation Act of
1973, as amended (29 U.S.C. 794d) (``Section 508''); Privacy Act of
1974 (5 U.S.C. 552a--the Act); Federal Information Security Management
Act (FISMA) of 2002 (FISMA, Pub. L. 107-347. 44 U.S.C. 3531-3536);
National Institute of Standards and Technology (NIST) Special
Publication 800-53 revision 4 or the current version; and Office of
Management and Budget (OMB) Circular A-130.
USAID proposes to add AIDAR subpart 739, revise AIDAR 752.204-72,
and include new clauses as follows:
FAR subpart 739 provides the Agency definition of
``information technology'' as issued in AAPD 16-02 (Revised). As part
of the AAPD 16-02 (Revised), a Class Deviation to FAR Part 2.101(b)
definition of ``information technology'' was approved by the head of
the contracting activity. This new definition broadens and clarifies
the definition to include services such as cloud services; it is
derived from the definition set forth in the Office of Management and
Budget's (OMB's) guidance at OMB Memo M-15-14, Management Oversight of
Federal Information Technology dated June 10, 2015. AIDAR 739.2 adds
this definition, which also appears at 752.239-XX Use of Information
Technology Approval and 752.239-XX Limitation on Use of Information
Technology.
AIDAR Clause 752.204-72 Access to USAID Facilities and
USAID's Information Systems is being replaced in its entirety with a
new title Homeland Security Presidential Directive-12 (HSPD-12) and
Personal
[[Page 10471]]
Identity Verification (PIV) and significant changes to reflect
additional restrictions and reporting to better implement Homeland
Security Presidential Directive-12 (HSPD-12) (August 27, 2004) and PIV
procedures.
The revision improves requirements for contractor personnel
provided access to agency facilities and information systems, as well
as timely monitoring of such access when the employee's employment is
terminated. The revised clause requires submission of staff reports
listing employees that require access to USAID facilities or
information systems, and also specifies the Agency's authority to
suspend or terminate the access to any systems and/or facilities if an
Information Security Incident or other electronic access violation,
use, or misuse incident gives cause for such action.
AIDAR 752.204-XX USAID-Financed Third-party websites
requires that Contractors adhere to certain requirements when
developing, launching, and maintaining a third-party website funded by
USAID for the purpose of meeting the project implementation goals. This
applies to sites hosted on environments external to USAID boundaries
and not directly controlled by USAID policies and staff. The clause
requires adherence to Agency branding requirements and limits the
contractor to collecting only the amount of information necessary to
complete the specific business need as required by statute, regulation,
or Executive Order.
AIDAR 752.239-XX Limitation on Information Technology
prohibits the acquisition of information technology under an award as
defined in the clause unless prior approval is obtained from the
contracting officer.
The clause ensures that only information technology approved by the
Agency Chief Information officer (CIO) is acquired, pursuant to the
Federal Information Technology Acquisition Reform ACT (FITARA)(Section
831 of the National Defense Authorization Act for Fiscal Year 2015,
Pub. L. 113-291). All agency IT investment decisions, including
software and IT equipment, must be made consistent with the agency's
enterprise architecture. USAID must consider the total cost of
ownership including the costs associated with risk issues, including
security and privacy of data, and the costs of ensuring security of the
IT system itself.
This clause is consistent with the guidance promulgated by OMB in
support of the Federal Information Technology Acquisition Reform Act
(FITARA) and related information technology (IT) management practices
in OMB Memo M-15-14 Management Oversight of Federal Information
Technology.
AIDAR 752.239-XX Software License addresses the need to
ensure that acquired software is aligned with the agency's enterprise
architecture; it will also enable the Agency to consolidate licenses
when appropriate in alignment with OMB Category Management Policy 16-1.
The clause clarifies that renewal of software licenses may only
occur in accordance with the mutual agreement of the parties; or an
option renewal clause allowing the Government to unilaterally exercise
one or more options to extend the term of the award. Since renewal of a
software license would require the obligation of funds by the Federal
Government, renewal must not be automatic.
Commercial off the shelf software solutions are offered to the
public under standard agreements that may take a variety of forms,
including license agreements, terms of service (TOS), terms of sale or
purchase, and similar agreements. Customarily, these standard
agreements contain terms and conditions that are appropriate when the
purchaser is a private party but are inappropriate when the purchaser
is the Federal Government.
AIDAR 752.239-XX Information and Communication Technology
(ICT) Accessibility requires contractors to implement Section 508 of
the Rehabilitation Act of 1973, as amended (29 U.S.C. 794d) (``Section
508''). This clause applies to all development, procurement,
maintenance, and information communication technology for use by USAID
and members of the U.S. public.
AIDAR 752.239-XX Information Technology Approval requires
that contractors acquire only the information technology specified in
the contract, and specifies a process to request approval if the
Contractor determines that acquisition of information technology is
necessary to meet the Government's requirements under the award. The
clause ensures that only information technology approved by the Agency
Chief Information Officer (CIO) is acquired, pursuant to the Federal
Information Technology Acquisition Reform ACT (FITARA)(Section 831 of
the National Defense Authorization Act for Fiscal Year 2015, Pub. L.
113-291). All agency IT investment decisions, including software and IT
equipment, must be made consistent with the agency's enterprise
architecture. USAID must consider the total cost of ownership including
the costs associated with risk issues, including security and privacy
of data, and the costs of ensuring security of the IT system itself.
This clause is consistent with the guidance promulgated by OMB in
support of the Federal Information Technology Acquisition Reform Act
(FITARA) and related information technology (IT) management practices
in OMB Memo M-15-14 Management Oversight of Federal Information
Technology.
AIDAR 752.239-XX Skills and Certification Requirements for
Privacy and Security Staff requires that Contractor personnel
performing the roles of Information System Security Officer and
Information Security Specialists possess a Certified Information
Systems Security Professional (CISSP) certification. All USAID
contractors who have significant information security responsibilities
as defined by OPM 5 CFR part 930 must complete specialized IT security
training.
Additionally, contractor personnel filling the role of Privacy
Analysts must possess a Certified Information Privacy Professional
(CIPP) credential with a CIPP/US to ensure that Privacy Analysts have
the expertise required to implement U.S. government privacy laws,
regulations and policies specific to government practice.
C. Regulatory Planning and Review
This proposed rule has been determined to be ``nonsignificant''
under Executive Order 12866, Regulatory Planning and Review, dated
September 30, 1993 and, therefore, is not subject to review.
This proposed rule is not a major rule under 5 U.S.C. 804.
D. Regulatory Flexibility Act
The proposed rule does not have a significant economic impact on a
substantial number of small entities within the meaning of the
Regulatory Flexibility Act, 5 U.S.C. 601, et seq. Therefore, an Initial
Regulatory Flexibility Analysis has not been performed.
E. Paperwork Reduction Act
The Paperwork Reduction Act (44 U.S.C. chapter 35) applies. The
proposed rule contains an information collection requirement.
Accordingly, USAID has submitted a request to the Office of Management
and Budget for approval of a new information collection requirement
concerning ``Access to USAID Facilities and USAID's Information
Systems'' and the
[[Page 10472]]
monthly reports of employees requiring access.
Access to USAID Facilities and USAID's Information Systems
Public reporting burden for this collection of information is
estimated to average initially eight hours immediately after contract
award to develop the list of employee's requiring access, then 2 hours
per month to update such a list, including the time for reviewing
instructions, gathering/maintaining the employee names, and forwarding
the list to the agency for processing. The recordkeeping requirements
are minor. While a contractor is required to identify and submit the
list of its employees who require access, there is no requirement to
collect this information in a particular format for submission to the
agency.
The annual reporting burden is estimated as follows:
Total number of respondents and the amount of time estimated for an
average respondent to respond: 138 contractors; eight hours for the
initial report, 24 hours annually thereafter for submission of the
monthly reports.
Total public burden (in hours) associated with the collection:
1,104 hours initially, and 3,312 hours annually thereafter.
Total public burden (in cost) associated with the collection:
Initial submission, $54,537, then $163,613 annually thereafter.
When submitting comments on these information collections, your
comments should address one or more of the following four points:
(1) Evaluate whether the proposed collection of information is
necessary for the proper performance of the functions of the agency,
including whether the information will have practical utility;
(2) Evaluate the accuracy of the agency's estimate of the burden of
the proposed collection of information, including the validity of the
methodology and assumptions used;
(3) Ways to enhance the quality, utility, and clarity of the
information to be collected; and
(4) Ways which USAID can minimize the burden of the collection of
information on those who are to respond, including through the use of
appropriate automated, electronic, mechanical, or other technological
collection techniques or other forms of information technology, e.g.,
permitting electronic submission of responses.
List of Subjects in 48 CFR parts 739 and 752
Government procurement.
For the reasons discussed in the preamble, USAID proposes to amend
48 CFR Parts 739 and 752 as set forth below:
0
1. Add part 739 to read as follows:
PART 739--Acquisition of Information Technology
Sec.
739.002 Definitions
739.003 [Reserved]
Authority: Sec. 621, Pub. L. 87-195, 75 Stat. 445, (22 U.S.C.
2381) as amended; E.O. 12163, Sept. 29, 1979, 44 FR 56673; and 3 CFR
1979 Comp., p. 435.
739.002 Definitions.
As used in this part--
Information Technology means
(1) Any services or equipment, or interconnected system(s) or
subsystem(s) of equipment, that are used in the automatic acquisition,
storage, analysis, evaluation, manipulation, management, movement,
control, display, switching, interchange, transmission, or reception of
data or information by the agency; where
(2) Such services or equipment are ``used by an agency'' if used by
the agency directly or if used by a contractor under a contract with
the agency that requires either use of the services or equipment or
requires use of the services or equipment to a significant extent in
the performance of a service or the furnishing of a product.
(3) The term ``information technology'' includes computers,
ancillary equipment (including imaging peripherals, input, output, and
storage devices necessary for security and surveillance), peripheral
equipment designed to be controlled by the central processing unit of a
computer, software, firmware and similar procedures, services
(including provisioned services such as cloud computing and support
services that support any point of the lifecycle of the equipment or
service), and related resources.
(4) The term ``information technology'' does not include any
equipment that is acquired by a contractor incidental to a contract
that does not require use of the equipment.
739.003 [Reserved]
PART 752--SOLICITATION PROVISIONS AND CONTRACT CLAUSES
0
2. The authority for part 752 continues to read as follows:
Authority: Sec. 621, Pub. L. 87-195, 75 Stat. 445, (22 U.S.C.
2381) as amended; E.O. 12163, Sept. 29, 1979, 44 FR 56673; and 3 CFR
1979 Comp., p. 435.
0
3. Amend section 752.204-72 by revising the section heading and the
clause to read as follows:
752.204-72 Homeland Security Presidential Directive-12 (HSPD-12) and
Personal Identity Verification (PIV).
* * * * *
Homeland Security Presidential Directive-12 (HSPD-12) and Personal
Identity Verification (PIV) (Date)
(a) Individuals engaged in the performance of this award as
employees, consultants, or volunteers of the contractor must comply
with all applicable HSPD-12 and PIV procedures, as described below,
and any subsequent USAID or Government-wide HSPD-12 and PIV
procedures/policies.
(b) A U.S. citizen or resident alien engaged in the performance
of this award as an employee, consultant, or volunteer of a U.S firm
may obtain access to USAID facilities or logical access to USAID's
information systems only when and to the extent necessary to carry
out this award and in accordance with this clause. The contractor's
employees, consultants, or volunteers who are not U.S. citizens or
resident aliens as well as employees, consultants, or volunteers of
non-U.S. firms, irrespective of their citizenship, will not be
granted logical access to U.S. Government information technology
systems (such as Phoenix, GLAAS, etc.) and must be escorted to use
U.S. Government facilities (such as office space).
(c) (1) No later than five business days after award, the
Contractor must provide to the Contracting Officer's Representative
(COR) a complete list of employees that require access to USAID
facilities or information systems.
(2) Before a contractor (or a contractor employee, consultant,
or volunteer) or subcontractor at any tier may obtain a USAID ID
(new or replacement) authorizing the individual routine access to
USAID facilities in the United States, or logical access to USAID's
information systems, the individual must provide two forms of
identity source documents in original form to the Enrollment Office
personnel when undergoing processing. One identity source document
must be a valid Federal or State Government-issued picture ID.
Contractors may contact the USAID Security Office to obtain the list
of acceptable forms of documentation. Submission of these documents,
to include documentation of security background investigations, is
mandatory in order for the contractor to receive a PIV or PIV-
Alternative (PIV-A)/Facilities Access Card (FAC) card and be granted
access to any of USAID's information systems. All such individuals
must physically present these two source documents for identity
proofing at their enrollment.
(d) The Contractor must send a staffing report to the COR by the
fifth day of each month. The report must contain the listing of
[[Page 10473]]
all staff members with access who were separated or hired under this
contract in the past sixty (60) calendar days. This report must be
submitted even if no separations or hiring occurred during the
reporting period. Failure to submit the `Contractor Staffing Change
Report' each month may, at USAID's discretion, result in the
suspension of all logical access to USAID information systems and/or
facilities access associated with this contract. USAID will provide
the contractor the format for this report.
(e) Contractor employees are strictly prohibited from sharing
logical access to USAID information systems and Sensitive
Information. USAID will disable accounts and revoke logical access
to USAID IT systems if Contractor employees share accounts.
(f) USAID, at its discretion, may suspend or terminate the
access to any systems and/or facilities when an Information Security
Incident or electronic access violation, use, or misuse incident
gives cause for such action. The suspension or termination may last
until such time as USAID determines that the situation has been
corrected or no longer exists.
(g) The Contractor must notify the COR and the USAID Service
Desk at least five business days prior to the Contractor employee's
removal from the contract. For unplanned terminations of Contractor
employees, the Contractor must immediately notify the COR and the
USAID Service Desk (CIO-HELPDESK@usaid.gov or (202) 712-1234). The
Contractor or its Facilities Security Officer must return USAID PIV/
FAC cards and remote authentication tokens issued to Contractor
employees to the COR prior to departure of the employee or upon
completion or termination of the contract, whichever occurs first.
(h) The contractor is required to insert this clause (including
this paragraph (h) in any subcontracts that require the
subcontractor, subcontractor employee, or consultant to have routine
physical access to USAID space or logical access to USAID's
information systems.
(End of Clause)
0
4. Add section 752.204-XX to read as follows:
752.204-XX USAID-Financed Third-Party Websites.
Insert the following clause in USAID-funded solicitations and
contracts that require development and/or maintenance of a third-party
website to achieve project implementation goals.
USAID-Financed Third-Party Websites (Date)
(a) Definitions: ``Third-party websites''
Websites hosted on environments external to USAID boundaries and
not directly controlled by USAID policies and staff, except through
the terms and conditions of a contract. Third-party websites include
project websites.
(b) The contractor must adhere to the following requirements
when developing, launching, and maintaining a third-party website
funded by USAID for the purpose of meeting the project
implementation goals:
(1) Prior to website development, the Contractor must provide
information as required in Section C-Statement of Work of the
contract (including a copy of their Contractor's privacy policy) to
the Contracting Officer's Representative (COR), for USAID's Bureau
for Legislative and Public Affairs (LPA) evaluation and approval.
The Contractor must notify the COR of the website URL as far in
advance of the site's launch as possible and must not launch the
website until USAID's approval has been provided through the COR.
The Contractor must provide the COR any changes to the Contractor's
privacy policy for the duration of the contract.
(2) The Contractor must collect only the amount of information
necessary to complete the specific business need as required by
statute, regulation, or Executive Order.
(3) The Contractor must comply with Agency branding and marking
requirements comprised of the USAID logo and brandmark with the
tagline ``from the American people,'' located on the USAID website
at www.usaid.gov/branding, and USAID Graphics Standards manual at
https://www.usaid.gov.
(4) The website must be marked on the index page of the site and
every major entry point to the website with a disclaimer that
states:
``The information provided on this website is not official U.S.
Government information and does not represent the views or positions
of the U.S. Agency for International Development or the U.S.
Government.''
(5) The website must provide persons with disabilities access to
information that is comparable to the access available to others. As
such, all site content must be compliant with the requirements of
the Section 508 of the Rehabilitation Act, as amended (29 U.S.C.
794d) (``Section 508'') and other terms and conditions of the
contract.
(6) The Contractor must identify and provide to the COR, in
writing, the contact information for the Contractor's information
security point of contact. The contractor is responsible for
updating the contact information whenever there is a change in
personnel assigned to this role.
(7) The Contractor must provide adequate protection from
unauthorized access, alteration, disclosure, or misuse of
information processed, stored, or transmitted on the websites. To
minimize security risks and ensure the integrity and availability of
information, the Contractor must use sound: System/software
management; engineering and development; and secure-coding practices
consistent with USAID standards and information security best
practices. Rigorous security safeguards, including but not limited
to, virus protection; network intrusion detection and prevention
programs; and vulnerability management systems must be implemented
and critical security issues must be resolved as quickly as possible
or within 30 calendar days. Contact the USAID Chief Information
Security Officer (CISO) at ISSO@usaid.gov for specific standards and
guidance.
(8) The Contractor must conduct periodic vulnerability scans,
mitigate all security risks identified during such scans, and report
subsequent remediation actions to CISO at ISSO@usaid.gov and COR
within 30 calendar days from the date vulnerabilities are
identified. The report must include disclosure of the tools used to
conduct the scans. Alternatively, the contractor may authorize USAID
CISO at ISSO@usaid.gov to conduct periodic vulnerability scans via
its Web-scanning program. The sole purpose of USAID scanning will be
to minimize security risks. The Contractor will be responsible for
taking the necessary remediation action and reporting to USAID as
specified above.
(c) For general information, agency graphics, metadata, privacy
policy, and Section 508 compliance requirements, refer to https://www.usaid.gov.
(End of Clause)
0
5. Add section 752.239-XX to read as follows:
752.239-XX Limitation on Acquisition of Information Technology.
Insert the following clause in all solicitations and contracts
unless the special contract requirement Information Technology Approval
is included.
Limitation on Acquisition of Information Technology (Date)
(a) Definitions. As used in this contract:
Information Technology means
(1) Any services or equipment, or interconnected system(s) or
subsystem(s) of equipment, that are used in the automatic
acquisition, storage, analysis, evaluation, manipulation,
management, movement, control, display, switching, interchange,
transmission, or reception of data or information by the agency;
where
(2) such services or equipment are ``used by an agency'' if used
by the agency directly or if used by a contractor under a contract
with the agency that requires either use of the services or
equipment or requires use of the services or equipment to a
significant extent in the performance of a service or the furnishing
of a product.
(3) The term ``information technology'' includes computers,
ancillary equipment (including imaging peripherals, input, output,
and storage devices necessary for security and surveillance),
peripheral equipment designed to be controlled by the central
processing unit of a computer, software, firmware and similar
procedures, services (including provisioned services such as cloud
computing and support services that support any point of the
lifecycle of the equipment or service), and related resources.
(4) The term ``information technology'' does not include any
equipment that is acquired by a contractor incidental to a contract
that does not require use of the equipment.
(b) The Federal Information Technology Acquisition Reform Act
(FITARA) requires Agency Chief Information Officer (CIO) review and
approval of contracts that include information technology or
information technology services.
[[Page 10474]]
(c) The Contractor must not acquire information technology as
defined in this clause without the prior written approval by the
contracting officer as specified in this clause.
(d) Request for Approval Requirements:
(1) If the Contractor determines that any information technology
will be necessary to meet the Government's requirements or to
facilitate activities in the Government's statement of work, the
Contractor must request prior written approval from the Contracting
Officer.
(2) As part of the request, the Contractor must provide the
Contracting Officer a description and an estimate of the total cost
of the information technology equipment, software, or services to be
procured under this contract. The Contractor must simultaneously
notify the Contracting Officer's Representative (COR) and the Office
of the Chief Information Office at ITAuthorization@usaid.gov.
(e) The Contracting Officer will provide written approval to the
Contractor through modification to the contract expressly specifying
the information technology equipment, software, or services approved
for purchase by the COR and the Agency CIO. The Contracting Officer
will include the applicable clauses and any special contract
requirements in the modification.
(f) Except as specified in the contracting officer's written
approval, the Government is not obligated to reimburse the
Contractor for any costs incurred for information technology as
defined in this clause. Such approval does not relieve the
Contractor from the responsibility to maintain current compliance at
all times--including through any updates or modifications to the
information technology--with all terms and conditions of the
contract, as well as relevant statutes and regulations.
(g) The Contractor must insert the substance of this clause,
including this paragraph (g), in all subcontracts.
(End of Clause)
0
6. Add section 752.239-XX to read as follows:
752.239-XX Software License.
Insert the following clause in solicitations and contracts for new
software licenses or to renew existing licenses, and in solicitations
and contracts which may include a requirement for new software licenses
or renewal of existing licenses.
Software License Addendum (Date)
(a) This clause incorporates certain terms and conditions
relating to Federal procurement actions. The terms and conditions of
this Addendum take precedence over the terms and conditions
contained in any license agreement or other contract documents
entered into between the parties.
(b) Governing Law: Federal procurement law and regulations,
including the Contract Disputes Act, 41 U.S.C. 601 et seq., and the
Federal Acquisition Regulation (FAR), govern the agreement between
the parties. Litigation arising out of this contract may be filed
only in those fora that have jurisdiction over Federal procurement
matters.
(c) Attorney's Fees: Attorney's fees are payable by the Federal
government in any action arising under this contract only pursuant
to the Equal Access in Justice Act, 5 U.S.C. 504.
(d) No Indemnification: The Federal government will not be
liable for any claim for indemnification; such payments may violate
the Anti-Deficiency Act, 31 U.S.C. 1341(a).
(e) Assignment: Payments may only be assigned in accordance with
the Assignment of Claims Act, 31 U.S.C. 3727, and FAR Subpart 32.8,
``Assignment of Claims.''
(f) Patent and Copyright Infringement: Patent or copyright
infringement suits brought against the United States as a party may
only be defended by the U.S. Department of Justice (28 U.S.C. 516).
(g) Renewal of Support after Expiration of this Award: Service
will not automatically renew after expiration of the initial term of
award.
(h) Renewal may only occur in accord with (1) the mutual
agreement of the parties; or (2) an option renewal clause allowing
the Government to unilaterally exercise one or more options to
extend the term of the award.
(End of Clause)
0
7. Add section 752.239-72 to read as follows:
752.239-72 Information and Communication Technology Accessibility.
Insert the following clause in solicitations and contracts that
include acquisition of Information and Communication Technology (ICT)
supplies and/or services for use by Federal employees or U.S. members
of the public.
Information and Communication Technology Accessibility
(Date)
(a) Federal agencies are required by Section 508 of the
Rehabilitation Act of 1973, as amended (29 U.S.C. 794d), to offer
access to information and communication technology for disabled
individuals within its employment, and for disabled members of the
public seeking information and services. This access must be
comparable to that which is offered to similar individuals who do
not have disabilities. Standards for complying with this law are
prescribed by the Architectural and Transportation Barriers
Compliance Board (``The Access Board'') in 36 CFR part 1194, which
implements Section 508 of the Rehabilitation Act of 1973, as
amended, and is viewable at https://www.access-board.gov/sec508/508standards.htm. The contractor must comply with any future updates
of standards by the Access Board.
(b) Except as indicated elsewhere in the contract, all ICT
procured through this contract must meet the applicable
accessibility standards at 36 CFR part 1194 as follows:
(1) Section 1194.21 Software applications and operating systems
(2) 1194.22 Web-based intranet and internet information and
applications;
(3) Section 1194.23 Telecommunications products;
(4) Section 1194.24 Video and multimedia products;
(5) Section 1194.25 Self-contained, closed products;
(6) Section 1194.26 Desktop and portable computers;
(7) Section 1194.31 Functional performance criteria; and
(8) Section 1194.41 Information, documentation, and support.
(c) Deliverable(s) must incorporate these standards as well.
(d) The final work product must include documentation that the
deliverable conforms with the Section 508 Standards promulgated by
the US Access Board.
(End of Clause)
0
8. Add section 752.239-XX to read as follows:
752.239-XX Use of Information Technology Approval.
Insert the following clause in all USAID solicitations and
contracts for Information Technology (IT) services or supplies or
include a requirement for the contractor to provide IT services or
supplies.
Use of Information Technology Notification (Date)
(a) Definitions. As used in this contract:
Information Technology means
(1) Any services or equipment, or interconnected system(s) or
subsystem(s) of equipment, that are used in the automatic
acquisition, storage, analysis, evaluation, manipulation,
management, movement, control, display, switching, interchange,
transmission, or reception of data or information by the agency;
where
(2) Such services or equipment are ``used by an agency'' if used
by the agency directly or if used by a contractor under a contract
with the agency that requires either use of the services or
equipment or requires use of the services or equipment to a
significant extent in the performance of a service or the furnishing
of a product.
(3) The term ``information technology'' includes computers,
ancillary equipment (including imaging peripherals, input, output,
and storage devices necessary for security and surveillance),
peripheral equipment designed to be controlled by the central
processing unit of a computer, software, firmware and similar
procedures, services (including provisioned services such as cloud
computing and support services that support any point of the
lifecycle of the equipment or service), and related resources.
(4) The term ``information technology'' does not include any
equipment that is acquired by a contractor incidental to a contract
that does not require use of the equipment. (OMB M-15-14)
(b) The Federal Information Technology Acquisition Reform Act
(FITARA) requires
[[Page 10475]]
Agency Chief Information Officer (CIO) review and approval of
contracts or interagency agreements for information technology or
information technology services.
(c) The approved information technology and/or information
technology services are specified in the Schedule of this contract.
The Contractor must not acquire additional information technology
without the prior written approval of the Contracting Officer as
specified in this clause.
(d) Request for Approval Requirements:
(1) If the Contractor determines that any information technology
in addition to that information technology specified in the Schedule
will be necessary to meet the Government's requirements or to
facilitate activities in the Government's statement of work, the
Contractor must request prior written approval from the Contracting
Officer.
(2) As part of the request, the Contractor must provide the
Contracting Officer a description and an estimate of the total cost
of the information technology equipment, software, or services to be
procured under this contract. The Contractor must simultaneously
notify the Contracting Officer's Representative (COR) and the Office
of the Chief Information Officer at ITAuthorization@usaid.gov.
(e) The Contracting Officer will provide written approval to the
Contractor expressly specifying the information technology
equipment, software, or services approved for purchase by the COR
and the Agency CIO. Additional clauses or special contract
requirements may be applicable and will be incorporated by the
Contracting Officer through a modification to the contract.
(f) Except as specified in the Contracting Officer's written
approval, the Government is not obligated to reimburse the
Contractor for costs incurred in excess of the information
technology equipment, software or services specified in the
Schedule. Such approval does not relieve the Contractor from the
responsibility to maintain current compliance at all times--
including through any updates or modifications to the information
technology--with meeting all terms and conditions of the contract,
as well as relevant statutes and regulations.
(d) The Contractor must insert the substance of this clause,
including this paragraph (g), in all subcontracts.
(End of Clause)
0
9. Add section 752.239-XX to read as follows:
752.239-XX Skills and Certification Requirements for Privacy and
Security Staff.
Insert the following clause in solicitations and contracts for
Information Technology (IT) services and in solicitations and contracts
that include a component for IT services.
Skills and Certification Requirements for Privacy and Security Staff
(Date)
(a) Applicability: This clause applies to the Contractor, its
subcontractors and personnel providing support under this contract
and addresses the Privacy Act of 1974 (5 U.S.C. 552a--the Act) and
Federal Information Security Management Act (FISMA) of 2002 (FISMA,
Pub. L. 107-347. 44 U.S.C. 3531-3536).
(b) Contractor personnel filling the role of Information System
Security Officer and Information Security Specialists must possess a
Certified Information Systems Security Professional (CISSP)
certification at time of contract award and maintain their
certification throughout the period of performance. This will
fulfill the requirements for specialized training due to the
continuing education requirements for the certification. Contractor
personnel must provide proof of their certification status upon
request.
(c) Contractor personnel filling the role of Privacy Analysts
must possess a Certified Information Privacy Professional (CIPP)
credential with a CIPP/USat the time of the contract award and must
maintain the credential throughout the period of performance. This
will fulfill the requirements for specialized training due to the
continuing education requirements for the certification. Contractor
personnel must provide proof of their certification status upon
request.
(End of Clause)
Mark Walther,
Chief Acquisition Officer, Acting.
[FR Doc. 2019-04654 Filed 3-20-19; 8:45 am]
BILLING CODE 6116-02-P