DoD final rule for the detection and avoidance of counterfeit electronic parts impacts contractors operations

Size: px
Start display at page:

Download "DoD final rule for the detection and avoidance of counterfeit electronic parts impacts contractors operations"

Transcription

1 Government contracts alert Nixon Peabody LLP DoD final rule for the detection and avoidance of counterfeit electronic parts impacts contractors operations June 25, 2014 By Vincent J. Napoleon and Nia D. Newton Addressing the issue of counterfeit parts in the defense supply chain has been an issue of significance for those in our government responsible for the acquisition and fielding of sophisticated systems. The infiltration of counterfeit parts into the DoD supply chain, which drives the U.S. military s major weapon systems, could expose our military personnel to hazards during critical operations and subject critical missions to risk of failure. The Department of Defense (DoD) has established directives to prevent the introduction of counterfeit materials and parts in the DoD supply chain, particularly directed at counterfeit materials which present a threat to personnel safety and mission assurance. 1 Recently, to address these concerns, the DoD published a final rule imposing various requirements and responsibilities on DoD contractors to detect and avoid counterfeit electronic parts. This alert describes the final rule and how it will affect contractors operations moving forward. Background In 2011, the Senate Armed Services Committee (SASC) launched an investigation into counterfeit electronic parts in the DoD supply chain after a January 2010 Department of Commerce survey disclosed that incidents of counterfeit parts in the defense supply chain had increased dramatically between 2005 and By the close of SASC s investigation in 2012, the SASC published a report that it had uncovered overwhelming evidence of counterfeit electronic parts infiltrating the DoD supply chain, which were primarily traced back to China and not sufficiently reported by contractors. SASC also discovered that the DoD was not properly informed of the scope and impact of counterfeit parts in its systems. More importantly, the SASC concluded that the defense supply chain, which relies on unvetted independent distributors to supply electronic parts for some of the most sensitive defense systems, was compromised. Critical military systems such as the U.S. Army s Terminal High Altitude Area Defense (THAAD) missile, the U.S. Navy s SH-60B helicopter and the P-8A Poseidon aircraft, the U.S. Air Force s C-17, C-130J, C-27J aircraft and their resultant missions were exposed to an unacceptable risk of failure. In all, the SASC concluded the following: 1 DEPARTMENT OF DEFENSE, INSTRUCTION: DoD COUNTERFEIT PREVENTION POLICY NO , (2013). This newsletter is intended as an information source for the clients and friends of Nixon Peabody LLP. The content should not be construed as legal advice, and readers should not act upon information in the publication without professional counsel. This material may be considered advertising under certain rules of professional conduct. Copyright 2014 Nixon Peabody LLP. All rights reserved.

2 China is the dominant source for counterfeit electronic parts that are infiltrating the defense supply chain. The Chinese Government has failed to take steps to stop counterfeiting operations that are carried out openly in that country. The DoD lacks knowledge of the scope and impact of counterfeit parts on critical defense systems. The use of counterfeit electronic parts in defense systems can compromise performance and reliability, risk national security and endanger the safety of military personnel. Permitting contractors to recover costs incurred as a result of their own failure to detect counterfeit electronic parts does not encourage the adoption of aggressive counterfeit avoidance and detection programs. The defense industry s reliance on unvetted independent distributors to supply electronic parts for critical military applications results in unacceptable risks to national security and the safety of U.S. military personnel. Weaknesses in the testing regime for electronic parts create vulnerabilities that are exploited by counterfeiters. The defense industry routinely failed to report cases of suspect counterfeit parts, putting the integrity of the defense supply chain at risk. As a result of the 2012 SASC report, the DoD released a proposed rule in May 2013 that would implement Section 818 of the 2012 National Defense Authorization Act (NDAA) and Section 833 of the 2013 NDAA ( Proposed Rule ). The Proposed Rule would modify the Defense Federal Acquisition Regulation Supplement (DFARS) by requiring DoD contractors to detect and avoid counterfeit electronic parts. More specifically, the 818 proposal would require the Secretary of Defense to assess the DoD s acquisition policies and systems for the detection and avoidance of counterfeit electronic parts. Section 833 would impose counterfeit prevention obligations on defense contractors who were subject to Cost Accounting Standards (CAS) and that supplied electronic parts or products that include electronic parts under CAS-covered contracts. Those contractors would be responsible for avoiding and detecting the use or inclusion of counterfeit electronic parts or suspect-counterfeit electronic parts by developing counterfeit electronic part avoidance and detection systems that would implement policies and procedures. The policies and procedures address: 1) Training of personnel; 2) Inspection and testing of electronic parts, including criteria for acceptance and rejection; 3) Processes to abolish counterfeit parts proliferation; 4) Mechanisms to enable traceability of parts to suppliers; 5) Use and qualification of trusted suppliers;

3 6) Reporting and quarantining of counterfeit electronics parts and suspect-counterfeit electronic parts; 7) Methodologies to identify suspect-counterfeit parts; 8) Design, operation and maintenance of systems to detect and avoid counterfeit electronic parts and suspect-counterfeit parts; and 9) Flow down of counterfeit avoidance and detection requirements to subcontractors. On May 16, 2014, the DoD issued its final rule on how contractors should address and treat the issue of counterfeit electronic parts in their supply chain when responding to government requirements ( Final Rule ). The DoD s Final Rule significantly changes contractor responsibilities to detect and avoid the use or inclusion of counterfeit or suspect-counterfeit electronic parts, the use of trusted suppliers and contractors reporting requirements of counterfeit and suspectcounterfeit electronic parts. Among the Final Rule changes is the imposition of a new DFARS clause (titled Contractor Counterfeit Electronic Part Detection and Avoidance System (May 2014)) that establishes actions contractors must take to develop and maintain an acceptable counterfeit part detection and avoidance system when contractors supply electronic parts or assemblies containing electronic parts to the government. DFARS DFARS limits its coverage to those contractors subject to Cost Accounting Standards (CAS) as outlined in 41 U.S.C et seq. However, DFARS acknowledges that all levels of the supply chain have the potential to introduce counterfeit or suspect-counterfeit electronic items into the end items contracted for under a CAS-covered prime contract. Ultimately, responsibility for preventing introduction of counterfeit parts flows down to all subcontractors and suppliers of CAS-covered prime contractors regardless of the coverage or size of the subcontractors or suppliers. Counterfeit electronic part detection and avoidance system criteria Under the Final Rule, the DoD renders contractors responsible for establishing and maintaining an acceptable counterfeit electronic part detection and avoidance system, which must include riskbased policies and procedures that address, at a minimum, twelve enumerated areas. In addition to the nine policy and procedure areas outlined in the Proposed Rule, the Final Rule outlines three additional policies and procedures that should be established and implemented and would result in an adequate counterfeit electronic part avoidance and detection system. These policies and procedures include establishing and implementing the following: 1) a process for keeping continually informed of current counterfeiting information and trends; 2) a process for screening Government-Industry Data Exchange Program (GIDEP) reports and other credible sources of counterfeiting information; and 3) a process for controlling obsolete electronic parts. Notwithstanding these additional requirements, the DoD does not endorse specific mechanisms or technologies to satisfy the twelve requirements. Failure to maintain an acceptable counterfeit electronic part avoidance and detection system could result in the contracting officer s disapproval of the contractor s purchasing system and could cause a withholding of payments to the contractor.

4 Cost allowability The Final Rule shifts the risk and cost of counterfeit parts to contractors. The rule establishes that costs of rework or corrective action when counterfeit parts were improperly introduced into the DoD supply chain are unallowable. However, the DoD s proposal did provide specific exceptions that would enable costs to be reimbursed when a contractor 1) had a DoD-reviewed and approved operational system to detect and avoid counterfeit parts, 2) the counterfeit or suspect-counterfeit electronic parts were provided as government-furnished property and 3) the contractor provided notice to the government within 60 days of becoming aware of a counterfeit or suspect counterfeit electronic part. Some government contracting practitioners agree that while most contractors may be able to meet these requirements, subcontractors and suppliers which do not operate on a cost reimbursement basis with the government are unlikely to have their costs allowed. In the case of contractors performing pursuant to cost reimbursement contracts, reimbursement of costs will be based on the FAR principles of cost allowability. Definitional concerns The Final Rule is limited to electronic parts and specifically covers counterfeit electronic parts, 2 suspect counterfeit electronic parts, 3 and obsolete electronic parts. 4 While there are no apparent and significant differences between the definition of these terms in the Proposed Rule and the Final Rule, there is concern among some commenters to the Proposed Rule regarding the credible evidence standard used in the definition of suspect counterfeit electronic parts and the lack of guidance given in the definition of obsolete electronic parts. Some commenters to the Proposed Rule argue that the credible evidence standard (equivalency of a reasonableness standard) is overbroad and the absence of a designated procedure for determining whether a part is suspect counterfeit makes contractors and suppliers more vulnerable to unintentionally violating the DFARS mandatory disclosure rules. The DoD s response to these concerns recognizes that it is not practical or cost-effective to test every case of a suspected counterfeit, but that the phrase credible evidence along with examples strengthens a fact-based approach. Commenters to the Proposed Rule also express concern that the definition of obsolete parts does not address known risks and challenges of the DoD s continued use of obsolete and out-ofproduction parts, the vulnerabilities created by the continued demand for such parts, and the increasing constraint on DoD s ability to support and find ways to eliminate continued dependence 2 A counterfeit electronic part is defined as unlawful or unauthorized reproduction, substitution, or alteration that has been knowingly mismarked, misidentified, or otherwise misrepresented to be an authentic, unmodified electronic part from the original manufacture, or a source with the express written authority of the original manufacturer, or a source with the express written authority of the original manufacturer. Unlawful or unauthorized substitution is described to include used electronic parts represented as new, or the false identification of grade, serial number, lot number, date code, or performance characteristics. 3 A suspect counterfeit part is defined as an electronic part for which credible evidence (including, but not limited to, visual inspection or testing) provides reasonable doubt that the electronic part is authentic. 4 An obsolete electronic part is defined as an electronic part that is no longer in production by the original manufacturer or an aftermarket manufacture that has been provided express written authorization from the current design activity or original manufacturer.

5 on these parts. Commenters note that electronic parts have life cycles far shorter than the defense and aerospace products using them, so guidance from the DoD on what processes to use to mitigate risks inherent with obsolete parts is essential for contractor compliance. Obsolescence control is a fundamental aspect of counterfeit prevention and should be addressed by the contractor in its counterfeit detection and avoidance system. Looking ahead To ensure that counterfeit materials do not present a threat to U.S. personnel and mission assurance, the DoD s Final Rule obligates all contractors providing electronic parts to the government to take proactive steps to identify and prevent counterfeit components from entering the DoD supply chain. This means that contractors are absorbing a greater burden in protecting and insulating the DoD supply chain from the risk of compromise. As a result of this burden, contractors will incur far greater costs for ensuring that their counterfeit detection and avoidance systems are appropriate and capable of minimizing the risk of exposure inherent in a compromised supply chain system. Increased liability also means that contractors will now be responsible for keeping subcontractors and suppliers accountable for the electronic parts that subcontractors and suppliers introduce to the market. This will likely force some contractors to expand the scope of their internal audit and compliance teams to review and audit the counterfeit detection and avoidance systems, which will inevitably raise contractors costs. One of the more challenging areas for contractors going forward is their response to the Final Rule s reference to obsolete parts that are no longer being produced and not easily traceable to the original manufacturer. Certainly, some contractors may be left with only two options as they attempt to address this issue contractors may either engage in the costly option of stocking up on parts while they are being made by original manufacturers or be forced to ensure that obsolete parts being purchased are from trusted suppliers. No matter the decisions, if contractors have to implement systems that account for obsolete parts compliance, the overall price of contractors contracts with the government will likely increase. The DoD claims that new requirements should not affect small business contractors; however, it is conceivable that higher costs, risks and liabilities could be detrimental to a smaller firm that does not have the money to establish new systems or hire new people. Because suppliers and subcontractors do not operate on a cost reimbursement basis with the government, they may also increase their prices to include such costs. As a result, prime contractors can anticipate paying more for the contracts with their subcontractors or suppliers. For more information on the content of this alert, please contact your Nixon Peabody attorney or: Vincent J. Napoleon at vnapoleon@nixonpeabody.com or

The New DoD Rules on Counterfeit Electronic Parts. Chris Haile Cathy Kunz Richard Arnholt Grant Book Jason Lynch June 5, 2014

The New DoD Rules on Counterfeit Electronic Parts. Chris Haile Cathy Kunz Richard Arnholt Grant Book Jason Lynch June 5, 2014 The New DoD Rules on Counterfeit Electronic Parts Chris Haile Cathy Kunz Richard Arnholt Grant Book Jason Lynch June 5, 2014 Introductions Chris Haile Cathy Kunz Richard Arnholt Grant Book Jason Lynch

More information

Presentation of April 22, 2015

Presentation of April 22, 2015 A Standards Based Way To Avoid Counterfeit Electronic Parts Presentation of April 22, 2015 Robert S. Metzger Rogers Joseph O Donnell, P.C. 750 Ninth Street, N.W., Ste 710 Washington, D.C. 20001 (202) 777

More information

New FAR/DFARS Compliance Challenges for Small Businesses in 2014. Frank S. Murray

New FAR/DFARS Compliance Challenges for Small Businesses in 2014. Frank S. Murray New FAR/DFARS Compliance Challenges for Small Businesses in 2014 Frank S. Murray NDIA Small Business Conference September 10, 2014 Overview Recent Compliance Trends New and Proposed Rules regarding Counterfeit

More information

Insights and Commentary from Dentons

Insights and Commentary from Dentons dentons.com Insights and Commentary from Dentons The combination of Dentons US and McKenna Long & Aldridge offers our clients access to 1,100 lawyers and professionals in 21 US locations. Clients inside

More information

The Devil is in the Details Compliance with the Business Systems Rule

The Devil is in the Details Compliance with the Business Systems Rule Metropolitan Area Corporate Counsel Association WMACCA Conference on Ethics and Compliance for Government Contractors The Devil is in the Details Compliance with the Business Systems Rule April 1, 2014

More information

Counterfeit Parts Prevention

Counterfeit Parts Prevention Counterfeit Parts Prevention 1 Introduction / Objectives Counterfeiting is an age-old issue, but is growing in exponential proportions with respect to the types of: Products being counterfeited Industries

More information

Public Law 113 283 113th Congress An Act

Public Law 113 283 113th Congress An Act PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it

More information

Supply Chain Security: Reducing Threats to Citi Critical lsystems

Supply Chain Security: Reducing Threats to Citi Critical lsystems 9:00 9:45 AM Robert Metzger Rogers Joseph O'Donnell PC Supply Chain Security: Reducing Threats to Citi Critical lsystems Copyright 2013 ERAI, Inc. Supply Chain Security: Reducing Threats to Critical Systems

More information

Legislative Language

Legislative Language Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting

More information

QCI 012.4 Counterfeit Avoidance and Mitigation Procedure

QCI 012.4 Counterfeit Avoidance and Mitigation Procedure Page 1 of 6 Dept.: Quality Number: Counterfeit Avoidance and Mitigation Procedure Date Issued: 5/13/14 Supersedes Issue Dated: 2/13/14 Issued By: Lorenzo Belluccia, Quality Engineer Issuing Dept. Approval:

More information

NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2012 CONFERENCE REPORT H.R. 1540

NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2012 CONFERENCE REPORT H.R. 1540 112TH CONGRESS 1st Session " HOUSE OF REPRESENTATIVES! REPORT 112 329 NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2012 CONFERENCE REPORT TO ACCOMPANY H.R. 1540 DECEMBER 12, 2011. Ordered to be printed

More information

Supply Chain Risk Management. Operating ahead of the threat, not behind the vulnerabilities

Supply Chain Risk Management. Operating ahead of the threat, not behind the vulnerabilities Supply Chain Risk Management Operating ahead of the threat, not behind the vulnerabilities Navigation in the Meeting Room Notes box for audio information and other announcements To enlarge the slide, click

More information

TITLE III INFORMATION SECURITY

TITLE III INFORMATION SECURITY H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable

More information

MACPA 2014 Government Contractors Conference. Current Accounting Issues

MACPA 2014 Government Contractors Conference. Current Accounting Issues MACPA 2014 Government Contractors Conference Current Accounting Issues Jim Thomas Partner, September 18, 2014 Agenda 1. Current Environment 2. Regulatory Update 3. DCMA and DCAA Recent Guidance and Key

More information

GENERAL TERMS AND CONDITIONS OF PURCHASE Supplement 2 Government Contract Provisions from the Department of Defense FAR Supplement TC-003 ( 10/15)

GENERAL TERMS AND CONDITIONS OF PURCHASE Supplement 2 Government Contract Provisions from the Department of Defense FAR Supplement TC-003 ( 10/15) GENERAL TERMS AND CONDITIONS OF PURCHASE Supplement 2 Government Contract Provisions from the Department of Defense FAR Supplement TC-003 ( 10/15) 1. When the materials, and products ( goods ) or services,

More information

A White Paper Regarding Department of Defense Implementation of Section 818 of the National Defense Authorization Act for Fiscal Year 2012

A White Paper Regarding Department of Defense Implementation of Section 818 of the National Defense Authorization Act for Fiscal Year 2012 Prepared by Task Force on Counterfeit Parts of the Committee on Acquisition Reform and Emerging Issues of the American Bar Association Section of Public Contract Law A White Paper Regarding Department

More information

Kevin Sink VP of Quality TTI, Inc Fort Worth, Texas, USA kevin.sink@ttiinc.com

Kevin Sink VP of Quality TTI, Inc Fort Worth, Texas, USA kevin.sink@ttiinc.com IN SEARCH OF A WORKABLE COUNTERFEIT RISK MITIGATION STRATEGY: Lessons Learned in Review of the Current State of the Electronics Industry as Regards Counterfeit Mitigation Requirements for Suppliers Kevin

More information

Inside The Proposed DFARS Business Systems Rule

Inside The Proposed DFARS Business Systems Rule Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Inside The Proposed DFARS Business s Rule Law360,

More information

Anti-Counterfeit Policy Mouser has adopted this Anti-Counterfeit Policy to eliminate the impact of counterfeit products on Mouser and its customers.

Anti-Counterfeit Policy Mouser has adopted this Anti-Counterfeit Policy to eliminate the impact of counterfeit products on Mouser and its customers. QS-PR-024 Anti-Counterfeit Control Plan Approved by: Chuck Amsden Approved 1/19/15 This procedure is current and approved when viewed on-line. The procedure becomes uncontrolled when printed. Uncontrolled

More information

DCAA Audits of Compliance Systems and the Implications of Changes in the False Claims Act for Universities

DCAA Audits of Compliance Systems and the Implications of Changes in the False Claims Act for Universities DCAA Audits of Compliance Systems and the Implications of Changes in the False Claims Act for Universities SCCE s Higher Education Compliance Conference Kwamina Thomas Williford Partner, Holland & Knight

More information

Bell Standard Purchase Order Terms and Conditions - FAR/DFARS Clause Flow-Downs in Fulfillment of a U.S. Government Contract

Bell Standard Purchase Order Terms and Conditions - FAR/DFARS Clause Flow-Downs in Fulfillment of a U.S. Government Contract Section I FEDERAL ACQUISITION REGULATION (A) Seller agrees to negotiate with Buyer to incorporate additional provisions herein or to change provisions as Buyer reasonably deems necessary to comply with

More information

Open DFARS Cases as of 8/2/2016 8:15:55AM

Open DFARS Cases as of 8/2/2016 8:15:55AM Open DFARS Cases as of 8:15:55AM 2016-D028 252.225.7017, 252.225.7021, 252.225.7045 New Designated Country- Moldova 2016-D027 225.872-6 Request for Audit Services in France, Germany, the Netherlands, or

More information

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.

H. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION. H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.

More information

SEC.. COMMON OCCUPATIONAL AND HEALTH STANDARDS FOR. (1) by redesignating subsections (d), (e), and (f) as subsections (e), (f), and (g),

SEC.. COMMON OCCUPATIONAL AND HEALTH STANDARDS FOR. (1) by redesignating subsections (d), (e), and (f) as subsections (e), (f), and (g), SEC.. COMMON OCCUPATIONAL AND HEALTH STANDARDS FOR DIFFERENTIAL PAYMENTS AS A CONSEQUENCE OF EXPOSURE TO ASBESTOS. 1 8 9 10 11 1 1 1 1 1 1 18 19 0 (a) PREVAILING RATE SYSTEMS. Section of title, United

More information

Federal Regulatory Compliance Best Practices Washington Technology Webcast. September 27, 2012

Federal Regulatory Compliance Best Practices Washington Technology Webcast. September 27, 2012 Federal Regulatory Compliance Best Practices Washington Technology Webcast September 27, 2012 Agenda Topic Minutes Regulatory compliance overview 5 Major areas of financial compliance risk 15 Best practices

More information

KOLLMORGEN. Title: Standard Operating Procedure Counterfeit Parts

KOLLMORGEN. Title: Standard Operating Procedure Counterfeit Parts Approved By: Elliott Major Date: 11-19-09 Page 1 of 9 Rev ECO Date Approve Rev ECO Date Approve A R01_13541 07-23-10 DWL B R01_14787 12-15-11 DWL C R01_14910 03-07-12 DWL D R01_14964 04-16-12 DWL 1.0 Purpose

More information

How To Protect Your Data From Being Hacked

How To Protect Your Data From Being Hacked Cyber Division & Manufacturing Division Joint Working Group Cyber Security for the Advanced Manufacturing Enterprise Manufacturing Division Meeting June 4, 2014 Michael McGrath, ANSER michael.mcgrath@anser.org

More information

Implementing Program Protection and Cybersecurity

Implementing Program Protection and Cybersecurity Implementing Program Protection and Cybersecurity Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering Mark Godino Office of the Deputy Assistant Secretary of Defense

More information

California says think twice before using temporary workers or others from staffing agencies and other labor contractors

California says think twice before using temporary workers or others from staffing agencies and other labor contractors Employment Law ALERT Nixon Peabody LLP January 27, 2015 California says think twice before using temporary workers or others from staffing agencies and other labor contractors By Jeffrey M. Tanenbaum and

More information

DEPARTMENT OF DEFENSE Defense Contract Management Agency INSTRUCTION. Counterfeit Mitigation

DEPARTMENT OF DEFENSE Defense Contract Management Agency INSTRUCTION. Counterfeit Mitigation DEPARTMENT OF DEFENSE Defense Contract Management Agency INSTRUCTION Counterfeit Mitigation Multifunctional Instruction DCMA-INST 1205 LEAD: Quality Assurance Directorate 1. PURPOSE. This multifunctional

More information

Defense Acquisition Regulations System, DOD 252.227 7018

Defense Acquisition Regulations System, DOD 252.227 7018 Defense Acquisition Regulations System, DOD 252.227 7018 *****Enter none when all data or software will be submitted without restrictions. Date lllllllllllllllllllll Printed Name and Title lllllllllll

More information

LOCKHEED MARTIN CORPORATION PRIME SUPPLEMENTAL FLOWDOWN DOCUMENT (PSFD) ADDITIONAL TERMS AND CONDITIONS FOR SUBCONTRACTS/PURCHASE ORDERS UNDER

LOCKHEED MARTIN CORPORATION PRIME SUPPLEMENTAL FLOWDOWN DOCUMENT (PSFD) ADDITIONAL TERMS AND CONDITIONS FOR SUBCONTRACTS/PURCHASE ORDERS UNDER LOCKHEED MARTIN CORPORATION PRIME SUPPLEMENTAL FLOWDOWN DOCUMENT (PSFD) ADDITIONAL TERMS AND CONDITIONS FOR SUBCONTRACTS/PURCHASE ORDERS UNDER F-35 / JSF LRIP 8 Production (Combines Prime Contract #: N00019-13-C-0008,

More information

Decisions. Software Development Costs Lacked Sufficient Nexus To Government Contract

Decisions. Software Development Costs Lacked Sufficient Nexus To Government Contract Reprinted from The Government Contractor, with permission of Thomson Reuters. Copyright 2009. Further use without the permission of West is prohibited. For further information about this publication, please

More information

INSURANCE REQUIREMENTS FOR FEDERAL CONTRACTORS

INSURANCE REQUIREMENTS FOR FEDERAL CONTRACTORS INSURANCE REQUIREMENTS FOR FEDERAL CONTRACTORS This document is provided to supply you with information regarding insurance requirements on Government contracts. Please be advised that the samples are

More information

Addendum 529 (5/13) Page 1 of 5

Addendum 529 (5/13) Page 1 of 5 Additional Terms and Conditions E-2D Full Rate Production (FRP) Lot 2 (Prime Contract No. N00019-13-C-9999) All of the additional terms and conditions set forth below are incorporated in and made part

More information

IEC Electronics Terms and Conditions

IEC Electronics Terms and Conditions IEC Electronics Terms and Conditions 1. General: This Purchase Order is placed subject to these terms and conditions including those within the Purchase Order. The terms of any proposal referred to in

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the Integrated Visual and Auditory Continuous Performance Test (IVA-AE) US Army Medical Command - Defense Health Program (DHP) Funded Application SECTION 1: IS A PIA

More information

THE SECRETARY OF THE NAVY WASHINGTON DC 20350-1 000

THE SECRETARY OF THE NAVY WASHINGTON DC 20350-1 000 THE SECRETARY OF THE NAVY WASHINGTON DC 20350-1 000 MEMORANDUM OF DECISION SUBJECT: Authority to Indemnify Certain Contractors and Subcontractors Against Nuclear Risks and Unusually Hazardous Risks Attributable

More information

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products David M. Dreyfus Justin A. Heinonen Rod Kinghorn A-CAPP Backgrounder October 2013 Supply chain management can be the

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the Data Management Solution (Drager Infinity Gateway Suite) US Army Medical Command - Defense Health Program (DHP) Funded System SECTION 1: IS A PIA REQUIRED? a. Will

More information

Supplement 1 Federal Acquisition Regulation (FAR) Government Contract Provisions

Supplement 1 Federal Acquisition Regulation (FAR) Government Contract Provisions General Terms and Conditions of Purchase Supplement 1 Federal Acquisition Regulation (FAR) Government Contract Provisions 1. When the products or services furnished are for use in connection with a U.S.

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

GAO DEFENSE ACQUISITIONS. Knowledge of Software Suppliers Needed to Manage Risks. Report to Congressional Requesters

GAO DEFENSE ACQUISITIONS. Knowledge of Software Suppliers Needed to Manage Risks. Report to Congressional Requesters GAO United States General Accounting Office Report to Congressional Requesters May 2004 DEFENSE ACQUISITIONS Knowledge of Software Suppliers Needed to Manage Risks GAO-04-678 May 2004 DEFENSE ACQUISITIONS

More information

DoD Issues Interim Rule Addressing New Requirements for Cyber Incidents and Cloud Computing Services

DoD Issues Interim Rule Addressing New Requirements for Cyber Incidents and Cloud Computing Services DoD Issues Interim Rule Addressing New Requirements for Cyber Incidents and Cloud Computing Services August 27, 2015 Government Contracts Overview On August 26, 2015, the Department of Defense (DoD) issued

More information

TC-UPDATE (11/10) 52.222-39 252.204-7009. 12. Requirements Regarding Potential Access to Export-Controlled Items

TC-UPDATE (11/10) 52.222-39 252.204-7009. 12. Requirements Regarding Potential Access to Export-Controlled Items TC-UPDATE (11/10) The following updates reflect changes to various provisions and clauses of U.S. Government acquisition regulations, including the Federal Acquisition Regulations (FAR) and the Department

More information

A GOOD PRACTICE GUIDE FOR EMPLOYERS

A GOOD PRACTICE GUIDE FOR EMPLOYERS MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade

More information

Click to edit Master title style

Click to edit Master title style Click to edit Master title style Click The to Business edit Master title style Operations Center and CPSRs Breakout Third Session level # D08 Andrew C. Obermeyer, Director, DCMA Business Operations Center

More information

SAMPLE BUSINESS ASSOCIATE AGREEMENT

SAMPLE BUSINESS ASSOCIATE AGREEMENT SAMPLE BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT IS TO BE USED ONLY AS A SAMPLE IN DEVELOPING YOUR OWN BUSINESS ASSOCIATE AGREEMENT. ANYONE USING THIS DOCUMENT AS GUIDANCE SHOULD DO SO ONLY IN CONSULT

More information

Army Regulation 702 11. Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED

Army Regulation 702 11. Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED Army Regulation 702 11 Product Assurance Army Quality Program Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED SUMMARY of CHANGE AR 702 11 Army Quality Program This major

More information

NATIONAL STEEL AND SHIPBUILDING COMPANY SPECIAL TERMS AND CONDITIONS LX(R) PROGRAM N00024-14-C-2409

NATIONAL STEEL AND SHIPBUILDING COMPANY SPECIAL TERMS AND CONDITIONS LX(R) PROGRAM N00024-14-C-2409 NATIONAL STEEL AND SHIPBUILDING COMPANY SPECIAL TERMS AND CONDITIONS LX(R) PROGRAM N00024-14-C-2409 Rev 0, January 21, 2016 1 PRIME CONTRACT CLAUSES N00024-14-C-2409 The following clauses are flowed down

More information

INFORMATION SECURITY California Maritime Academy

INFORMATION SECURITY California Maritime Academy CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California Maritime Academy Audit Report 14-54 April 8, 2015 Senior Director: Mike Caldera IT Audit Manager:

More information

Appendix QX. Supplier Quality Requirements

Appendix QX. Supplier Quality Requirements Supplier Quality Requirements The latest issue to this document is the version that is available on the Lockheed Martin Aero website: http://www.lockheedmartin.com/us/aeronautics/materialmanagement.html

More information

SWIFT TEXTILE METALIZING LLC Terms and Conditions of Purchase As of April 29, 2015

SWIFT TEXTILE METALIZING LLC Terms and Conditions of Purchase As of April 29, 2015 1. Applicability: These terms and conditions are deemed to be incorporated into every purchase order issued by Swift Textile Metalizing LLC ( Buyer ) whether or not the purchase order makes specific reference

More information

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE This Notice of Privacy Practices describes the legal obligations of Ave Maria University, Inc. (the plan ) and your legal rights regarding your protected health

More information

One Hundred Thirteenth Congress of the United States of America

One Hundred Thirteenth Congress of the United States of America S. 2519 One Hundred Thirteenth Congress of the United States of America AT THE SECOND SESSION Begun held at the City of Washington on Friday, the third day of January, two thous fourteen An Act To codify

More information

There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened.

There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened. Data Spills Short Introduction There are many examples of sensitive information falling into the wrong hands. What s the worst that can happen? The worst has already happened. When data spills occur, they

More information

Hotline Complaint Regarding the Defense Contract Audit Agency Examination of a Contractor s Subcontract Costs

Hotline Complaint Regarding the Defense Contract Audit Agency Examination of a Contractor s Subcontract Costs Inspector General U.S. Department of Defense Report No. DODIG-2015-061 DECEMBER 23, 2014 Hotline Complaint Regarding the Defense Contract Audit Agency Examination of a Contractor s Subcontract Costs INTEGRITY

More information

S. 2519 AN ACT. To codify an existing operations center for cybersecurity.

S. 2519 AN ACT. To codify an existing operations center for cybersecurity. TH CONGRESS D SESSION S. 1 AN ACT To codify an existing operations center for cybersecurity. 1 Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ("BA AGREEMENT") supplements and is made a part of any and all agreements entered into by and between The Regents of the University

More information

Military Transactions

Military Transactions 8 Military Transactions In this section: Coverage and definitions Estimation methods overview U.S. receipts Transfers under U.S. military agency sales contracts U.S. payments Direct defense expenditures

More information

Adding a Security Assurance Dimension to Supply Chain Practices

Adding a Security Assurance Dimension to Supply Chain Practices Adding a Security Assurance Dimension to Supply Chain Practices John Whited, CISSP, CSSLP Randall Brooks, CISSP, CSSLP Raytheon Company Session ID: GRC-401 Session Classification: Intermediate Agenda What

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

Foreign Corrupt Practices Act ( FCPA )

Foreign Corrupt Practices Act ( FCPA ) Foreign Corrupt Practices Act ( FCPA ) OVERVIEW The Foreign Corrupt Practices Act ( FCPA ) was passed in 1977 in an effort to address concerns over the integrity of U.S. markets after hundreds of U.S.

More information

Obsolescence Considerations for Materials in the Lower Sub-Tiers of the Supply Chain

Obsolescence Considerations for Materials in the Lower Sub-Tiers of the Supply Chain INSTITUTE FOR DEFENSE ANALYSES Obsolescence Considerations for Materials in the Lower Sub-Tiers of the Supply Chain Jay Mandelbaum Christina M. Patterson April 2015 Approved for public release; distribution

More information

Copyright 2012, General Dynamics Information Technology. All Rights Reserved.

Copyright 2012, General Dynamics Information Technology. All Rights Reserved. Introduction Over the years, General Dynamics Information Technology has experienced significant growth in its IT services business serving government and commercial customers worldwide. As a valued supplier

More information

Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs (D-2004-109)

Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs (D-2004-109) August 17, 2004 Acquisition Implementation of the DoD Management Control Program for Navy Acquisition Category II and III Programs (D-2004-109) Department of Defense Office of the Inspector General Quality

More information

Purchase Order Clauses and Conditions

Purchase Order Clauses and Conditions Purchase Order Clauses and Conditions All purchase orders for materials, special processes, machining and fabrication services and end items are subject to the following requirements: General Requirements:

More information

Evaluation of Defense Contract Management Agency Actions on Reported DoD Contractor Business System Deficiencies

Evaluation of Defense Contract Management Agency Actions on Reported DoD Contractor Business System Deficiencies Inspector General U.S. Department of Defense Report No. DODIG-2016-001 OCTOBER 1, 2015 Evaluation of Defense Contract Management Agency Actions on Reported DoD Contractor Business System Deficiencies INTEGRITY

More information

PROFESSIONAL/CONSULTING SERVICES AGREEMENT

PROFESSIONAL/CONSULTING SERVICES AGREEMENT This SERVICES AGREEMENT ( Agreement ) is entered into by and between the undersigned, ( Contractor ), (Social Security Number or Federal I.D. No.), located at and Texas Southern University ( TSU ), an

More information

COMPLIANCE ALERT 10-12

COMPLIANCE ALERT 10-12 HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 7050.05 May 12, 2014 IG DoD SUBJECT: Coordination of Remedies for Fraud and Corruption Related to Procurement Activities References: See Enclosure 1 1. PURPOSE.

More information

JOINT ARMAMENTS CONFERENCE & EXHIBITION Seattle, Washington May 14-18, 2012

JOINT ARMAMENTS CONFERENCE & EXHIBITION Seattle, Washington May 14-18, 2012 JOINT ARMAMENTS CONFERENCE & EXHIBITION Seattle, Washington May 14-18, 2012 Top Issues NDIA s national agenda Derived from member inputs Guides advocacy and educational activities Distributed to.. Members

More information

FCPA 10 Hallmarks Self- Assessment

FCPA 10 Hallmarks Self- Assessment FCPA 10 Hallmarks Self- Assessment How exposed is your business to corruption risk? Take this assessment to find out if your systems are sufficiently robust to protect your business October 2014 Prepared

More information

DEFENSE INDUSTRIAL BASE ASSESSMENT: COUNTERFEIT ELECTRONICS

DEFENSE INDUSTRIAL BASE ASSESSMENT: COUNTERFEIT ELECTRONICS DEFENSE INDUSTRIAL BASE ASSESSMENT: COUNTERFEIT ELECTRONICS PREPARED BY U.S. DEPARTMENT OF COMMERCE BUREAU OF INDUSTRY AND SECURITY OFFICE OF TECHNOLOGY EVALUATION January 21 FOR FURTHER INFORMATION ABOUT

More information

INDEPENDENT CONTRACTOR SUPPLIER AGREEMENT. and include your affiliates. We, us, our, and ours refer to ConSol Partners, LLC. Client refers to.

INDEPENDENT CONTRACTOR SUPPLIER AGREEMENT. and include your affiliates. We, us, our, and ours refer to ConSol Partners, LLC. Client refers to. Parties You, your, and yours refer to INDEPENDENT CONTRACTOR SUPPLIER AGREEMENT and include your affiliates. We, us, our, and ours refer to ConSol Partners, LLC. Client refers to. Services Provided We

More information

Business Associate Agreement

Business Associate Agreement This Business Associate Agreement Is Related To and a Part of the Following Underlying Agreement: Effective Date of Underlying Agreement: Vendor: Business Associate Agreement This Business Associate Agreement

More information

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy: Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance

More information

INSPECTOR GENERAL UNITED STATES POSTAL SERVICE

INSPECTOR GENERAL UNITED STATES POSTAL SERVICE OFFICE OF INSPECTOR GENERAL UNITED STATES POSTAL SERVICE Trends and Systemic Issues in Defense Contract Audit Agency Audit Work for Fiscal Years 2009-2012 Management Advisory Report Report Number March

More information

Achieving Desired Results with Less: Supply Chain Management. Vincent Feck, Colonel, USAF Commander DCMA Lockheed Martin Fort Worth

Achieving Desired Results with Less: Supply Chain Management. Vincent Feck, Colonel, USAF Commander DCMA Lockheed Martin Fort Worth Achieving Desired Results with Less: Supply Chain Management Vincent Feck, Colonel, USAF Commander DCMA Lockheed Martin Fort Worth Mission: To provide Contract Administration Services to the Department

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the Army Medical Department Personnel Education and Quality System (APEQS) US Army Medical Command - Defense Health Program (DHP) Funded Application SECTION 1: IS A

More information

Peckar & Abramson. A Professional Corporation Attorneys & Counselors at Law

Peckar & Abramson. A Professional Corporation Attorneys & Counselors at Law A Professional Corporation Attorneys & Counselors at Law EXPANSION OF FEDERAL GOVERNMENT AUDIT POWERS AND PROGRAMS: WHAT TO DO WHEN THE AUDITORS ARRIVE Our earlier s described initiatives by the federal

More information

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES CONTENTS Introduction 3 Brief Overview of HIPPA Final Omnibus Rule 3 Changes to the Definition of Business Associate

More information

ARKANSAS OFFICE OF HEALTH INFORMATION TECHNOLOGY (OHIT) PRIVACY POLICIES

ARKANSAS OFFICE OF HEALTH INFORMATION TECHNOLOGY (OHIT) PRIVACY POLICIES ARKANSAS OFFICE OF HEALTH INFORMATION TECHNOLOGY (OHIT) PRIVACY POLICIES OHIT wishes to express its gratitude to Connecting for Health and the Markel Foundation for their work in developing the Common

More information

2. APPLICABILITY. This AC provides information for any person who engages in public aircraft operations (PAO) as defined by the statute.

2. APPLICABILITY. This AC provides information for any person who engages in public aircraft operations (PAO) as defined by the statute. U.S. Department of Transportation Federal Aviation Administration Advisory Circular Subject: Public Aircraft Operations Date: 2/12/14 Initiated by: AFS-800 AC No: 00-1.1A Change: 1. PURPOSE. This advisory

More information

U.S. Department of Energy Orders Self-Study Program

U.S. Department of Energy Orders Self-Study Program U.S. Department of Energy Orders Self-Study Program DOE G 414.1-4 SAFETY SOFTWARE GUIDE FOR USE WITH 10 CFR 830, SUBPART A, QUALITY ASSURANCE REQUIREMENTS, AND DOE O 414.1C, QUALITY ASSURANCE DOE G 414.1-2B

More information

HIPAA Security Alert

HIPAA Security Alert Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information

More information

GAO DEFENSE CONTRACTING. Contract Risk a Key Factor in Assessing Excessive Pass-Through Charges. Report to Congressional Committees

GAO DEFENSE CONTRACTING. Contract Risk a Key Factor in Assessing Excessive Pass-Through Charges. Report to Congressional Committees GAO United States Government Accountability Office Report to Congressional Committees January 2008 DEFENSE CONTRACTING Contract Risk a Key Factor in Assessing Excessive Pass-Through Charges GAO-08-269

More information

PRIVACY IMPACT ASSESSMENT (PIA) For the

PRIVACY IMPACT ASSESSMENT (PIA) For the PRIVACY IMPACT ASSESSMENT (PIA) For the Healthcare Continuing Education and Training Enterprise Subscription Service (Swank Healthcare) US Army Medical Command - Defense Health Program (DHP) Funded Application

More information

New Privacy Laws Impacting the Health Care Work Place

New Privacy Laws Impacting the Health Care Work Place New Privacy Laws Impacting the Health Care Work Place Presented by Thomas E. Jeffry, Jr., Esq. Arent Fox LLP Washington, DC New York, NY Los Angeles, CA November 12 & 19, 2009 Overview 1. Overview of California

More information

OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301-3000

OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301-3000 ACQUISITION. TECHNOLOGY AND LOGISTICS OFFICE OF THE UNDER SECRETARY OF DEFENSE 3000 DEFENSE PENTAGON WASHINGTON, DC 20301-3000 MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY (ACQUISITION, LOGISTICS AND

More information

California Senate Bill 474 Impact on Owners & Contractors

California Senate Bill 474 Impact on Owners & Contractors California Senate Bill 474 Impact on Owners & Contractors Beginning January 1, 2013, project owners, general contractors ( GC ), construction managers ( CM ) and any lower tier contractor who employs subcontractors

More information

ATTACHMENT A SUPPLIER CERTIFICATIONS PACKAGE

ATTACHMENT A SUPPLIER CERTIFICATIONS PACKAGE Page 1of 12 SUPPLIER RFQ# P/N# ATTACHMENT A SUPPLIER CERTIFICATIONS PACKAGE FORM $25,000 $100,000 $650,000 1. Cost Accounting Standards and Notices X 2. Certification Regarding Responsibility Matters X

More information

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128

More information

Billing Code: 4810-25. Guidance Concerning the National Security Review Conducted by the Committee

Billing Code: 4810-25. Guidance Concerning the National Security Review Conducted by the Committee This document has been submitted to the Office of the Federal Register (OFR) for publication and is currently pending placement on public display at the OFR and publication in the Federal Register. The

More information

Industry Assessment. Awareness and Industry Efforts to Combat Counterfeits in Aerospace & Military Electronic Component Procurement

Industry Assessment. Awareness and Industry Efforts to Combat Counterfeits in Aerospace & Military Electronic Component Procurement Electronic Supply Chain Solutions, Inc. 3023 Eastland Blvd., Bldg. H-109 Clearwater, FL 33761 (727) 723-8255 Industry Assessment Awareness and Industry Efforts to Combat Counterfeits in Aerospace & Military

More information

Additional Terms And Conditions Taiwan Air Force (TAF) E-2T Aircraft Retrofit of TW 1-4 (Prime Contract No. N00019-09-C-0040)

Additional Terms And Conditions Taiwan Air Force (TAF) E-2T Aircraft Retrofit of TW 1-4 (Prime Contract No. N00019-09-C-0040) Additional Terms And Conditions Taiwan Air Force (TAF) E-2T Aircraft Retrofit of TW 1-4 (Prime Contract No. N00019-09-C-0040) All of the additional terms and conditions set forth below are incorporated

More information

Government Contracts Quarterly

Government Contracts Quarterly Government Contracts Quarterly February 2014 The Government Contracts Quarterly Update is published by BakerHostetler s government contracts practice group to inform our clients of the latest developments

More information

Mobile Deposit Policy

Mobile Deposit Policy Mobile Deposit Policy Mobile Deposit, a deposit transaction delivery system, allows the Credit Union to receive digital information from deposit documents captured at remote locations (i.e., the Credit

More information

Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals

Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals JANUARY 2014 Deputy Assistant Secretary of Defense for Systems

More information