16
ITES- 3S Ordering Guide W52P1J-18-D-A024 26 December 2018 Array Information Technology, Inc. 13135 Lee Jackson Memorial Hwy, Suite 210 Fairfax, VA 22033 (703) 340-6884 www.arrayinfotech.com

ITES- 3S Ordering Guide W52P1J-18-D-A024 · satisfy its support of the Army Enterprise infostructure and infrastructure goals with IT services throughout CONUS and OCONUS locations,

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

ITES- 3S Ordering Guide

W52P1J-18-D-A024

26 December 2018

Array Information Technology, Inc. 13135 Lee Jackson Memorial Hwy,

Suite 210 Fairfax, VA 22033

(703) 340-6884 www.arrayinfotech.com

ARRAY ITES- 3S Ordering Guide

i

Table of Contents

Section Page

1.0 ITES-3S Contract ................................................................................................................ 1 1.1 Services ........................................................................................................................... 1 1.2 Cybersecurity Services.................................................................................................... 2 1.3 Information Technology Services ................................................................................... 3

1.4 Enterprise Design, Integration, and Consolidation ......................................................... 4 1.5 Network/Systems Operation and Maintenance ............................................................... 5 1.6 Telecommunications/Systems Operation and Maintenance ........................................... 5

1.7 Business Process Reengineering (BPR).......................................................................... 5 1.8 IT Supply Chain Management ........................................................................................ 5 1.9 IT Education & Training ................................................................................................. 6

2.0 Contract Terms.................................................................................................................... 6

2.1 Situations Requiring the Purchase of Hardware or Software ......................................... 6 2.1.1 Software .................................................................................................................... 6

2.1.2 Related Incidental Commercial-Off-The-Shelf (COTS) Hardware and Software ... 6 2.2 Security Requirements .................................................................................................... 7

3.0 ARRAY Team's Capabilities .............................................................................................. 7 4.0 Roles and Responsibilities ................................................................................................ 11

5.0 Ordering Information ........................................................................................................ 13 6.0 Contact Information .......................................................................................................... 14

6.1 Points of Contact ........................................................................................................... 14 6.2 Administrative Address ................................................................................................ 14

ARRAY ITES- 3S Ordering Guide

1

1.0 ITES-3S Contract

The ITES-3S scope includes a full range of services and solutions necessary for the Army to

satisfy its support of the Army Enterprise infostructure and infrastructure goals with IT services

throughout CONUS and OCONUS locations, including warzone areas. The scope includes the

Command, Control, Communications, Computers, and Information Management (C4IM)

requirements as defined in Army Regulation 25-1 (AR 25-1). Additionally, ITES-3S will include

the services and solutions necessary for the Army and other services to transition from current

service-centric information environments to the enterprise JIE as directed by the DoD CIO.

ITES-3S facilitates IT services-based solutions under which contractors may be required to

provide a full range of equipment and software associated with those services. In addition to

equipment and software, incidental construction may be required to provide a total solution.

Therefore, end-to-end solutions to satisfy worldwide development, deployment, operation,

maintenance, and sustainment requirements are included. Also included is support to analyze

requirements, develop and implement recommended solutions, operate and maintain legacy

systems and equipment. The types of services and solutions required for this acquisition will fall

under the following Task Areas: Cybersecurity Services; IT Services; Enterprise Design,

Integration, and Consolidation; Network/Systems Operation and Maintenance;

Telecommunications/Systems Operation and Maintenance; Business Process Reengineering; IT

Supply Chain Management; and IT Education & Training. It is the intent of the Government to

establish a scope that is broad, sufficiently flexible to satisfy requirements that may change over

the period of performance, and fully comprehensive so as to embrace the full complement of

services that relate to IT.

ITES-3S allows for ordering by all DoD and Federal agencies, but is being specifically crafted to

be utilized as a strategic source for the Army.

All efforts supported under this contract are provided in accordance with Department of Defense,

United States Army, DOD Intelligence Information Systems (DoDIIS), and National Security

Agency standards as applicable to each task order.

Efforts under this contract support industry best practices when prescribed by the aforementioned

standards.

1.1 Services

The Army strives to sustain and improve the existing LWN and Army Enterprise Services while

also undertaking the initiative to transition to the JIE. The ITES-3S service solutions provides the

required support to achieving these initiatives.

As cited in AR 25-1, the C4IM Services List is the foundation of the LWN Services Catalog. The

LWN Services Catalog identifies and defines IT services supported or provided by Army

Network Enterprise Centers (NEC). The service portfolios identified are: Cyber-security

Services; IT Services; Business Process Reengineering; Enterprise Design, Integration, and

Consolidation; Network/Systems Operation and Maintenance; Telecommunications/Systems

Operation and Maintenance; IT Supply Chain Management; and IT Education & Training.

The JIE is dependent upon developing and implementing new technical capabilities on an

unprecedented scale. As described in “The Department of Defense Strategy for Implementing the

ARRAY ITES- 3S Ordering Guide

2

Joint Information Environment, September 18, 2013,” the JIE focuses around six complex

technical areas:

Single Security Architecture (SSA) – Establishing an SSA will collapse network security

boundaries, reduce the Department’s external attack surface, enable better containment

and maneuver in reaction to cyberattack, and standardize management, operational, and

technical security controls.

Network Normalization – DoD’s current system of disparate network, processing, and

storage infrastructures impedes internal and external collaboration for the warfighter and

mission partners. As such, a foundational aspect of achieving the JIE is to provide a

single, protected information environment that securely, reliably, and seamlessly

interconnects warfighters.

Identity and Access Management – Optimized Global Identification, Authentication,

Access Control, and Directory Services are central to satisfying the warfighter’s need for

a portable identity and the ability to share contact information between organizations.

Enterprise Services – An enterprise service is a service, like email, that is provided in a

common way across the Department, and is provided by a single organization acting as

the enterprise-service provider. DoD is emphasizing development and deployment of

enterprise services as part of JIE that are designed to operate in deployed, disconnected,

or low-bandwidth information environments.

Cloud Computing – DoD’s move to cloud computing presents challenges, especially in

the management of thousands of shared computer servers, cybersecurity (as part of single

security architecture), resilience and failover, and migration of software applications onto

the cloud.

Data Center Consolidation – The DoD will continue to consolidate computing power by

closing and consolidating data centers across the Department, while concurrently

identifying existing data centers to be transitioned into JIE Core Data Centers (CDCs).

Data center consolidation will be integral to facilitating the move the Department to a

standardized computing architecture.

The service portfolios identified below support the design, implementation, and sustainment of

these JIE technical areas.

1.2 Cybersecurity Services

As defined in Department of Defense Instruction (DoDI) 8500.01, Cybersecurity is the

“prevention of damage to, protection of, and restoration of computers, electronic

communications systems, electronic communications services, wire communication, and

electronic communication, including information contained therein, to ensure its availability,

integrity, authentication, confidentiality, and nonrepudiation.”

Cyber Security Development/Solutions D310

Cyber Operations D310

Computer Network Defense and Offense Services D310

Identity Management Solutions D310

Continuous Monitoring Solutions/Services D310

Cyber Security Architecture D307

Cyber Forensics & Analytics D310

Mobile Security Solutions D304, D310

ARRAY ITES- 3S Ordering Guide

3

Computer Security Awareness and Training D310

Computer Security Incident Response D310

Information, System, Data, and Physical Security D310

Mainframe Automated Information Security Support D310

Biometrics D310

Continuity of Operations D301, D324

Contingency Planning D302, D324

Critical Infrastructure Protection D301, D324

Cryptographic Support and Service D310

Disaster Recovery D301, D324

Policy and Compliance D306, D307

Public Key Infrastructure and CAC authentication D310

Remote Monitoring/Intrusion Detection D310

Security Architecture Design D307, D310

Security Hardening D310

Secure Video Teleconferencing D310

System Certification and Accreditation D310

System Recovery Support Services D301, D310, D324

1.3 Information Technology Services

The Committee on National Security Systems (CNSS) Instruction No. 4009 defines Information

Technology as “Any equipment or interconnected system or subsystem of equipment that is used

in the automatic acquisition, storage, manipulation, management, movement, control, display,

switching, interchange, transmission, or reception of data or information by the executive

agency. For purposes of the preceding sentence, equipment is used by an executive agency if the

equipment is used by the executive agency directly or is used by a contractor under a contract

with the executive agency which 1) requires the use of such equipment or 2) requires the use, to

a significant extent, of such equipment in the performance of a service or the furnishing of a

product. The term information technology includes computers, ancillary equipment, software,

firmware and similar procedures, services (including support services), and related resources.”

Application and Service Hosting R415, R425, D301, D317, D318, D322, D324, D325

Automated Workflow System Development and Integration D318, R412, R413, R425,

D324, AD24, AD25

Big Data Analysis/Management D306

Configuration Management D301

Capacity Management D301

Computer Aided Design/Engineering/Management (CAD/CAE/CAM) D313

Computer Systems Administration, Management, and Maintenance D301

Design/Specifications for Information Systems D306

Data and/or Media Management D303, D311

Data Storage Management D309, D301, D325

Data Warehousing D325, D324, D310, D311, D312, D315

Database Applications Development D311, D399, D308

Design/Specifications for Information Dissemination D309

DODAF-based Operational & System Architecture Design & Development D307

Economic/Business Case Analysis (Cost/Benefit and Risk) D324

ARRAY ITES- 3S Ordering Guide

4

Electronic Commerce and Electronic Data Interchange Support D324

Global/Geographic Information Systems D315

Informatics D303, D306, D309, D311, D399

Information Architecture Analysis D307

IT Architecture Support D307

Internet/Intranet/Web Applications/Network Computing D305, D308, D316

Legacy Systems Modernization D308

Performance Benchmarking/Performance Measurements D308

Property Management D301

Section 508 Compliance Support D308

Simulation and Modeling R412

Software/Middleware Development D308

Source Data Development D308

Statistical Analysis D306

Systems Development and Software Maintenance D308, D319

Systems Programming D308

Video Teleconferencing/Audio /Visual/Media Systems D301

Voice over Internet Protocol (VOIP) D304

Web and Computer Systems Decision Support Tools D305, D310, D322

Web Enabled Applications D305, D310, D322

1.4 Enterprise Design, Integration, and Consolidation

Collaboration Systems/Facility Development R425

Compliance with Interoperability Standards R425

Cost Benefit/Cost Effectiveness Analysis R425, D324

Independent Verification and Validation R425

Information and Knowledge Engineering R425

Information Management Life Cycle Planning/Support R425, D324

Integrated Solutions Management R425

Knowledge Engineering/Management R425

Market Research and Prototyping R425

Measuring Return on Investment (ROI) R425, D324

Earned Value Management R425

Product Integration R425

Reliability and Maintainability R425, D324

Requirements Analysis R425

Resource Planning Systems Development and Integration R425

Resource Systems Management R425

Resource Systems Planning R425

Reverse Engineering R425

Software Engineering R425

Software Life Cycle Management R425

Systems Integration R425

Technology Insertion R425

Test and Evaluation R425, H258, H259

Wireless Networking R425, D322

ARRAY ITES- 3S Ordering Guide

5

1.5 Network/Systems Operation and Maintenance

Computer Center Technical Support D301, D399

Commercial Off-the-Shelf Software Products and Support D316

Computer Systems Administration D316

Computer Systems Facilities Management and Maintenance D301

Licensing Support D319

18Legacy Systems Maintenance D319, D320

Network Management D316

Help Desk Support D321, D324, D399

Desktop Support D321, D324, D399

Software License Management D319

Supply Chain Management D321, D324, D399

Network Infrastructure Support D321, D324, D399

Office Automation Support D321, D324, D399

Seat Management/Asset Management D321, D324, D399

1.6 Telecommunications/Systems Operation and Maintenance

Telecommunications Infrastructure Office Automation Support D321, D324, D399

Voice over IP Support D304

Handset Management/Asset Management D321, D324, D399

1.7 Business Process Reengineering (BPR)

BPR is a means to restructure an organization by means of a radical reassessment of its core

processes and predominant competencies and often involves the analysis and redesign of

workflow within and between enterprises. BPR helps entities to radically restructure their

organizations by focusing on the ground-up design of their business processes.

Benchmarking/Operational Capability Demonstrations R412

Business Case Analysis D307, D324

Customer Relationship Management D325

E-Business Planning and Support D325

Functional Requirements Decomposition D324, D314

Gap Analysis D324, D314

IT Capital Planning D314

Quality Assurance D314, H159

Risk Management D324, D314

Workflow Analysis D324, D314

1.8 IT Supply Chain Management

Logistics D318, D324

Purchasing D314, D318, D324

Inventory Management D318, D324

Vendor Management D318, D324

Subcontractor Management D318, D324

ARRAY ITES- 3S Ordering Guide

6

1.9 IT Education & Training

User Training Purchasing D318, D399, U001

Instructional Design and Modeling & Simulation U008, U012, R412

Design & execution of computer-generated imaging/training U008

2.0 Contract Terms

Contract Ceiling $12,100,000,000 The contract maximum represents the total requirement for the life of the contract (including options, if exercised)

Period of Performance Nine (9) years: 60 month base period Four 12 month options

Pricing Structure Firm Fixed Price Time and Material Cost Reimbursement

Performance-Based Contracting Preferred method for acquiring services

Fair Opportunity to Be Considered Subject to FAR 16.505

Ordering Guidance and Process Per Program Director, Army Computer Hardware, Enterprise Software and Solutions (CHESS) ITES-3S Ordering Guide dated September 2018

2.1 Situations Requiring the Purchase of Hardware or Software

2.1.1 Software

In situations where it is necessary to purchase new commercial software, including preloaded

software, to satisfy the requirements of a particular TO, the contractor will first be required to

review and utilize available DOD Enterprise Software Initiative (ESI) agreements.

If software is not available to the contractor through a DOD ESI source, the contractor shall be

authorized to obtain the software through an alternate source. For Army users, a Statement of

Non-Availability (SoNA) is required from CHESS when acquiring non-ESI software regardless

of the dollar value. The customer shall access the SoNA process, located on the IT e-mart at

https://chess.army.mil/Content/Page/SONA. The SoNA should be included in the TO file upon

award.

For DOD users, a Non-DOD contract certification and approval is required for software buys,

with the exception of the Microsoft Premier software IAW DFARS 217.78. This Non-DOD

documentation is required because the ESI Blanket Purchase Agreements are established against

General Services Administration (GSA) ID/IQs.

2.1.2 Related Incidental Commercial-Off-The-Shelf (COTS) Hardware and Software

If related incidental hardware and software are required for a particular TO, the CHESS

hardware contracts are the preferred source of supply. For Army users, it is the mandatory source

for hardware and software IAW Army Federal Acquisition Regulation Supplement (AFARS)

5139.101. CHESS also has a representative sample list on its web site of Commercial IT

Products and Services authorized for use by customers worldwide. A request for quote may be

submitted for products not found on the CHESS site. If the hardware and related software

required is not available from a CHESS contract or the authorized list, the contractor shall be

authorized to obtain the hardware through an alternate source.

ARRAY ITES- 3S Ordering Guide

7

For Army users, a SoNA is required for purchase of products from another source regardless of

dollar value. The listing of COTS hardware available from CHESS sources can be viewed on the

IT e-mart at https://chess.army.mil. The customer shall access the SoNA process, located on the

IT e-mart at https://chess.army.mil/Content/Page/SONA. The SoNA should be included in the

TO file upon award.

2.2 Security Requirements

Contractor personnel performing work under ITES-3S shall have the appropriate security

clearance as specified in each individual task order at time of the proposal submission, and shall

maintain the level of security required for the life of the contract. Overarching security

requirements and contractor access to classified information shall be as specified in the DD Form

254, “Department of Defense Contract Security Classification Specification,” for each TO, as

required.

3.0 ARRAY Team's Capabilities

ARRAY has an extensive resource pool of experienced personnel that we will use to meet ITES-

3S TO requirements. We will supplement and strengthen our own qualifications with known and

pre-screened subcontractors to meet the U.S. Army’s ITES-3S PWS requirements for the

required technical/management skills, technologies, techniques, geographic presence, and

leverage our collective customer intimacy. Our partners have demonstrated successful technical

and functional performance on their current contracts within the Task Area scenario scope of

work required for future ITES-3S TOs. As technology requirements evolve, ARRAY will further

enhance the team by adding new companies, as necessary, to bring the skills, commitment, and

strategic perspective that will be critical in partnering with the U.S. Army and client agencies to

meet and exceed ITES-3S objectives.

ARRAY and our partners bring a diversity of corporate-level industry partnerships that align

with the U.S. Army’s technical enterprise and JIE vision. Our current team consists of:

Partner Size/Socio-Economic Category

ITES-3S Service Portfolio(s) Supported

BIAS Corporation LB IT Services

Enterprise Design, Integration, and Consolidation

BPR

Binary Group SB IT Services

BKM Global

VOSB, SDVOSB

IT Services

Enterprise Design, Integration and Consolidation

Blueridge IT Solutions, Inc. VOSB, SDVOSB

IT Services

IT Education & Training

Broadleaf, Inc.

SDB, Native Hawaiian

Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

Chainbridge Solutions, Inc. SDB, WOSB IT Services

Enterprise Design, Integration, and Consolidation

ARRAY ITES- 3S Ordering Guide

8

Partner Size/Socio-Economic Category

ITES-3S Service Portfolio(s) Supported

BPR

CoSolutions, Inc. WOSB Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

Network/Systems O&M

Telecommunications/Systems O&M

BPR

IT Supply Chain Management

IT Education & Training

EMW, Inc. SB Cybersecurity Services

Network/Systems O&M

Telecommunications/Systems O&M

IT Supply Chain Management

Evanhoe & Associates, Inc.

SDB, VOSB, SDVOSB

Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

Network/Systems O&M

BPR

IT Supply Chain Management

ExperSolve, Inc.

SB IT Services

BPR

Global Resource Solutions, Inc. (GRS)

VOSB, SDVOSB

Cybersecurity Services

IT Services

Hickory Ground Solutions, LLC

SDB, Tribally-Owned

Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

Network/Systems O&M

BPR

IT Education & Training

I3solutions, Inc. SB IT Services

The Inteq Group, Inc.

WOSB IT Services

Enterprise Design, Integration, and Consolidation

BPR

IT Education & Training

Invictus Technical Solutions, LLC (ITS)

VOSB, SDVOSB

Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

Network/Systems O&M

BPR

IT Supply Chain Management

KBRwyle LB Cybersecurity Services

IT Services

ARRAY ITES- 3S Ordering Guide

9

Partner Size/Socio-Economic Category

ITES-3S Service Portfolio(s) Supported

Enterprise Design, Integration, and Consolidation

Network/Systems O&M

Telecommunications/Systems O&M

BPR

IT Supply Chain Management

IT Education & Training

Life Cycle Engineering, Inc. LB Cybersecurity Services

IT Services

Network/Systems O&M

BPR

Link Solutions, Inc. (LSi) LB Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

Network/Systems O&M

Telecommunications/Systems O&M

BPR

IT Supply Chain Management

IT Education & Training

Logistics Systems, Inc. (LSI)

SDB, VOSB, SDVOSB

Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

Network/Systems O&M

BPR

IT Education & Training

Moriarty & Associates Consulting Corporation

SB Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

Network/Systems O&M

BPR

Nationwide IT Services (NIS) SDB, VOSB, SDVOSB

Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

Network/Systems O&M

BPR

IT Education & Training

Octo Consulting Group LB Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

Network/Systems O&M

BPR

IT Education & Training

ARRAY ITES- 3S Ordering Guide

10

Partner Size/Socio-Economic Category

ITES-3S Service Portfolio(s) Supported

Pelatron Inc. SB Network/Systems O&M

Telecommunications/Systems O&M

IT Supply Chain Management

The Perduco Group WOSB IT Services

Enterprise Design, Integration, and Consolidation

BPR

Renegade Technology Systems, Inc. (RTSI)

SDB Cybersecurity Services

IT Services

Enterprise Design, Integration and Consolidation

Network/Systems O&M

Telecommunications/Systems O&M

BPR

Sigmatech, Inc. LB Cybersecurity Services

IT Services

IT Supply Chain Management

IT Education & Training

SJ Technologies, Inc.

SDB, WOSB, Cybersecurity Services

IT Services

Enterprise Design, Integration and Consolidation

Network/Systems O&M

SP Global

SB Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

IT Supply Chain Management

IT Education & Training

Start To End Networks, LLC

SB Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

Network/Systems O&M

Telecommunications/Systems O&M

BPR

IT Supply Chain Management

IT Education & Training

Sumaria Systems, Inc. LB Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

BPR

Teksouth Corporation

SB Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

ARRAY ITES- 3S Ordering Guide

11

Partner Size/Socio-Economic Category

ITES-3S Service Portfolio(s) Supported

Network/Systems O&M

BPR

TEKsystems, Inc. LB IT Staffing

TSI Global Companies, LLC LB IT Services

Enterprise Design, Integration, and Consolidation

Network/Systems O&M

Telecommunications/Systems O&M

Unissant, Inc.

SDB IT Services

Enterprise Design, Integration, and Consolidation

BPR

Ward ENG Support Services (WESSGRP)

SDB, WOSB, HUBZone

Cybersecurity Services

Wildflower International WOSB, HUBZone

IT Products and services [ITES-3H prime contractor]

Windstream Communications LB Cybersecurity Services

Network/Systems O&M

Telecommunications/Systems O&M

Zavda Technologies, LLC

SDB, WOSB, VOSB, SDVOSB

Cybersecurity Services

IT Services

Enterprise Design, Integration, and Consolidation

Network/Systems O&M

4.0 Roles and Responsibilities

This section provides a summary of the roles and responsibilities for the primary organizations in

the ITES-3S contract process.

Army Contracting Command, Rock Island (ACC-RI)

Serves as the PCO for the ITES-3S contracts. The PCO has overall contractual

responsibility for the ITES-3S contracts. All orders issued are subject to the terms and

conditions of the contract. The contract takes precedence in the event of conflict with any

order or the Ordering Guide.

Provides advice and guidance to Requiring Activities’ (RA), OCOs, and contractors

regarding contract scope, acquisition regulation requirements, and contracting policies.

Approves and issues base ITES-3S contract modifications.

Represents the Contracting Officer position at various contract-related meetings.

Program Director, Army Computer Hardware, Enterprise Software and Solutions

(CHESS)

Designated by the Secretary of the Army as the Army's primary source for commercial

IT.

Performs the functions of Program Manager (PM) for the ITES-3S contracts.

Requiring Activity (RA)s / Administrative Contracting Officer Representative (ACOR)

for this acquisition

ARRAY ITES- 3S Ordering Guide

12

Maintains the IT e-mart, a no-fee flexible procurement strategy through which an Army

user may procure COTS IT hardware, software, and services.

The CHESS IT e-mart website is: https://chess.army.mil.

With support from the Information Systems Engineering Command, Technology

Integration Center, CHESS assists Army organizations in defining and analyzing

requirements for meeting the Army’s enterprise infrastructure and infostructure goals.

Works with other RAs, including those outside of the Army, to help them understand

how ITES-3S can best be used to meet their enterprise requirements.

Conducts periodic meetings with the prime contractors, e.g., In-Process Review, as

needed to ensure requirements, such as approved DOD standards, are understood.

Requiring Activity

Defined as any organizational element within the Army, DOD, or other Federal

Agencies. Roles and responsibilities include:

‒ Adheres to the requirements and procedures defined in the ITES-3S contracts and

these ordering guidelines.

‒ Defines requirements.

‒ Prepares TO requirements packages.

‒ Funds the work to be performed under ITES-3S orders.

‒ Provides personnel to evaluate proposals submitted.

‒ Provides past performance assessments.

‒ Monitors and evaluates contractor performance.

Ordering Contacting Officer

OCOs within the Army, DOD, and other Federal agencies are authorized to place orders

within the terms of the contract and within the scope of their authority.

Not authorized to make changes to the contract terms and/or conditions. The OCOs

authority is limited to the individual orders.

Serves as the interface between the contractor and the Government for individual orders

issued under the ITES-3S contracts.

Responsible for determining if bundling of requirements (see FAR 2.101) is in

compliance with FAR 7.107.

Responsible for determining whether consolidation of requirements, compliance, and

approval are IAW DFARS 207.170.

Responsible for requesting, obtaining, and evaluating proposals/quotations and for

obligating funds for orders issued.

The OCO reserves the right to withdraw and cancel a task if issues pertaining to the

proposed task arise that cannot be satisfactorily resolved.

Responsible for identifying when Earned Value Management System is applicable at the

TO level IAW DFARS 252.234-7002.

Order Contracting Officer’s Representative

Task Order CORs will be designated by letter of appointment from the OCO.

Serves as the focal point for all task activities, and primary Point of Contact (POC) with

the contractors.

ARRAY ITES- 3S Ordering Guide

13

Provides technical guidance in direction of the work; not authorized to change any of the

terms and conditions of the contract or order.

Shall use the measures and standards set forth in the Quality Assurance Surveillance Plan

(QASP) to assess contractor performance, thereby ensuring the quality of services

required by the TO are met.

Obtains required COR training. Note: The Army Contracting Command (ACC) COR

Guide provides a list of approved COR training courses:

https://www.us.army.mil/suite/doc/24452057&inline=true.

Array Information Technology

The principle role of ARRAY is to perform services and/or deliver related products that

meet requirements and/or achieve objectives/outcomes described in orders issued under

the ITES-3S contracts.

5.0 Ordering Information

Ordering under the contract is decentralized, and is authorized for ordering by all DoD and

Federal agencies, but is being specifically crafted to be utilized as a strategic source for the

Army. Orders may be placed by any Ordering Contracting Officers within the aforementioned

agencies against this contract. No agency pass-through or service fees are associated with this

contract. Individual task orders will be awarded by the Ordering Contracting Officers.

This is a Multiple Award Task Order (MATO) IDIQ contract. Individual task orders allowed

under this agreement are Fixed Price (FP), Time and Materials (T&M), and Cost Reimbursement

(CR).

Any request for deviation from the terms of this Contract must be submitted to Contracting

Officer.

All orders issued under this contract are subject to the terms and conditions of the contract. The

contract takes precedence in the event of conflict with any order.

All services under this contract will be ordered by issuance of written task orders in accordance

with FAR subpart 16.5, Indefinite Delivery Contracts as implemented by DFARS 216.505,

Indefinite Delivery Contracts. An appropriate order form (DD Form 1155) shall be issued for

each order.

The Ordering Contracting Officer will initiate the task order process by the issuing a Task Order

Request (TOR). The Contractors shall respond to all TORs within the proposal submission date,

as specified in the TOR submittal instructions.

The contractor is responsible for all bid and proposal costs incurred in performance of the

contract.

Performance under orders shall commence only after receipt of an executed order via facsimile,

e-mail, or by verbal direction from the OCO. If verbal direction is given, written confirmation

will be provided within five working days of the verbal order. The Government shall not be

obligated to reimburse the Contractor for work performed, items delivered, or any costs incurred,

nor shall the Contractor be obligated to perform, deliver, or otherwise incur costs except as

authorized by duly executed orders.

ARRAY ITES- 3S Ordering Guide

14

The Army’s complete instructions and requirements for the use of the ITES-3S contract are

available and maintained online by the Program Director, CHESS at the IT emart located at

https://chess.army.mil. Services will be acquired by issuing individual task orders.

Contract types will be determined in accordance with the Federal Acquisition Regulation (FAR)

and Defense Federal Acquisition Regulation Supplement (DFARS) based on the circumstances

of each order.

All Task Orders must incorporate DFARS clause 252.232.7006, Wide Area Workflow Payment

Instructions.

CHESS's ITES-3S Ordering Guide is available on the CHESS IT e-Mart website,

https://chess.army.mil, which establishes guidelines for customers placing orders against this

contract. The current Government contract points of contact are listed in the ITES-3S Ordering

Guide.

6.0 Contact Information

6.1 Points of Contact

Program Manager:

Blair Vorgang

Operations Manager:

Kristin Brewer

Contract Manager:

Scott Sayers

Phone Number:

301-345-8188 ext. 4837 (ITES)

Contact Email:

[email protected]

Army Website:

https://chess.army.mil

6.2 Administrative Address

Array Information Technology, Inc.

7474 Greenway Center Drive

Suite 600

Greenbelt, Maryland 20770-3523

Cage Code: 3CY03