252.204-7000 Disclosure of Information.
252.204-7001 Reserved.
252.204-7002 Payment for Subline Items Not Separately Priced.
252.204-7003 Control of Government Personnel Work Product.
252.204-7004 Alternate A, System for Award Management.
252.204-7005 Oral Attestation of
Security Responsibilities.
252.204-7006 Billing Instructions.
252.204-7007 Alternate A, Annual Representations and Certifications.
252.204-7008 Reserved.
252.204-7009 Reserved.
252.204-7010 Requirement for Contractor to Notify DoD if
the Contractor’s
Activities are Subject to Reporting Under the
U.S.-International
Atomic Energy Agency Additional Protocol.
252.204-7011 Alternative Line Item Structure.
252.204-7012 Safeguarding of Unclassified Controlled Technical Information.
252.204-7013 Limitations on the Use or Disclosure of Information by Litigation Support Solicitation Offerors.
252.204-7014 Limitations on the Use or Disclosure of Information by Litigation Support Contractors.
252.204-7015 Disclosure of Information to Litigation Support Contractors.
252.204-7000 Disclosure of Information.
As prescribed in 204.404-70(a), use the following clause:
DISCLOSURE OF INFORMATION
(AUG 2013)
(a) The Contractor shall not release to anyone
outside the Contractor's organization any unclassified information, regardless
of medium (e.g., film, tape, document), pertaining to any part of this contract
or any program related to this contract, unless—
(1) The Contracting Officer has given prior
written approval;
(2) The information is otherwise in the public
domain before the date of release; or
(3) The information results from or arises during the performance of a project that has been scoped and negotiated by the contracting activity with the contractor and research performer and determined in writing by the contracting officer to be fundamental research in accordance with National Security Decision Directive 189, National Policy on the Transfer of Scientific, Technical and Engineering Information, in effect on the date of contract award and the USD (AT&L) memoranda on Fundamental Research, dated May 24, 2010, and on Contracted Fundamental Research, dated June 26, 2008, (available at DFARS PGI 204.4 (DFARS/PGI view)).
(b) Requests for approval under paragraph (a)(1) shall identify the specific
information to be released, the medium to be used, and the purpose for the release.
The Contractor shall submit its request to the Contracting Officer at least 10 business
days before the proposed date for release.
(c) The Contractor agrees to include a similar requirement, including this paragraph (c), in each subcontract under this contract. Subcontractors shall submit
requests for authorization to release through the prime contractor to the Contracting Officer.
(End of clause)
252.204-7001 Reserved.
252.204-7002
Payment for Subline Items Not Separately Priced.
As prescribed in 204.7104-1(b)(3)(iv), use the following clause:
Payment for Subline
Items Not Separately Priced (DEC 1991)
(a) If the schedule in this contract contains any
contract subline items or exhibit subline items identified as not separately
priced (NSP), it means that the unit price for that subline item is included in
the unit price of another, related line or subline item.
(b) The Contractor shall not invoice the
Government for any portion of a contract line item or exhibit line item which
contains an NSP until—
(1) The Contractor has delivered the total
quantity of all related contract subline items or exhibit subline items; and
(2) The Government has accepted them.
(c) This clause does not apply to technical data.
(End of clause)
252.204-7003
Control of Government Personnel Work Product.
As prescribed in 204.404-70(b), use the following clause:
CONTROL OF GOVERNMENT
PERSONNEL WORK PRODUCT (APR 1992)
The Contractor’s procedures for protecting against unauthorized
disclosure of information shall not require Department of Defense employees or
members of the Armed Forces to relinquish control of their work products,
whether classified or not, to the Contractor.
(End of clause)
252.204-7004 Alternate A, System for Award Management.
ALTERNATE A, SYSTEM FOR AWARD MANAGEMENT (FEB 2014)
As prescribed in
204.1105, substitute the following paragraph (a) for paragraph (a) of the provision at FAR 52.204-7:
(a) Definitions. As used in this provision—
“System for Award Management (SAM) database” means the primary Government
repository for contractor information required for the conduct of business with the Government.
“Commercial and
Government Entity (CAGE) code” means—
(1) A code assigned
by the Defense Logistics Information Service (DLIS) to identify a commercial or
Government entity; or
(2) A code
assigned by a member of the North Atlantic Treaty Organization that DLIS
records and maintains in the CAGE master file.
This type of code is known as an “NCAGE code.”
“Data Universal
Numbering System (DUNS) number” means the 9-digit number assigned by Dun and
Bradstreet, Inc. (D&B) to identify unique business entities.
“Data Universal Numbering System +4 (DUNS+4) number” means the DUNS number assigned by D&B plus a 4-character suffix that may be assigned by a business concern. (D&B has no affiliation with this 4-character suffix.) This 4-character suffix may be
assigned at the discretion of the business concern to establish additional SAM records for identifying alternative Electronic Funds Transfer (EFT) accounts (see FAR 32.11)
for the same parent concern.
“Registered in the System for Award Management (SAM) database” means that—
(1) The contractor has entered all mandatory information, including the DUNS
number or the DUNS+4 number, and Contractor and Government Entity (CAGE) code into the SAM database; and
(2) The contractor has completed the Core Data, Assertions, Representations and Certifications, and Points of Contact sections of the registration in the SAM database;
(3) The Government has validated all mandatory data fields, to include validation of the Taxpayer Identification Number (TIN) with the Internal Revenue
Service (IRS). The Contractor will be required to provide consent for TIN validation to the Government as part of the SAM registration process; and
(4) The Government has marked the record “Active.”
252.204-7005 Oral Attestation of
Security Responsibilities.
As prescribed in
204.404-70(c), use the following clause:
ORAL ATTESTATION OF SECURITY RESPONSIBILITIES (NOV 2001)
(a) Contractor employees
cleared for access to Top Secret (TS), Special Access Program (SAP), or Sensitive
Compartmented Information (SCI) shall attest orally that they will conform to
the conditions and responsibilities imposed by law or regulation on those
granted access. Reading aloud the first
paragraph of Standard Form 312, Classified Information Nondisclosure Agreement,
in the presence of a person designated by the Contractor for this purpose, and
a witness, will satisfy this requirement.
Contractor employees currently cleared for access to TS, SAP, or SCI may
attest orally to their security responsibilities when being briefed into a new
program or during their annual refresher briefing. There is no requirement to retain a separate
record of the oral attestation.
(b) If an employee
refuses to attest orally to security responsibilities, the Contractor shall
deny the employee access to classified information and shall submit a report to
the Contractor’s security activity.
(End of clause)
252.204-7006 Billing Instructions.
As prescribed in 204.7109, use the
following clause:
BILLING
INSTRUCTIONS (OCT 2005)
When
submitting a request for payment, the Contractor shall—
(a) Identify the contract line item(s) on the
payment request that reasonably reflect contract work performance; and
(b) Separately identify a payment amount for each
contract line item included in the payment request.
(End of
clause)
252.204-7007 Alternate A, Annual Representations and
Certifications.
As prescribed in 204.1202, use the following provision:
ALTERNATE A, ANNUAL REPRESENTATIONS AND CERTIFICATIONS (JAN 2015)
Substitute the following paragraphs (d) and (e) for paragraph (d) of the provision at FAR 52.204-8:
(d)(1) The following representations or certifications in the System for Award Management (SAM) database are applicable to this solicitation as indicated:
(i) 252.209-7003, Reserve Officer Training Corps and Military Recruiting on Campus—Representation. Applies to all solicitations with institutions of higher education.
(ii) 252.216-7008, Economic Price Adjustment—Wage Rates or Material Prices Controlled by a Foreign Government. Applies to solicitations for fixed-price supply and service contracts when the contract is to be performed wholly or in part in a foreign country, and a foreign government controls wage rates or material prices and may during contract performance impose a mandatory change in wages or prices of materials.
(iii) 252.222-7007, Representation Regarding Combating Trafficking in Persons, as prescribed in 222.1771. Applies to solicitations with a value expected to exceed the simplified acquisition threshold.
(iv) 252.225-7042, Authorization to Perform. Applies to all solicitations when performance will be wholly or in part in a foreign country.
(v) 252.225-7049, Prohibition on Acquisition of Commercial Satellite Services from Certain Foreign Entities—Representations. Applies to solicitations for the acquisition of commercial satellite services.
(vi) 252.225-7050, Disclosure of Ownership or Control by the Government of a Country that is a State Sponsor of Terrorism. Applies to all solicitations expected to result in contracts of $150,000 or more.
(vii) 252.229-7012, Tax Exemptions (Italy)—Representation. Applies to solicitations and contracts when contract performance will be in Italy.
(viii) 252.229-7013, Tax Exemptions (Spain)—Representation. Applies to solicitations and contracts when contract performance will be in Spain.
(ix) 252.247-7022, Representation of Extent of Transportation by Sea. Applies to all solicitations except those for direct purchase of ocean transportation services or those with an anticipated value at or below the simplified acquisition threshold.
(2) The following representations or certifications in SAM are
applicable to this solicitation as indicated by the Contracting Officer: [Contracting Officer check as appropriate.]
____(i) 252.209-7002, Disclosure of Ownership or Control by a Foreign Government.
____(ii) 252.225-7000, Buy American—Balance of Payments
Program Certificate.
____(iii) 252.225-7020, Trade Agreements Certificate.
____ Use with Alternate I.
____(iv) 252.225-7031, Secondary Arab Boycott of Israel.
____(v) 252.225-7035, Buy American—Free Trade Agreements—Balance of Payments Program Certificate.
____ Use with Alternate I.
____ Use with Alternate II.
____ Use with Alternate III.
____ Use with Alternate IV.
____ Use with Alternate V.
(e) The offeror has completed the annual representations and certifications
electronically via the SAM website at https://www.acquisition.gov/. After reviewing the SAM database information, the offeror verifies by submission of the offer that
the representations and certifications currently posted electronically that apply to this solicitation as indicated in FAR 52.204-8(c) and paragraph (d) of this provision have been entered or updated within the last 12 months, are current, accurate, complete, and applicable to this solicitation (including the business size standard applicable to the NAICS code referenced for this solicitation), as of the date of this offer, and are incorporated in this offer by reference (see FAR 4.1201); except for the changes identified below [offeror to insert changes,
identifying change by provision number, title, date]. These amended representation(s) and/or
certification(s) are also incorporated in this offer and are current, accurate,
and complete as of the date of this offer.
FAR/DFARS
Provision # |
Title |
Date |
Change |
|
|
|
|
Any changes provided by the offeror are applicable to this solicitation only, and do
not result in an update to the representations and certifications located in the SAM database.
(End of provision)
252.204-7008
Reserved.
252.204-7010 Requirement for Contractor to Notify DoD if
the Contractor’s Activities are Subject to Reporting Under the
U.S.-International Atomic Energy Agency Additional Protocol.
As prescribed in 204.470-3, use the
following clause:
REQUIREMENT
FOR CONTRACTOR TO NOTIFY DOD IF THE CONTRACTOR’S ACTIVITIES ARE SUBJECT TO REPORTING
UNDER THE U.S.-INTERNATIONAL ATOMIC ENERGY AGENCY ADDITIONAL PROTOCOL (JAN
2009)
(a) If the Contractor is required
to report any of its activities in accordance with Department of Commerce
regulations (15 CFR Part 781 et seq.)
or Nuclear Regulatory Commission regulations (10 CFR Part 75) in order to
implement the declarations required by the U.S.-International Atomic Energy
Agency Additional Protocol (U.S.-IAEA AP), the Contractor shall—
(1)
Immediately provide written notification to the following DoD Program
Manager:
[Contracting Officer to insert Program Manager’s name, mailing
address, e-mail address, telephone number, and facsimile number];
(2)
Include in the notification—
(i)
Where DoD contract activities or information are located relative to the
activities or information to be declared to the Department of Commerce or the
Nuclear Regulatory Commission; and
(ii) If or when any current or former DoD contract
activities and the activities to be declared to the Department of Commerce or
the Nuclear Regulatory Commission have been or will be co-located or located
near enough to one another to result in disclosure of the DoD activities during
an IAEA inspection or visit; and
(3)
Provide a copy of the notification to the Contracting Officer.
(b) After receipt of a
notification submitted in accordance with paragraph (a) of this clause, the DoD
Program Manager will—
(1) Conduct a security assessment to determine if
and by what means access may be granted to the IAEA; or
(2) Provide written justification to the
component or agency treaty office for a national security exclusion, in
accordance with DoD Instruction 2060.03, Application of the National Security
Exclusion to the Agreements Between the United States of America and the
International Atomic Energy Agency for the Application of Safeguards in the
(c) If the DoD Program Manager
determines that a security assessment is required—
(1)
DoD will, at a minimum—
(i) Notify the Contractor that DoD officials
intend to conduct an assessment of vulnerabilities to IAEA inspections or
visits;
(ii) Notify the Contractor of the time at which
the assessment will be conducted, at least 30 days prior to the assessment;
(iii) Provide the Contractor with advance notice of
the credentials of the DoD officials who will conduct the assessment; and
(iv) To the maximum extent practicable, conduct
the assessment in a manner that does not impede or delay operations at the
Contractor’s facility; and
(2)
The Contractor shall provide access to the site and shall cooperate with
DoD officials in the assessment of vulnerabilities to IAEA inspections or
visits.
(d) Following a security
assessment of the Contractor’s facility, DoD officials will notify the
Contractor as to—
(1) Whether the Contractor’s facility has any
vulnerabilities where potentially declarable activities under the U.S.-IAEA AP
are taking place;
(2) Whether additional security measures are
needed; and
(3) Whether DoD will apply a national security
exclusion.
(e) If DoD applies a national
security exclusion, the Contractor shall not grant access to IAEA inspectors.
(f) If DoD does not apply a
national security exclusion, the Contractor shall apply managed access to
prevent disclosure of program activities, locations, or information in the
(g) The Contractor shall not
delay submission of any reports required by the Department of Commerce or the
Nuclear Regulatory Commission while awaiting a DoD response to a notification
provided in accordance with this clause.
(h) The Contractor shall
incorporate the substance of this clause, including this paragraph (h), in all
subcontracts that are subject to the provisions of the U.S.-IAEA AP.
(End of
clause)
252.204-7011 Alternative Line Item Structure.
As prescribed in 204.7109(b), insert the following provision:
ALTERNATIVE LINE ITEM STRUCTURE (SEP 2011)
(a) Line items are the basic structural elements in a solicitation or contract that provide for the organization of contract requirements to facilitate pricing, delivery, inspection, acceptance and payment. Line items are organized into contract line items, subline items, and exhibit line items. Separate line items should be established to account for separate pricing, identification (see section 211.274 of the Defense Federal Acquisition Regulation Supplement), deliveries, or funding. The Government recognizes that the line item structure in this solicitation may not conform to every offeror’s practices. Failure to correct these issues can result in difficulties in accounting for deliveries and processing payments. Therefore, offerors are invited to propose an alternative line item structure for items on which bids, proposals, or quotes are requested in this solicitation to ensure that the resulting contract structure is economically and administratively advantageous to the Government and the Contractor.
(b) If an alternative line item structure is proposed, the structure must be consistent with subpart 204.71 of the Defense Federal Acquisition Regulation Supplement and PGI 204.71 (DFARS/PGI view). A sample line item structure and a proposed alternative structure are as follows:
Solicitation:
ITEM |
SUPPLIES/SERVICE |
QUANTITY |
UNIT |
UNIT PRICE |
AMOUNT |
0001 |
Computer, Desktop with CPU, Monitor, Keyboard and Mouse |
20 |
EA |
|
|
|
|
|
|
|
|
Alternative line item structure offer where monitors are shipped separately:
ITEM |
SUPPLIES/SERVICE |
QUANTITY |
UNIT |
UNIT PRICE |
AMOUNT |
0001 |
Computer, Desktop with CPU, Keyboard and Mouse |
20 |
EA |
|
|
0002 |
Monitor |
20 |
EA |
|
|
|
|
|
|
|
|
(End of provision)
252.204-7012 Safeguarding of Unclassified Controlled Technical Information.
As prescribed in 204.7304, use the following clause:
SAFEGUARDING OF UNCLASSIFIED CONTROLLED TECHNICAL INFORMATION (NOV 2013)
(a) Definitions. As used in this clause—
“Adequate security” means protective measures that are commensurate with the consequences and probability of loss, misuse, or unauthorized access to, or modification of information.
“Attribution information” means information that identifies the Contractor, whether directly or indirectly, by the grouping of information that can be traced back to the Contractor (e.g., program description or facility locations).
“Compromise” means disclosure of information to unauthorized persons, or a violation of the security policy of a system, in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object, or the copying of information to unauthorized media may have occurred.
“Contractor information system” means an information system belonging to, or operated by or for, the Contractor.
“Controlled technical information” means technical information with military or space application that is subject to controls on the access, use, reproduction, modification, performance, display, release, disclosure, or dissemination. Controlled technical information is to be marked with one of the distribution statements B-through-F, in accordance with DoD Instruction 5230.24, Distribution Statements on Technical Documents. The term does not include information that is lawfully publicly available without restrictions.
“Cyber incident” means actions taken through the use of computer networks that result in an actual or potentially adverse effect on an information system and/or the information residing therein.
“Exfiltration” means any unauthorized release of data from within an information system. This includes copying the data through covert network channels or the copying of data to unauthorized media.
“Media” means physical devices or writing surfaces including, but is not limited to, magnetic tapes, optical disks, magnetic disks, large-scale integration memory chips, and printouts onto which information is recorded, stored, or printed within an information system.
“Technical information” means technical data or computer software, as those terms are defined in the clause at DFARS 252.227-7013, Rights in Technical Data-Non Commercial Items, regardless of whether or not the clause is incorporated in this solicitation or contract. Examples of technical information include research and engineering data, engineering drawings, and associated lists, specifications, standards, process sheets, manuals, technical reports, technical orders, catalog-item identifications, data sets, studies and analyses and related information, and computer software executable code and source code.
(b) Safeguarding requirements and procedures for unclassified controlled technical information. The Contractor shall provide adequate security to safeguard unclassified controlled technical information from compromise. To provide adequate security, the Contractor shall—
(1) Implement information systems security in its project, enterprise, or company-wide unclassified information technology system(s) that may have unclassified controlled technical information resident on or transiting through them. The information systems security program shall implement, at a minimum—
(i) The specified National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 security controls identified in the following table; or
(ii) If a NIST control is not implemented, the Contractor shall submit to the Contracting Officer a written explanation of how—
(A) The required security control identified in the following table is not applicable; or
(B) An alternative control or protective measure is used to achieve equivalent protection.
(2) Apply other information systems security requirements when the Contractor reasonably determines that information systems security measures, in addition to those identified in paragraph (b)(1) of this clause, may be required to provide adequate security in a dynamic environment based on an assessed risk or vulnerability.
Table 1 -- Minimum Security Controls for Safeguarding
Minimum required security controls for unclassified controlled technical information requiring safeguarding in accordance with paragraph (d) of this clause. (A description of the security controls is in the NIST SP 800-53, “Security and Privacy Controls for Federal Information Systems and Organizations” (http://csrc.nist.gov/publications/PubsSPs.html).)
Access Control AC-2 AC-3(4) AC-4 AC-6 AC-7 AC-11(1) AC-17(2) AC-18(1) AC-19 AC-20(1) AC-20(2) AC-22 |
Audit & Accountability AU-2 AU-3 AU-6(1) AU-7 AU-8 AU-9 |
Identification and Authentication IA-2 IA-4 IA-5(1) |
Media Protection MP-4 MP-6 |
System & Comm Protection SC-2 SC-4 SC-7 SC-8(1) SC-13 SC-15 SC-28 |
Physical and Environmental Protection PE-2 PE-3 PE-5 |
||||
Incident Response IR-2 IR-4 IR-5 IR-6 |
||||
Configuration Management CM-2 CM-6 CM-7 CM-8 |
||||
Program Management PM-10 |
||||
System & Information Integrity SI-2 SI-3 SI-4 |
||||
Maintenance MA-4(6) MA-5 MA-6 |
||||
Risk Assessment RA-5 |
||||
Awareness & Training AT-2 |
Contingency Planning CP-9 |
|||
|
Legend: |
|
AC: Access Control |
MA: Maintenance |
AT: Awareness and Training |
MP: Media Protection |
AU: Auditing and Accountability |
PE: Physical & Environmental Protection |
CM: Configuration Management |
PM: Program Management |
CP: Contingency Planning |
RA: Risk Assessment |
IA: Identification and Authentication |
SC: System & Communications Protection |
IR: Incident Response |
SI: System & Information Integrity |
(c) Other requirements. This clause does not relieve the Contractor of the requirements specified by applicable statutes or other Federal and DoD safeguarding requirements for Controlled Unclassified Information (CUI) as established by Executive Order 13556, as well as regulations and guidance established pursuant thereto.
(d) Cyber incident and compromise reporting.
(1) Reporting requirement. The Contractor shall report as much of the following information as can be obtained to the Department of Defense via (http://dibnet.dod.mil/) within 72 hours of discovery of any cyber incident, as described in paragraph (d)(2) of this clause, that affects unclassified controlled technical information resident on or transiting through the Contractor’s unclassified information systems:
(i) Data Universal Numbering System (DUNS).
(ii) Contract numbers affected unless all contracts by the company are affected.
(iii) Facility CAGE code if the location of the event is different than the prime Contractor location.
(iv) Point of contact if different than the POC recorded in the System for Award Management (address, position, telephone, email).
(v) Contracting Officer point of contact (address, position, telephone, email).
(vi) Contract clearance level.
(vii) Name of subcontractor and CAGE code if this was an incident on a Sub-contractor network.
(viii) DoD programs, platforms or systems involved.
(ix) Location(s) of compromise.
(x) Date incident discovered.
(xi) Type of compromise (e.g., unauthorized access, inadvertent release, other).
(xii) Description of technical information compromised.
(xiii) Any additional information relevant to the information compromise.
(2) Reportable cyber incidents. Reportable cyber incidents include the following:
(i) A cyber incident involving possible exfiltration, manipulation, or other loss or compromise of any unclassified controlled technical information resident on or transiting through Contractor’s, or its subcontractors’, unclassified information systems.
(ii) Any other activities not included in paragraph (d)(2)(i) of this clause that allow unauthorized access to the Contractor’s unclassified information system on which unclassified controlled technical information is resident on or transiting.
(3) Other reporting requirements. This reporting in no way abrogates the Contractor’s responsibility for additional safeguarding and cyber incident reporting requirements pertaining to its unclassified information systems under other clauses that may apply to its contract, or as a result of other U.S. Government legislative and regulatory requirements that may apply (e.g., as cited in paragraph (c) of this clause).
(4) Contractor actions to support DoD damage assessment. In response to the reported cyber incident, the Contractor shall—
(i) Conduct further review of its unclassified network for evidence of compromise resulting from a cyber incident to include, but is not limited to, identifying compromised computers, servers, specific data and users accounts. This includes analyzing information systems that were part of the compromise, as well as other information systems on the network that were accessed as a result of the compromise;
(ii) Review the data accessed during the cyber incident to identify specific unclassified controlled technical information associated with DoD programs, systems or contracts, including military programs, systems and technology; and
(iii) Preserve and protect images of known affected information systems and all relevant monitoring/packet capture data for at least 90 days from the cyber incident to allow DoD to request information or decline interest.
(5) DoD damage assessment activities. If DoD elects to conduct a damage assessment, the Contracting Officer will request that the Contractor point of contact identified in the incident report at (d)(1) of this clause provide all of the damage assessment information gathered in accordance with paragraph (d)(4) of this clause. The Contractor shall comply with damage assessment information requests. The requirement to share files and images exists unless there are legal restrictions that limit a company's ability to share digital media. The Contractor shall inform the Contracting Officer of the source, nature, and prescription of such limitations and the authority responsible.
(e) Protection of reported information. Except to the extent that such information is lawfully publicly available without restrictions, the Government will protect information reported or otherwise provided to DoD under this clause in accordance with applicable statutes, regulations, and policies. The Contractor shall identify and mark attribution information reported or otherwise provided to the DoD. The Government may use information, including attribution information and disclose it only to authorized persons for purposes and activities consistent with this clause.
(f) Nothing in this clause limits the Government’s ability to conduct law enforcement or counterintelligence activities, or other lawful activities in the interest of homeland security and national security. The results of the activities described in this clause may be used to support an investigation and prosecution of any person or entity, including those attempting to infiltrate or compromise information on a contractor information system in violation of any statute.
(g) Subcontracts. The Contractor shall include the substance of this clause, including this paragraph (g), in all subcontracts, including subcontracts for commercial items.
(End of clause)
252.204-7013 Limitations on the Use or Disclosure of Information by Litigation Support Solicitation Offerors.
As prescribed in 204.7403(a), use the following provision. If the solicitation is a request for quotations, the terms “quotation” and “Quoter” may be substituted for “offer” and “Offeror”.
LIMITATIONS ON THE USE OR DISCLOSURE OF INFORMATION BY LITIGATION SUPPORT SOLICITATION OFFERORS (FEB 2014)
(a) Definitions. As used in this provision:
“Computer software,” “litigation information,”“litigation support,” “sensitive information,” and “technical data,” are defined in the clause at DFARS 252.204-7014, Limitations on the Use or Disclosure of Information by Litigation Support Contractors.
(b) Limitations on use or disclosure of litigation information. Notwithstanding any other provision of this solicitation, by submission of its offer, the Offeror agrees and acknowledges—
(1) That all litigation information will be accessed and used for the sole purpose of providing litigation support;
(2) That the Offeror will take all precautions necessary to prevent unauthorized disclosure of litigation information; and
(3) That litigation information shall not be used by the Offeror to compete against a third party for Government or nongovernment contracts.
(c) Indemnification and creation of third party beneficiary rights. By submission of its offer, the Offeror agrees—
(1) To indemnify and hold harmless the Government, its agents, and employees from any claim or liability, including attorneys’ fees, court costs, and expenses, arising out of, or in any way related to, the misuse or unauthorized modification, reproduction, release, performance, display, or disclosure of any litigation information; and
(2) That any third party holding proprietary rights or any other legally protectable interest in any litigation information, in addition to any other rights it may have, is a third party beneficiary who shall have a right of direct action against the Offeror, and against any person to whom the Offeror has released or disclosed such data or software, for the unauthorized duplication, release, or disclosure of such information.
(d) Offeror employees. By submission of its offer, the Offeror agrees to ensure that its employees are subject to use and nondisclosure obligations consistent with this provision prior to the employees being provided access to or use of any litigation information covered by this provision.
(End of provision)
252.204-7014 Limitations on the Use or Disclosure of Information by Litigation Support Contractors.
As prescribed in 204.7403(b), use the following clause:
LIMITATIONS ON THE USE OR DISCLOSURE OF INFORMATION BY LITIGATION SUPPORT CONTRACTORS (FEB 2014)
(a) Definitions. As used in this clause:
“Computer software” means computer programs, source code, source code listings, object code listings, design details, algorithms, processes, flow charts, formulae, and related material that would enable the software to be reproduced, recreated, or recompiled. Computer software does not include computer data bases or computer software documentation.
“Litigation information” means any information, including sensitive information, that is furnished to the contractor by or on behalf of the Government, or that is generated or obtained by the contractor in the performance of litigation support work under this contract.
“Litigation support” means administrative, technical, or professional services provided in support of the Government during or in anticipation of litigation.
"Litigation support contractor" means a contractor (including an expert or technical consultant) providing litigation support under a contract with the Department of Defense that contains this clause.
“Sensitive information” means confidential information of a commercial, financial, proprietary, or privileged nature. The term includes technical data and computer software, but does not include information that is lawfully, publicly available without restriction.
“Technical data” means recorded information, regardless of the form or method of the recording, of a scientific or technical nature (including computer software documentation). The term does not include computer software or data incidental to contract administration, such as financial and/or management information.
(b) Limitations on use or disclosure of litigation information. Notwithstanding any other provision of this contract, the Contractor agrees and acknowledges—
(1) That all litigation information will be accessed and used for the sole purpose of providing litigation support;
(2) That the Contractor will take all precautions necessary to prevent unauthorized disclosure of litigation information;
(3) That litigation information shall not be used by the Contractor to compete against a third party for Government or nongovernment contracts; and
(4) That violation of paragraph (b)(1),(b)(2), or (b)(3), of this section, is a basis for the Government to terminate this contract.
(c) Indemnification and creation of third party beneficiary rights. The Contractor agrees—
(1) To indemnify and hold harmless the Government, its agents, and employees from any claim or liability, including attorneys’ fees, court costs, and expenses, arising out of, or in any way related to, the misuse or unauthorized modification, reproduction, release, performance, display, or disclosure of any litigation information; and
(2) That any third party holding proprietary rights or any other legally protectable interest in any litigation information, in addition to any other rights it may have, is a third party beneficiary under this contract who shall have a right of direct action against the Contractor, and against any person to whom the Contractor has released or disclosed such data or software, for the unauthorized duplication, release, or disclosure of such information.
(d) Contractor employees. The Contractor shall ensure that its employees are subject to use and nondisclosure obligations consistent with this clause prior to the employees being provided access to or use of any litigation information covered by this clause.
(e) Flowdown. Include the substance of this clause, including this paragraph (e), in all subcontracts, including subcontracts for commercial items.
(End of clause)
252.204-7015 Disclosure of Information to Litigation Support Contractors.
As prescribed in 204.7403(c), use the following clause:
DISCLOSURE OF INFORMATION TO LITIGATION SUPPORT CONTRACTORS (FEB 2014)
(a) Definitions. As used in this clause:
“Litigation support” means administrative, technical, or professional services provided in support of the Government during or in anticipation of litigation.
"Litigation support contractor" means a contractor (including an expert or technical consultant) providing litigation support under a contract with the Department of Defense that contains this clause.
“Sensitive information” means confidential information of a commercial, financial, proprietary, or privileged nature. The term includes technical data and computer software, but does not include information that is lawfully, publicly available without restriction.
(b) Authorized disclosure. Notwithstanding any other provision of this solicitation or contract, the Government may disclose to a litigation support contractor, for the sole purpose of litigation support activities, any information, including sensitive information, received--
(1) Within or in connection with a quotation or offer; or
(2) In the performance of or in connection with a contract.
(c) Flowdown. Include the substance of this clause, including this paragraph (c), in all subcontracts, including subcontracts for commercial items.
(End of clause)