J– Preventative Maintenance Services for Volcano IVUS Systems
Notice Type: Amendment to Combined Synopsis/Solicitation
Posted Date:
Office Address:
Subject: J-- Preventative Maintenance Services for Volcano IVUS Systems
Classification Code: J - Maintenance, repair & rebuilding of equipment
Solicitation Number: 36C24118Q0258
Contact:
Setaside: N/AN/A
Place of Performance (address):
Place of Performance (zipcode): 02132
Place of Performance Country:
Description:
Togus VAMROC
The purpose of this Amendment A00001 is to add the following IT Clauses. A Business Associate Agreement (BAA) is required.
VA INFORMATION AND INFORMATION SYSTEM SECURITY/PRIVACY LANGUAGE
GENERAL
Contractors, contractor personnel, subcontractors, and subcontractor personnel shall be subject to the same Federal laws, regulations, standards, and VA Directives and Handbooks as
2. ACCESS TO VA INFORMATION AND VA INFORMATION SYSTEMS
a. A contractor/subcontrator shall request logical (technical) or physical access to
b. All contractors, subcontractors, and third-party servicers and associates working with
c. Contract personnel who require access to national security programs must have a valid security clearance. National Industrial Security Program (NISP) was established by Executive Order 12829 to ensure that cleared
d. Custom software development and outsourced operations must be located in the
e. The contractor or subcontractor must notify the Contracting Officer immediately when an employee working on a
3. Section 3 is not applicable and has been intentionally omitted.
4. Section 4 is not applicable and has been intentionally omitted.
5. Section 5 is not applicable and has been intentionally omitted.
6. SECURITY INCIDENT INVESTIGATION
a. The term security incident means an event that has, or could have, resulted in unauthorized access to, loss or damage to
7. LIQUIDATED DAMAGES FOR DATA BREACH
a. Consistent with the requirements of 38 U.S.C. --5725, a contract may require access to sensitive personal information. If so, the contractor is liable to
b. The contractor/subcontractor shall provide notice to
c. Each risk analysis shall address all relevant information concerning the data breach, including the following:
(1) Nature of the event (loss, theft, unauthorized access);
(2) Description of the event, including:
(a) Date of occurrence;
(b) Data elements involved, including any PII, such as full name, social security number, date of birth, home address, account number, disability code;
(3) Number of individuals affected or potentially affected;
(4) Names of individuals or groups affected or potentially affected;
(5) Ease of logical data access to the lost, stolen or improperly accessed data in light of the degree of protection for the data, e.g., unencrypted, plain text;
(6) Amount of time the data has been out of
(7) The likelihood that the sensitive personal information will or has been compromised (made accessible to and usable by unauthorized persons);
(8) Known misuses of data containing sensitive personal information, if any;
(9) Assessment of the potential harm to the affected individuals;
(10) Data breach analysis as outlined in 6500.2 Handbook, Management of Security and Privacy Incidents, as appropriate; and
(11) Whether credit protection services may assist record subjects in avoiding or mitigating the results of identity theft based on the sensitive personal information that may have been compromised.
d. Based on the determinations of the independent risk analysis, the contractor shall be responsible for paying to the
(1) Notification;
(2) One year of credit monitoring services consisting of automatic daily monitoring of at least 3 relevant credit bureau reports;
(3) Data breach analysis;
(4) Fraud resolution services, including writing dispute letters, initiating fraud alerts and credit freezes, to assist affected individuals to bring matters to resolution;
(5) One year of identity theft insurance with
(6) Necessary legal expenses the subjects may incur to repair falsified or damaged credit records, histories, or financial affairs.
8. Section 8 is not applicable and has been intentionally omitted.
9. TRAINING
a. All contractor employees and subcontractor employees requiring access to
(1) Sign and acknowledge (either manually or electronically) understanding of and responsibilities for compliance with the Contractor Rules of Behavior, Appendix E relating to access to
(2) Successfully complete the VA Cyber Security Awareness and Rules of Behavior training and annually complete required security training;
(3) Successfully complete the appropriate
(4) Successfully complete any additional cyber security or privacy training, as required for
b. The contractor shall provide to the contracting officer and/or the COTR a copy of the training certificates and certification of signing the Contractor Rules of Behavior for each applicable employee within 1 week of the initiation of the contract and annually hereafter, as required.
c. Failure to complete the mandatory annual training and sign the Rules of Behavior annually, within the timeframe required, is grounds for suspension or termination of all physical or electronic access privileges and removal from work on the contract until such time as the training and documents are complete
Link/URL: https://www.fbo.gov/spg/VA/ToVAMROC402/ToVAMROC402/36C24118Q0258/listing.html



Blockchain in Healthcare Today Debuts First Ensemble of Articles for Healthcare Industry
Q– Community Nursing Home (CNH)
Advisor News
- Younger investors turn to ‘finfluencers’
- Using digital retirement modeling to strengthen client understanding
- Fear of outliving money at a record high
- Cognitive decline is a growing threat to financial security
- Two lessons career changers wish they knew before starting the CFP journey
More Advisor NewsAnnuity News
- FACC and DOL enter stipulation to dismiss 2020 guidance lawsuit
- Zinnia’s Zahara policy admin system adds FIA chassis to product library
- The Standard and Ignite Partners Announce Launch of Thrive Plus Fixed Indexed Annuity
- CareScout Joins Ensight™ Intelligent Quote LTC & Life Marketplace
- Axonic Insurance Annuities, Built for Banks, Broker-Dealers and RIAs, Now Available through WealthVest.
More Annuity NewsHealth/Employee Benefits News
- Researchers at Northwestern University Feinberg School of Medicine Report Findings in Cataract Surgery (Evaluating Metrics Assessing Surgical Success in Patients Undergoing Cataract Surgery): Surgery – Cataract Surgery
- Studies Conducted at University of Florida on Managed Care Recently Reported [Risk of Fetal Exposure to Teratogenic Medications: Development of Evidence for the Teratogenic Risk Impact and Mitigation (TRIM) Tool]: Managed Care
- 5 ways to navigate health care costs and coverage with confidence
- UnitedHealthcare’s mission control targets customer woes to build its brand
- NC State Health Plan expects to spend $1 billion more than planned. Here’s why
More Health/Employee Benefits NewsLife Insurance News
- Best's Market Segment Report: AM Best Maintains Stable Outlook on France's Life Insurance Segment Despite Global Economic Uncertainty, Increased Geopolitical Risks and Domestic Political Instability
- Iowa widow claims premium-financed IUL plan jeopardized family farm
- Redefining life insurance for a new era of trust and protection
- Agam Capital and 1823 Partners Announce Strategic Partnership to Provide Life Insurers with an End-to-End Value Chain Solution
- AM Best Revises Outlooks to Positive for Western & Southern Financial Group, Inc. and Its Subsidiaries
More Life Insurance News