Technical Review Submission Template
An Additional Help for ADS Chapter 548
New Edition Date: 4/07/2015
Responsible Office: M/CIO/BCCS
File Nam: 548sad_040715
Date: Click here to enter today’s Date
- Program Information
Country Name / Click here to enter the country name.
USAID Contract Number / Click here to enter the USAID contract number.
ProgramName / Click here to enter the Program Name. An example would be Power Distribution Program (PDP).
Current Program Phase / Select the program phase in which the Procurement resides:
☐Startup
☐Implementation
☐Closedown
Program Start Date / Click here to enter a Program Start date. /
Program End Date / Click here to enter a Program End date. /
Award Type(s) / Select the type(s) of award(s) used for this Project:
☐Contract
☐Grant
☐Cooperative Agreement
☐Fixed Amount Reimbursement (FAR)
☐Performance Disbursement
Contracting Officer (CO)/
Agreement Officer (AO) / Click here to enter the names of the CO/AO. Format should be: Name (CO, USAID/Region or Country), Name (AO, USAID/Region or Country). /
Contracting Officer’s Representative (COR)/
Agreement Officer’s Representative (AOR) / Click here to enter the names of the COR/AOR. Format should be: Name (COR, USAID/Region or Country), Name (AOR, USAID/Region or Country). /
Review Requester Name / Click here to enter the name of the person requesting this Review. /
Implementing Partner / Click here to enter the name of the vendors, contractors, and other organizations that provide support and assistance, or have cooperative ownership of the Program. /
Points of Contact for Additional Information/Questions / Click here to enter the names and email addresses of additional Points of Contact for this Review Request. /
- Project Information
Project/Activity Name / Click here to enter the complete Project/Activity Name for this Procurement.
Project/Activity Start Date / Click here to enter a Project/Activity Start date.
Project/Activity End Date / Click here to enter a Project/Activity End date.
Project/Activity Description / Click here to describe the purpose and objectives of the Project/Activity.
Project/Activity Cost / Click here to enter the total cost for the overall Project/Activity in U.S. dollars.
- Procurement Information
ProcurementName / Click here to enter the title of the Procurement.
Expected Delivery Date / Click here to enter an Expected Delivery Date for the IT components in this Procurement. /
ProcurementDescription / Click here to describe the purposes for the IT-related items being bought under this Procurement.
Related Procurements / Click here to describe related procurements and cost. This is especially important for dependent procurements.
Estimated IT Cost / Click here to enter the total projected cost in U.S. dollars for the IT components proposed for this Review Request. Costs for previous procurements may be detailed in the Related Procurements section.
Type of Review Required / Select the type of review required:
☐ Project Design
☐Pre-Solicitation
☐Proposal Technical
☐Standard Technical
☐Annual Technical Proposal Technical
☐Close-outTechnical
☐Extensive Technical
- Technical Review Areas
- Systems Engineering – This section assesses the interdisciplinary approach of applying people, process, and technology to realize a coherent system for achieving project goals.
Personnel Roles / Click here to describe the staffing associated with this Procurement. Enter key personnel roles, such as Project Manager, Business Analyst, Developer, Tester, Trainer, System Administrator. Also, indicate the IT knowledge and skills required. /
System Engineering Lifecycle Activities / Click here to describe Systems Engineering Life Cycle activities, such as system requirements development, engineering, testing, deployment and maintenance. How will the IT solution meet the intended needs? Indicate project’s likelihood of success, list identified risks, expected outcomes, and success criteria, as appropriate. Provide copies of available plans related to system life cycle and technical management activities. /
Technology / Click to list IT Components to be procured/connected, the quantities to be deployed, and describe how the system will function. An architecture diagram/network illustration is requested. Describe use of emerging technologies, opportunities for equipment reuse, and how the “right-sizing” of this procurement was determined. /
Support Services, Training / Click here to list associated support services and user training. An example would be software maintenance agreements, help desk support and scheduled training. /
- Interoperability –This section assesses the ability of two or more systems (or components of a system) to communicate and send/receive data via a common set of industrial standards supported by the interoperating systems without changes. This assessment includes data exchange and the three-tiered systems architecture layers (operating system, middleware, and application software) working together and with the hardware.
- Integration –This section assesses the effort of putting together two or more systems (or components of a system) to work together as a unit to provide a specified function or service.It also assesses the resources required to support the integration.
Click here to describe any integration required during IT system implementation, including the technical resources and level of effort needed. Provide a high-level Systems Architecture diagram showing any required interfaces between systems or components/modules of a system. Provide documentation,including Interface Control Documents (ICD) and Application Program Interfaces (API) required for integration.
Site/Logistics Information
Number of sites involved / Click here to enter the number of sites involved. /Total number of users / Click here to enter the total number of system users. /
- Capability – This section assesses the ability of the procured items to perform or provide the specified business operation functions to enable attainment of the specified business goals. It also considers underlying infrastructure dependencies.
- Cost-Effectiveness – This section assesses whether the proposed technology solution is economical in terms of the goods or services received for the money spent.The analysis examines the following: (1)cost comparison of alternative solutions, (2)competitive bids, and (3)price reasonableness.
Ensure that the Bill of Materials document includes all hardware, software, services, and training components and that the total Bill of Materials price agrees with the Estimated IT Cost stated in the Procurement Information section above. For each component price in the Bill of Material, specify the source, for example GSA, Internet, Manufacturer Price, or Vendor Quotation.
Click here to provide an explanation for all Bill of Materials component prices that exceed a 20 percent variance from common commercial pricing, e.g., GSA or Internet pricing.
If a competitive procurement is to be used, please provide the basis of the estimated costs presented in this review request. Include all factors considered, especially those that are unique to local vendors and/or a copy of the Vendor Quotes.
- IT Security–This section assesses the physical security, access control, cryptography, network security, disaster recovery planning, and application security components of the proposed IT solution. Examples of each are listed below.
Physical Security
- Crime Prevention Through Environmental Design (CPTED)
- Facility design
- Fire safety
- Electrical security
- HVAC
- Perimeter security: fences, gates, lighting
- Physical access control: transponders, badges, swipe cards
- Theft, denial, destruction
- Intrusion detection: CCTV, alarms, guards, dogs
Access Control
- Authentication methods (types 1, 2, and 3)
- Authorization: DAC, RBAC, MAC
- Accounting: logging, monitoring, auditing
- Central, decentralized, and hybrid management
- Single sign-on
- Vulnerabilities: emanations, impersonation, rogue infrastructure, social engineering
Cryptography
- Privacy
- Integrity
- Nonrepudiation
- Data encryption
Network Security
- Antivirus protection
- Firewalls
- Network vulnerabilities
- Wireless/WAN vulnerabilities
Disaster Recovery Planning
- System and data backups
- Alternative sites
- Continuity of operations planning (CONOPS)
Application Security
- Change management- software upgrade and patch plans
- System logs to prevent tampering
- Password policies
- Database security
ADS 548 Technical Review Submission Template V10.0Page 1